0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1683.815542][T15894] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1683.819018][T15892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1683.819029][T15892] Call Trace: [ 1683.819035][T15892] dump_stack+0x137/0x19d [ 1683.847537][T15885] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1683.847661][T15892] should_fail+0x23c/0x250 [ 1683.847678][T15892] should_fail_usercopy+0x16/0x20 11:38:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1683.847712][T15892] _copy_from_user+0x1c/0xd0 [ 1683.847727][T15892] __se_sys_memfd_create+0x137/0x390 [ 1683.861673][T15886] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1683.863198][T15892] __x64_sys_memfd_create+0x2d/0x40 [ 1683.876108][T15896] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1683.878046][T15892] do_syscall_64+0x4a/0x90 [ 1683.878071][T15892] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1683.910277][T15902] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1683.915544][T15892] RIP: 0033:0x4665d9 [ 1683.915560][T15892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.915574][T15892] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1683.915591][T15892] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004665d9 11:38:40 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1683.927942][T15899] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1683.930462][T15892] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1683.930477][T15892] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 1683.930489][T15892] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1683.964224][T15903] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1683.966394][T15892] R13: 0000000020000080 R14: 0000000000011000 R15: 0000000020000000 [ 1684.018657][T15911] FAULT_INJECTION: forcing a failure. [ 1684.018657][T15911] name failslab, interval 1, probability 0, space 0, times 0 [ 1684.020426][T15901] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.032941][T15911] CPU: 1 PID: 15911 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1684.052885][T15904] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:40 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0, 0x0, 0x6400}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.054061][T15911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1684.065316][T15912] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.075234][T15911] Call Trace: [ 1684.075243][T15911] dump_stack+0x137/0x19d [ 1684.087037][T15913] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1684.089500][T15911] should_fail+0x23c/0x250 [ 1684.104119][T15914] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.104936][T15911] ? shmem_alloc_inode+0x22/0x30 [ 1684.104961][T15911] __should_failslab+0x81/0x90 [ 1684.104978][T15911] ? shmem_match+0xa0/0xa0 [ 1684.134490][T15911] should_failslab+0x5/0x20 [ 1684.138994][T15911] kmem_cache_alloc+0x46/0x2f0 [ 1684.143333][T15905] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.143750][T15911] ? do_anonymous_page+0x411/0x8b0 [ 1684.159833][T15911] ? fsnotify_perm+0x59/0x2e0 [ 1684.164497][T15911] ? shmem_match+0xa0/0xa0 [ 1684.168920][T15911] shmem_alloc_inode+0x22/0x30 [ 1684.173674][T15911] new_inode_pseudo+0x38/0x1c0 [ 1684.178426][T15911] new_inode+0x21/0x120 [ 1684.178901][T15923] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1684.182610][T15911] shmem_get_inode+0xa1/0x480 [ 1684.182645][T15911] __shmem_file_setup+0xf1/0x1d0 [ 1684.198880][T15919] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.203275][T15911] shmem_file_setup+0x37/0x40 11:38:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.215939][T15924] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1684.218931][T15911] __se_sys_memfd_create+0x1eb/0x390 [ 1684.218954][T15911] __x64_sys_memfd_create+0x2d/0x40 [ 1684.231329][T15925] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.235275][T15911] do_syscall_64+0x4a/0x90 [ 1684.235298][T15911] entry_SYSCALL_64_after_hwframe+0x44/0xae 11:38:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.241342][T15922] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.251484][T15911] RIP: 0033:0x4665d9 [ 1684.251500][T15911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1684.251514][T15911] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1684.284072][T15929] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:41 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:41 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0, 0x0, 0x9006}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1684.296251][T15911] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004665d9 [ 1684.296266][T15911] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1684.296279][T15911] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 1684.296291][T15911] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1684.337913][T15934] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.339710][T15911] R13: 0000000020000080 R14: 0000000000011000 R15: 0000000020000000 11:38:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.380204][T15942] FAULT_INJECTION: forcing a failure. [ 1684.380204][T15942] name failslab, interval 1, probability 0, space 0, times 0 [ 1684.388767][T15935] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1684.392890][T15942] CPU: 0 PID: 15942 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1684.404215][T15936] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:41 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.414073][T15942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1684.414087][T15942] Call Trace: [ 1684.414092][T15942] dump_stack+0x137/0x19d [ 1684.414115][T15942] should_fail+0x23c/0x250 [ 1684.430178][T15941] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.435140][T15942] ? security_inode_alloc+0x30/0x180 [ 1684.435167][T15942] __should_failslab+0x81/0x90 [ 1684.435187][T15942] should_failslab+0x5/0x20 11:38:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:41 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.440331][T15945] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1684.442905][T15942] kmem_cache_alloc+0x46/0x2f0 [ 1684.442930][T15942] security_inode_alloc+0x30/0x180 [ 1684.463252][T15946] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.463614][T15942] inode_init_always+0x20b/0x420 [ 1684.468663][T15947] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.472858][T15942] ? shmem_match+0xa0/0xa0 [ 1684.472884][T15942] new_inode_pseudo+0x73/0x1c0 11:38:41 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x2, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.516486][T15952] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.520691][T15942] new_inode+0x21/0x120 [ 1684.520731][T15942] shmem_get_inode+0xa1/0x480 [ 1684.527753][T15955] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.529847][T15942] __shmem_file_setup+0xf1/0x1d0 [ 1684.560182][T15956] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.560611][T15942] shmem_file_setup+0x37/0x40 [ 1684.573398][T15954] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.576530][T15942] __se_sys_memfd_create+0x1eb/0x390 [ 1684.597569][T15942] __x64_sys_memfd_create+0x2d/0x40 [ 1684.602771][T15942] do_syscall_64+0x4a/0x90 [ 1684.607181][T15942] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1684.607628][T15958] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1684.613125][T15942] RIP: 0033:0x4665d9 11:38:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.613139][T15942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1684.613190][T15942] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 [ 1684.626895][T15959] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.628130][T15942] ORIG_RAX: 000000000000013f [ 1684.628138][T15942] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004665d9 11:38:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:41 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1684.628152][T15942] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1684.664528][T15963] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1684.664812][T15942] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 1684.664826][T15942] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1684.676517][T15962] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.677429][T15942] R13: 0000000020000080 R14: 0000000000011000 R15: 0000000020000000 11:38:41 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x3000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.697152][T15965] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.745957][T15967] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.746113][T15974] FAULT_INJECTION: forcing a failure. [ 1684.746113][T15974] name failslab, interval 1, probability 0, space 0, times 0 [ 1684.757188][T15968] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x18}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.769609][T15974] CPU: 1 PID: 15974 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1684.769629][T15974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1684.769637][T15974] Call Trace: [ 1684.769644][T15974] dump_stack+0x137/0x19d [ 1684.769663][T15974] should_fail+0x23c/0x250 [ 1684.769677][T15974] ? __d_alloc+0x36/0x370 [ 1684.769691][T15974] __should_failslab+0x81/0x90 11:38:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.795236][T15972] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1684.800843][T15974] should_failslab+0x5/0x20 [ 1684.808339][T15979] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.808438][T15974] kmem_cache_alloc+0x46/0x2f0 [ 1684.808465][T15974] ? kcsan_setup_watchpoint+0x26e/0x470 [ 1684.829437][T15981] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.833011][T15974] __d_alloc+0x36/0x370 [ 1684.833032][T15974] ? current_time+0xdb/0x190 11:38:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:41 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.838332][T15982] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.848500][T15974] d_alloc_pseudo+0x1a/0x50 [ 1684.848521][T15974] alloc_file_pseudo+0x63/0x130 [ 1684.848538][T15974] __shmem_file_setup+0x14c/0x1d0 [ 1684.874992][T15984] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.878559][T15974] shmem_file_setup+0x37/0x40 [ 1684.878582][T15974] __se_sys_memfd_create+0x1eb/0x390 [ 1684.878634][T15974] __x64_sys_memfd_create+0x2d/0x40 11:38:41 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x3, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x26}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1684.911313][T15985] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.914949][T15974] do_syscall_64+0x4a/0x90 [ 1684.914974][T15974] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1684.914995][T15974] RIP: 0033:0x4665d9 [ 1684.915005][T15974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1684.915021][T15974] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 11:38:41 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1684.951493][T15988] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.962141][T15991] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1684.974960][T15974] ORIG_RAX: 000000000000013f [ 1684.974969][T15974] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004665d9 [ 1684.975015][T15974] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1684.975024][T15974] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 1684.975032][T15974] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1685.008438][T15993] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.015699][T15974] R13: 0000000020000080 R14: 0000000000011000 R15: 0000000020000000 [ 1685.047273][T16002] FAULT_INJECTION: forcing a failure. [ 1685.047273][T16002] name failslab, interval 1, probability 0, space 0, times 0 [ 1685.058941][T15998] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.071604][T16002] CPU: 1 PID: 16002 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1685.082793][T15992] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.092762][T16002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1685.092774][T16002] Call Trace: [ 1685.092781][T16002] dump_stack+0x137/0x19d [ 1685.105909][T15994] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:41 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1685.113812][T16002] should_fail+0x23c/0x250 [ 1685.118555][T16004] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.121379][T16002] ? __alloc_file+0x2e/0x1a0 [ 1685.134570][T15996] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.136850][T16002] __should_failslab+0x81/0x90 [ 1685.157354][T16005] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1685.163415][T16002] should_failslab+0x5/0x20 11:38:41 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1685.183746][T16002] kmem_cache_alloc+0x46/0x2f0 [ 1685.188520][T16002] ? inode_doinit_with_dentry+0x382/0x950 [ 1685.194245][T16002] __alloc_file+0x2e/0x1a0 [ 1685.198649][T16002] alloc_empty_file+0xcd/0x1c0 [ 1685.203108][T16009] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.203401][T16002] alloc_file+0x3a/0x280 [ 1685.203420][T16002] alloc_file_pseudo+0xe2/0x130 11:38:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1685.215196][T16010] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.218638][T16002] __shmem_file_setup+0x14c/0x1d0 [ 1685.239465][T16002] shmem_file_setup+0x37/0x40 [ 1685.243790][T16013] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.244144][T16002] __se_sys_memfd_create+0x1eb/0x390 [ 1685.255767][T16011] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.260395][T16002] __x64_sys_memfd_create+0x2d/0x40 [ 1685.260419][T16002] do_syscall_64+0x4a/0x90 11:38:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1685.281098][T16002] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1685.286875][T16015] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.286988][T16002] RIP: 0033:0x4665d9 [ 1685.301844][T16002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1685.303489][T16014] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1685.321452][T16002] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1685.321469][T16002] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004665d9 [ 1685.321480][T16002] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1685.344231][T16018] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1685.348803][T16002] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff 11:38:42 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x7, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:42 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1685.365363][T16018] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1685.367937][T16002] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1685.367950][T16002] R13: 0000000020000080 R14: 0000000000011000 R15: 0000000020000000 [ 1685.405233][T16021] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.422829][T16028] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1685.439968][T16023] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.450683][T16035] FAULT_INJECTION: forcing a failure. [ 1685.450683][T16035] name failslab, interval 1, probability 0, space 0, times 0 [ 1685.456114][T16029] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.463693][T16035] CPU: 0 PID: 16035 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 11:38:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1685.477754][T16027] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1685.484807][T16035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1685.484819][T16035] Call Trace: [ 1685.509226][T16035] dump_stack+0x137/0x19d [ 1685.513581][T16035] should_fail+0x23c/0x250 [ 1685.513780][T16034] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.518040][T16035] ? security_file_alloc+0x30/0x190 11:38:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1685.529665][T16037] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.534242][T16035] __should_failslab+0x81/0x90 [ 1685.534265][T16035] should_failslab+0x5/0x20 [ 1685.554472][T16035] kmem_cache_alloc+0x46/0x2f0 [ 1685.559232][T16035] security_file_alloc+0x30/0x190 [ 1685.564334][T16035] __alloc_file+0x83/0x1a0 [ 1685.565411][T16042] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.568773][T16035] alloc_empty_file+0xcd/0x1c0 [ 1685.568793][T16035] alloc_file+0x3a/0x280 11:38:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1685.588775][T16035] alloc_file_pseudo+0xe2/0x130 [ 1685.593620][T16035] __shmem_file_setup+0x14c/0x1d0 [ 1685.598733][T16035] shmem_file_setup+0x37/0x40 [ 1685.603417][T16035] __se_sys_memfd_create+0x1eb/0x390 [ 1685.608724][T16035] __x64_sys_memfd_create+0x2d/0x40 [ 1685.613924][T16035] do_syscall_64+0x4a/0x90 [ 1685.614533][T16043] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.618335][T16035] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1685.635216][T16035] RIP: 0033:0x4665d9 [ 1685.639111][T16035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1685.646647][T16048] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.658712][T16035] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1685.658732][T16035] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004665d9 11:38:42 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:42 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x10, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1685.658743][T16035] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1685.671886][T16050] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.678153][T16035] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 1685.678174][T16035] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1685.678184][T16035] R13: 0000000020000080 R14: 0000000000011000 R15: 0000000020000000 [ 1685.696664][T16048] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.743524][T16058] FAULT_INJECTION: forcing a failure. [ 1685.743524][T16058] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1685.746499][T16051] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.756775][T16058] CPU: 1 PID: 16058 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1685.767987][T16053] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.777909][T16058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1685.777921][T16058] Call Trace: [ 1685.777929][T16058] dump_stack+0x137/0x19d [ 1685.799534][T16052] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1685.802330][T16058] should_fail+0x23c/0x250 [ 1685.815610][T16062] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.817749][T16058] __alloc_pages+0x102/0x320 [ 1685.817770][T16058] alloc_pages_vma+0x391/0x660 [ 1685.822450][T16063] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1685.833174][T16058] shmem_getpage_gfp+0x980/0x1410 [ 1685.833202][T16058] ? mls_context_isvalid+0x76/0x1e0 [ 1685.862470][T16067] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.863791][T16058] shmem_write_begin+0x7e/0x100 [ 1685.879674][T16058] generic_perform_write+0x196/0x3a0 [ 1685.880612][T16068] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.884954][T16058] ? file_update_time+0x1bd/0x3e0 [ 1685.900973][T16058] __generic_file_write_iter+0x161/0x300 [ 1685.905033][T16070] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.906636][T16058] ? generic_write_checks+0x250/0x290 [ 1685.918572][T16071] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1685.923226][T16058] generic_file_write_iter+0x75/0x130 [ 1685.923247][T16058] vfs_write+0x69d/0x770 [ 1685.943906][T16058] __x64_sys_pwrite64+0xf5/0x150 [ 1685.948836][T16058] do_syscall_64+0x4a/0x90 [ 1685.950217][T16073] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1685.953375][T16058] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1685.953401][T16058] RIP: 0033:0x419777 [ 1685.953411][T16058] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 11:38:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1685.953427][T16058] RSP: 002b:00007f6a5b60cf20 EFLAGS: 00000293 [ 1685.968196][T16074] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.970362][T16058] ORIG_RAX: 0000000000000012 [ 1685.970371][T16058] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 1685.979936][T16075] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1685.993825][T16058] RDX: 0000000000000006 RSI: 0000000020010600 RDI: 0000000000000004 11:38:42 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1e, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1685.993838][T16058] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 1685.993848][T16058] R10: 0000000000008800 R11: 0000000000000293 R12: 0000000000000004 [ 1685.993860][T16058] R13: 0000000000000004 R14: 0000000020000140 R15: 0000000000000000 [ 1686.025319][T16077] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1686.035143][T16058] loop1: detected capacity change from 0 to 136 [ 1686.056645][T16079] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:42 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1686.075610][T16058] isofs_fill_super: bread failed, dev=loop1, iso_blknum=34, block=68 [ 1686.094074][T16068] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.128140][T16082] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.140100][T16084] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.152066][T16089] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1686.163604][T16091] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.175751][T16094] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.177248][T16099] FAULT_INJECTION: forcing a failure. 11:38:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1686.177248][T16099] name failslab, interval 1, probability 0, space 0, times 0 [ 1686.187262][T16096] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.199451][T16099] CPU: 0 PID: 16099 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1686.199472][T16099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1686.199538][T16099] Call Trace: [ 1686.221066][T16098] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1686.230652][T16099] dump_stack+0x137/0x19d [ 1686.230674][T16099] should_fail+0x23c/0x250 [ 1686.230709][T16099] ? xas_create+0x96b/0xb30 [ 1686.230724][T16099] __should_failslab+0x81/0x90 [ 1686.236977][T16097] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1686.245017][T16099] should_failslab+0x5/0x20 [ 1686.245039][T16099] kmem_cache_alloc+0x46/0x2f0 [ 1686.245058][T16099] xas_create+0x96b/0xb30 [ 1686.271930][T16102] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.274201][T16099] ? memcg_check_events+0x23/0x3b0 [ 1686.274223][T16099] xas_create_range+0x146/0x360 [ 1686.303568][T16103] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.303858][T16099] shmem_add_to_page_cache+0x3ad/0x650 [ 1686.303882][T16099] shmem_getpage_gfp+0xbdc/0x1410 [ 1686.303899][T16099] shmem_write_begin+0x7e/0x100 [ 1686.327019][T16107] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1686.330144][T16099] generic_perform_write+0x196/0x3a0 [ 1686.336966][T16105] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.346058][T16099] ? file_update_time+0x1bd/0x3e0 [ 1686.346081][T16099] __generic_file_write_iter+0x161/0x300 [ 1686.356680][T16108] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1686.362355][T16099] ? generic_write_checks+0x250/0x290 [ 1686.362376][T16099] generic_file_write_iter+0x75/0x130 11:38:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1686.367787][T16109] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.373203][T16099] vfs_write+0x69d/0x770 [ 1686.373223][T16099] __x64_sys_pwrite64+0xf5/0x150 [ 1686.401456][T16110] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.406099][T16099] do_syscall_64+0x4a/0x90 [ 1686.406124][T16099] entry_SYSCALL_64_after_hwframe+0x44/0xae 11:38:43 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:43 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x300, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1686.422858][T16112] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.426276][T16099] RIP: 0033:0x419777 [ 1686.426293][T16099] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1686.426308][T16099] RSP: 002b:00007f6a5b60cf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1686.426326][T16099] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 11:38:43 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x105000, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000100)={&(0x7f0000000040), &(0x7f0000000080)=""/105, 0x69}) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1686.453209][T16113] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1686.471113][T16099] RDX: 0000000000000006 RSI: 0000000020010600 RDI: 0000000000000004 [ 1686.471128][T16099] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 1686.471139][T16099] R10: 0000000000008800 R11: 0000000000000293 R12: 0000000000000004 [ 1686.471150][T16099] R13: 0000000000000004 R14: 0000000020000140 R15: 0000000000000000 [ 1686.488862][T16118] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:43 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1686.536766][T16099] loop1: detected capacity change from 0 to 136 [ 1686.542056][T16116] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1686.560870][T16117] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.572829][T16125] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.592404][T16127] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.595779][T16136] FAULT_INJECTION: forcing a failure. [ 1686.595779][T16136] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1686.612020][T16132] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.616505][T16136] CPU: 0 PID: 16136 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1686.630658][T16138] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1686.637619][T16136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1686.637630][T16136] Call Trace: [ 1686.637637][T16136] dump_stack+0x137/0x19d [ 1686.665130][T16140] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1686.666331][T16136] should_fail+0x23c/0x250 [ 1686.666359][T16136] should_fail_usercopy+0x16/0x20 [ 1686.679855][T16141] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1686.681819][T16136] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 1686.694153][T16142] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.697817][T16136] ? shmem_write_begin+0x7e/0x100 [ 1686.719848][T16136] generic_perform_write+0x1e4/0x3a0 [ 1686.725152][T16136] ? file_update_time+0x1bd/0x3e0 [ 1686.730186][T16136] __generic_file_write_iter+0x161/0x300 [ 1686.730274][T16144] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1686.735837][T16136] ? generic_write_checks+0x250/0x290 [ 1686.735858][T16136] generic_file_write_iter+0x75/0x130 [ 1686.735877][T16136] vfs_write+0x69d/0x770 [ 1686.761274][T16147] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1686.761889][T16136] __x64_sys_pwrite64+0xf5/0x150 [ 1686.777878][T16136] do_syscall_64+0x4a/0x90 [ 1686.779996][T16146] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:43 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x86}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1686.782284][T16136] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1686.782308][T16136] RIP: 0033:0x419777 [ 1686.803037][T16136] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1686.820779][T16151] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.822638][T16136] RSP: 002b:00007f6a5b60cf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 11:38:43 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) mmap(&(0x7f0000012000/0x3000)=nil, 0x3000, 0x1, 0x2010, r1, 0x5dc5f000) mmap$usbmon(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000004, 0x1010, 0xffffffffffffffff, 0x9) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x10, r0, 0xf0cd0000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000080)=[{&(0x7f0000000000)=""/83, 0x53}, {&(0x7f00000000c0)=""/251, 0xfb}, {&(0x7f0000000280)=""/162, 0xa2}], 0x3, 0xd9f, 0x0) [ 1686.822658][T16136] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 1686.849976][T16136] RDX: 0000000000000006 RSI: 0000000020010600 RDI: 0000000000000004 [ 1686.857936][T16136] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 1686.859323][T16157] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1686.865940][T16136] R10: 0000000000008800 R11: 0000000000000293 R12: 0000000000000004 [ 1686.865977][T16136] R13: 0000000000000004 R14: 0000000020000140 R15: 0000000000000000 11:38:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:43 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1686.879827][T16155] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.891438][T16136] loop1: detected capacity change from 0 to 136 [ 1686.904500][T16158] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1686.923634][T16159] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.935168][T16160] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x270}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1686.947047][T16165] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.959219][T16168] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1686.980205][T16172] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:43 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1686.985138][T16177] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1687.000648][T16177] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1687.006479][T16178] FAULT_INJECTION: forcing a failure. [ 1687.006479][T16178] name failslab, interval 1, probability 0, space 0, times 0 [ 1687.009850][T16177] tc_dump_action: action bad kind [ 1687.022410][T16178] CPU: 1 PID: 16178 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1687.037527][T16178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:38:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:43 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f0000000b40)={{}, "c6312e08c9ba4d0d3f6e059e632994f04677ec574a373fb4cb5f5dd4f63ecc92d478de9a84488ba427593b16f85e3c0ce7da7497333b394d0776ff24af301ba7ce663bc057059a446e1f22b08a486abfdd159786b4e58c941fa60f47f932d2a3f0b3834f36f6eb25352396b340effe9f848073f2f4a1bbea7e9d9b76ad3f19ed999e8415f2010a695b951f6dcafe32fea48b862b5c439b7855f022c7ea0ec2a9401148e82eeeab3858b3a9e97f9f044e1bfa13f12acd448a5a0099bb4f9a1c67f4c45b8518e67fddfe172c718494245dd5d35771df5d82d88e9727d377086ae4a26d68cbb6620d522409229812fcb13846759c2e96adf68fb39e0c28b12a6e0cd3ca8c33d9a5217baa2239af456d61b641a325b03ebe15cff49f33ac002fbaf4eba1fc64464f60a78de60da8c4573861cd0e67e8d0a3e1e0dfca93dc8769f6a292fbcafe35479194a96c868148e6a87ba4e49bae394330ceea12fa304f5847599b5a07a0be59ce90cbc6225962c3ef4516eca9eded3dbba7ff199af44d4e086eb9c8fb11384bfbd08a259daf6d40d2e1b67fe23e70829892df0549b80297ffbe58a36fe1ef63e14f61fdfc8c22c98e560c67c0e91058de12d1e9bbe2f1d30a58d55b0f3d98e6ffed11331e3d710a4a88eb29e564b9d89a9e7437c0342f696739d4098ee4599eac3b09de1f6d736e6b5f62e2641afeaea35495a6821e7ccb9d4728735cfe5264e638a9c3d5542f663277869514230aeb6469e99486accabc7f4bdacfd05890cd1d331740b180e61297a2201d1a44223363b7bab0d2f35d67e2f7b6ee90ea63e305dd6d9b10cda2fa63636969c384d1a24512ce0fb3cbe79ef56facd2ed65688650703cefb15e59e3498dd187b252d8fd0e9af0289a19972e56c4bef5872d3579e2e3003a3093528a5af0492d602f4d719802468a4a4ce088e8a048f13f3a440bc706b101b6d4016c56dcd3ef2923c77cf701f57145f6bef56c7f0a8fb6f6e0fc7e1435679dfbd1f0728fd9484d03df54d07d8bada9cb7d8af7e427703fd765c442f53494a48a3262670bc45b35ea28f516022b2ba6097c3618ac70abca9309a9e7fb073f8f01be801ab9413b6487cb97ee4038437e25ee4bce273be11a2d098ac8628015050a41ef19551f3140b0b512a6accb3e14288951f7391088e8d0a6308587c0dd48e4f00ea0286c531d27975a72b87c7ac3c2f81106372df59d9c2af31eef3508bef93849553713d2832b237e564510709cb18d14d7352fceecf8a138a49b80fdd15f70cf9023d225dd57d11759c1ae9317b7fc482dedeb132c9576df06426fcd0b933289048c85e39f797d74d9b218ac32052c49c6f237db90e77d950dc2c818caa7b9ae3b826cb37da4349ba47e2ed05cea49da5e2c58d45a854edb245aa3285c160c4f6cae6409afaf5afd5621fb7d4da7223121bfaf343c244d0a44780028b7c8d20a8c25143195dbebe7bbb8e5c22180d5c9d9ef155079fd6dca8500735780ef2f39d4b9512146d405a4293d9940493574a829ee5ead159a4e624eaf8bebab8897f5b05a1c75a2e67f49841b2e43fbc5b08e56c99cc8516f8b7e921c7c51cef2292b888ccc4219a8888e5c0783bbb589b5b8952f06e32b13f941b16d86c1f082c424b6f85249120e2c04ef5e4c52f12fc753c646126310413bd6f5c75cbf61b9b25fab9756af98fe38bbf1d4512399f33128f8b15f724808ffcee516a2c90a8be876d79779e92d68e58b2ffdeb623161d61072f978f3e0b31d167fa4b85e63ae75a4caa75ab803a8f7e7de6be5ee753d9ff5f0b49fa443f3ba22030823b1514e14790ef5afd85803a0440c3ae9451e76be3f8996b4ca2775d769fbf12082bef3704859b238635459513e4710ad1d23fd79271dfb2990f9ab99489a5dd13ecb7c97dcb4ed4993973e8f65657adb31f427beafa12105e608ab8f66458b5abd45ba46ca479705014f1c067abecb5ffa77bc3ef752c46ee76f233251f1dc1d88c5f678cf0db4604693e0269fed7dab9ae97ad4bc5ec7803a1ab93eb18cb03b9537e13d677b339a2f8aa89bad8e71411f825acbb896d98cf44cc2f157aa26dd101cd23d875f0c83e29e6c865514f5863e7b989fc0ab066565e2cfa18927b0fbbdc2a1316633451f554bb2ca76d72e38cf155ff6a291b6bb864e7a87fd2a4d38f181a8c6a38275983f1dc06894d41cb455b77e98da6b45d040c0d699ad07d452b4edd824f9c2f54a326e5c117be729c17c6d07cdcf74b18793e9a2357699eb390a33304de5d58104d83f53a8ef6995da1ee5edaeb89b632286b7e449d4dd66a392fac7324bd4b6539ac1f3924b1f2b4d7c3e1a8420ba5ce87ffebde68c7a3222dfeaa6f513b1a3e5b4bc75c75c8e8b1d67bd3a9fa1bd6c6176e0e243754e79685622806f85167a3c23209902c2cdbbf3375be76f943117fceb9f15262ec90bc30f12ab855445631ba69cd4504d5f2de19299d18ad2b765efaef697ae38c29ab677c140bd56b9fd5078740ed491e87402ecec8af4f7ad46a92f978688bf3d34ee9a89c7bea239e8665385873578d27c70d2e5b2d0bf54e1e8e1481c8f4daa76e6bee19ff46f72e52ffea9a562c9abf3378415c3e897f33ae92be58b729020a087242be2ac9876ce698b3be08a13e17ed9ae47d3253d9a752547ccfa76acf88d472c6df966bcad4b3b7b8a5829550fc7abc209b907bce289807b10995d8e3d40ad0b6faf63ddd3f2c03cd850fb2e9c274f46dd64ce130edb33df6055bd62b960c9e8e35516538f07fff9b56f47a9f029aa5c7ee13011a71c6145cfb000484d277838f2a2b1b72b36184c08a690e5f928053acc51a3d718b34a8bc9cf25422a7cb6a78812a1988717ab838f1c369cb56d35a0f195fc1c1e39386a31b3c0614124093ace2af2702b477533d7333417307f5470f45580547cc6dcb21676dee09faf8c8da4223a2fcbd8c4864ecf72a34231b4625781609f75d84b11ce4a2f8a79a6b1f925462a1cdd139034ddaf024abf58709d8321843d4f3255b805c3deb4601a6f5a570d76a7b233b54208348f4ac9ace2feaa05d4d2027e8cfc5224063129627b999b2db2c9b22cbbefd7211445b7febc1a133d7ed78e5a85a9df0ec69419d63283762a4aa39513b47332094527f7947fafd6920eb2b6b28eb7ddfe44250f93bca524b12c05c7fab7233961fc20739ba4b75376c26b1414b51709ef320a171c08f0e1c264547afe680700912bb4cd47e474e128b45e04e98e8c66d39185151dc45721611a13975b5d590434768d1c355c65213ebf238827331449fe61fd22f48f661c79a9c5b8986d798667c43d0e8041265e2ff5f195bb87ba1efc08343ef9a876a314d7199dc550bf1fa2dc18fe7c939e831a3ed762864228bb666f407fadf2fa6442c4be26b585da3f3b3bb030d1ec540d27cccb899b14fe5f988139c1b06bc39e9f7446b7317c35a2b4edb12460e6915d84c5a6049b58a07b4ab234e53e23e7fdbfd5f5a6f8e6c18a6a21a812f38579569b67e419bb5b806ea8b53db43fc0eca93d4ebbfef22e190f075353ecbb55c55e2b6d0e8e4875c7bc96f0396021a61367b653965ed4518e68041ece326762e554afd57330aeddc85cbef3e5149730c8c9f87b436604e244fcad7c81afc07a43395272c22ff8a02c09057cc4b5956e4e07d3f6ea59a1733cbad9e35b26282e5bb8c051c17903233649aca9efbac428ca3800c87d09413f17d75598bda273999a0b9f30f653d5308273e0031d3d08b661c8758b691fd8ba1a5bef7ea0bfd31ee74fe597408403679b511d1bdb60bd5e9177475797a44e2163cdd13bc36b7612c244fe3fea1e02434a80d23f6757d65a0cd887a0a2b994d035507e95718d56dba70982fd2427fcb1eb84681e82c2824ddc87cd431a18cffe64b4fdf37fea963d6bf27d0f51398aee803e15387db56854f0f311f51f3a4a374de8d0dca7381d3cba51e68ee2f0e47e309c2f9938a564ebd9109e536a86e42110d1a2e5eb799446075ad7aa31f6f5bbc04240d28c146c659ff4655739bce61bda8e0625f05f594cc1c4ca3f0aff0eb87d2bece4fb782f180f1d1c15cbc0e20a23c8756076369e390af2ec5fcc6697cda5eb68dbaddb66cbbbfb26b3c751b02e34b6e96e2053996ed8a08799139153ec0319bdeda1944e3a3b60f8ab4fd9f17dee02155b2a5ba2e3bdc16c38ec532c09405fd50679bd13ecb5d71c18dcb06fc263ed5cea3ee3ea74de26165e0329fcbc8b9cc0be151f805040eace4023d9add6f027c0194f53afd65b045499cdb52dcd5dfc3637b42f555adb0b67c4c783b6bf91352cc75dde9bf9b174b9b7f9bb92ebb3979a05c1e55c05397926db34dbd6a5089bbdd7ac2b2add427577836c26e2648fb987df992a3a81ef44a893a823240fcbc79694bf476a32c4cb6173e68232add7707e3f8511066db37818609ddf509d21824abb1662db146dbff38f457a9daa66e2bc5a750d676602026e30c5d048dcca5268ea8a6e56a9040d6de8e2c0f2dd383933ad23b5c1e775ab9672f2b4048fa6ddfc1913c9c3aaf3fbb1ba2452fc28c69aac0415ef846c1bbd89e9412d9244e096f893a8ec56aef75507126cb2e0f13543f17a27479a4c3d54b2807edce317187a1a607ee83e679f26810fc5274149270e439b790cb1404da25bec3e1bd7909b2f37faa22a41189eda4a51e3c9c601406374931e3338a7d139155b718e8bc83c312d0c9217c1030fbb774b03308cc22970b93f992e7907650fb8919c3c2446198cac06c93068a6736d53facd3212a54de1ff1449279c5b26d5c081ae30ba7f96a84d2578a34dc0be9906fb51815d8139501b82607a4db4240c125e16299bad7c08c7a7d409546ec0daad9f27bb8c081f0a25f4fff7d3f59e6964a7a5c9dccc6b3e5f230c7d0283ac40eaa072016d81bb93c1f79142e2d3c70f117d7a075d20f13bfb223bb3288e5f081c564fd9fb372f4871a66e0fb812a91e08cf641de115a81eb111cdc0b572ecc5edc511d1c8e730d567bbf5cd237ac898d1d1e8b7a42f4c3d696df71bf06f02badb483f6b2417f07135b1b7b617f7efbbf32702538c29ef9c4db37708a717cee89719846d4b1664fcf0422b136801eedefc9b25b1077ceae98909934904d40bb9a98547c90a814350c461361f8a44b1da311a7d84f2a3da79a85df2e5214dd0df8dba3c411b6d1730ad0e0bd4a88739e5753bd62826651cf727c7ad8b588f299c907f84f98e2b6604e861d20e8a44b2696d56c34bca57d0b59ee43b692998c0ffdd4a2ad876b43de97ee43512ebb6fbc5a08880c29e8e03054ed85a6d574f92ba9f56f717b1c302ad967130a3192a90cd39e12698b6c58a9733fc14c5b9bc1f1707eb8f56fa194fdccbd5c78ea82a1d8338df7a15616fc42def7b85b87716767952f623e5e06bcaf8427e5c7b880c2c8ba31d76d1af04ade805de9e0e640e4df7ce5fdae344c26de01775fa1255e46b816816f5688464917f5c6e2b6a7a08286fedc2c266fb2f8a2d840216458a527767a5e8a11e59a6b17a4a668c7738291ffc2c15e4438532064f0cc6902b8cf286e63bfe49c809579e443d4026cdd8b843b030796c63ea50d6d637c1f62692be9fe22e2cbba83fa8b8130bb2913bb4feb206633a88d5f01738d0cae80bd8c54f6d81818b7be4580d5c8a0ff68883d2aa5002c0f109dd44d7df1f87ae52a7217c5ca418b67f93c52eccc9556a7b8511da053d6d609db3a1d5d0af8c32f3e8ba572584bfadb46b236558aeffd853c911"}) [ 1687.045847][T16174] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1687.047616][T16178] Call Trace: [ 1687.047624][T16178] dump_stack+0x137/0x19d [ 1687.061567][T16177] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1687.061973][T16178] should_fail+0x23c/0x250 [ 1687.066302][T16177] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1687.075614][T16178] ? getname_flags+0x84/0x3d0 [ 1687.080039][T16177] tc_dump_action: action bad kind 11:38:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1687.098166][T16182] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1687.098862][T16178] __should_failslab+0x81/0x90 [ 1687.114709][T16178] should_failslab+0x5/0x20 [ 1687.119274][T16178] kmem_cache_alloc+0x46/0x2f0 [ 1687.124036][T16178] getname_flags+0x84/0x3d0 [ 1687.128530][T16178] ? vfs_write+0x50c/0x770 [ 1687.132933][T16178] getname+0x15/0x20 [ 1687.136817][T16178] do_sys_openat2+0x5b/0x250 [ 1687.141404][T16178] __x64_sys_openat+0xef/0x110 11:38:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1687.144521][T16189] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.146153][T16178] do_syscall_64+0x4a/0x90 [ 1687.159352][T16191] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1687.161561][T16178] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1687.176719][T16189] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.178515][T16178] RIP: 0033:0x4196c4 [ 1687.178531][T16178] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1687.192632][T16184] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.193411][T16178] RSP: 002b:00007f6a5b60ced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1687.193438][T16178] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 1687.193449][T16178] RDX: 0000000000000002 RSI: 00007f6a5b60d000 RDI: 00000000ffffff9c 11:38:43 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1687.232882][T16195] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.240427][T16178] RBP: 00007f6a5b60d000 R08: 0000000000000000 R09: ffffffffffffffff [ 1687.249733][T16197] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.259558][T16178] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1687.259571][T16178] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 [ 1687.294920][T16201] FAULT_INJECTION: forcing a failure. [ 1687.294920][T16201] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1687.308023][T16201] CPU: 1 PID: 16201 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1687.309749][T16193] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.318162][T16201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1687.318174][T16201] Call Trace: 11:38:44 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1687.338617][T16188] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.339252][T16201] dump_stack+0x137/0x19d [ 1687.342618][T16204] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1687.353599][T16201] should_fail+0x23c/0x250 [ 1687.353623][T16201] should_fail_usercopy+0x16/0x20 [ 1687.369263][T16196] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.373421][T16201] strncpy_from_user+0x21/0x250 [ 1687.384459][T16205] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1687.389552][T16201] getname_flags+0xb8/0x3d0 [ 1687.410135][T16201] ? vfs_write+0x50c/0x770 [ 1687.414585][T16201] getname+0x15/0x20 [ 1687.418476][T16201] do_sys_openat2+0x5b/0x250 [ 1687.423145][T16201] __x64_sys_openat+0xef/0x110 [ 1687.427912][T16201] do_syscall_64+0x4a/0x90 [ 1687.432397][T16201] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1687.434884][T16211] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.438335][T16201] RIP: 0033:0x4196c4 [ 1687.438351][T16201] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1687.457568][T16214] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.472818][T16201] RSP: 002b:00007f6a5b60ced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1687.472837][T16201] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 11:38:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:44 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000040)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) fcntl$notify(r3, 0x402, 0x7) 11:38:44 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1687.472865][T16201] RDX: 0000000000000002 RSI: 00007f6a5b60d000 RDI: 00000000ffffff9c [ 1687.487410][T16212] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.492238][T16201] RBP: 00007f6a5b60d000 R08: 0000000000000000 R09: ffffffffffffffff [ 1687.492252][T16201] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1687.500997][T16213] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1687.508173][T16201] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 [ 1687.562875][T16216] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.574498][T16226] FAULT_INJECTION: forcing a failure. [ 1687.574498][T16226] name failslab, interval 1, probability 0, space 0, times 0 [ 1687.574650][T16210] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.587119][T16226] CPU: 0 PID: 16226 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1687.607990][T16224] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.608389][T16226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1687.624861][T16215] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.629421][T16226] Call Trace: [ 1687.629429][T16226] dump_stack+0x137/0x19d 11:38:44 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x18}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1687.647997][T16226] should_fail+0x23c/0x250 [ 1687.652470][T16226] ? __alloc_file+0x2e/0x1a0 [ 1687.657201][T16226] __should_failslab+0x81/0x90 [ 1687.659392][T16227] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1687.661959][T16226] should_failslab+0x5/0x20 [ 1687.677530][T16226] kmem_cache_alloc+0x46/0x2f0 [ 1687.682309][T16226] __alloc_file+0x2e/0x1a0 [ 1687.686729][T16226] alloc_empty_file+0xcd/0x1c0 [ 1687.691499][T16226] path_openat+0x6a/0x20b0 11:38:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1687.692957][T16233] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1687.695942][T16226] ? iov_iter_advance+0x291/0xe10 [ 1687.695964][T16226] ? shmem_write_end+0x37d/0x3d0 [ 1687.695984][T16226] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 1687.696080][T16226] ? generic_perform_write+0x332/0x3a0 [ 1687.696096][T16226] do_filp_open+0xd9/0x1f0 [ 1687.696109][T16226] ? __virt_addr_valid+0x15a/0x1a0 [ 1687.696124][T16226] ? __check_object_size+0x253/0x310 11:38:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1687.708343][T16234] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1687.712199][T16226] ? _find_next_bit+0x16a/0x190 [ 1687.712219][T16226] ? alloc_fd+0x388/0x3e0 [ 1687.739668][T16237] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1687.743596][T16226] do_sys_openat2+0xa3/0x250 [ 1687.743621][T16226] __x64_sys_openat+0xef/0x110 [ 1687.755662][T16238] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1687.759519][T16226] do_syscall_64+0x4a/0x90 11:38:44 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1687.759544][T16226] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1687.787455][T16241] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.795411][T16226] RIP: 0033:0x4196c4 [ 1687.795426][T16226] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1687.795441][T16226] RSP: 002b:00007f6a5b60ced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 11:38:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1687.795457][T16226] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 1687.795549][T16226] RDX: 0000000000000002 RSI: 00007f6a5b60d000 RDI: 00000000ffffff9c [ 1687.812316][T16243] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.816705][T16226] RBP: 00007f6a5b60d000 R08: 0000000000000000 R09: ffffffffffffffff [ 1687.816721][T16226] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1687.816732][T16226] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 11:38:44 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000000)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:44 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1687.818431][T16222] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1687.824594][T16245] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.840288][T16222] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1687.864461][T16247] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.864631][T16222] tc_dump_action: action bad kind [ 1687.891644][T16239] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.911040][T16251] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1687.920681][T16249] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1687.929232][T16251] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1687.929243][T16251] tc_dump_action: action bad kind [ 1687.979562][T16257] FAULT_INJECTION: forcing a failure. [ 1687.979562][T16257] name failslab, interval 1, probability 0, space 0, times 0 [ 1687.993301][T16252] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1688.003498][T16257] CPU: 0 PID: 16257 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1688.017207][T16259] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.024692][T16257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1688.045782][T16257] Call Trace: 11:38:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x26}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1688.047408][T16250] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.049057][T16257] dump_stack+0x137/0x19d [ 1688.064353][T16257] should_fail+0x23c/0x250 [ 1688.067066][T16260] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1688.068858][T16257] ? security_file_alloc+0x30/0x190 [ 1688.068878][T16257] __should_failslab+0x81/0x90 [ 1688.089975][T16257] should_failslab+0x5/0x20 11:38:44 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1688.090726][T16235] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.094496][T16257] kmem_cache_alloc+0x46/0x2f0 [ 1688.094518][T16257] security_file_alloc+0x30/0x190 [ 1688.111741][T16262] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.115268][T16257] __alloc_file+0x83/0x1a0 [ 1688.115289][T16257] alloc_empty_file+0xcd/0x1c0 [ 1688.115305][T16257] path_openat+0x6a/0x20b0 [ 1688.139829][T16257] ? iov_iter_advance+0x291/0xe10 [ 1688.144882][T16257] ? shmem_write_end+0x37d/0x3d0 11:38:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1688.147966][T16264] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1688.149813][T16257] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 1688.167321][T16257] ? generic_perform_write+0x332/0x3a0 [ 1688.172010][T16265] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.172822][T16257] do_filp_open+0xd9/0x1f0 [ 1688.172841][T16257] ? __virt_addr_valid+0x15a/0x1a0 11:38:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1688.190876][T16267] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1688.193449][T16257] ? __check_object_size+0x253/0x310 [ 1688.209851][T16257] ? _find_next_bit+0x16a/0x190 [ 1688.214712][T16257] ? alloc_fd+0x388/0x3e0 [ 1688.219065][T16257] do_sys_openat2+0xa3/0x250 [ 1688.220637][T16270] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.223682][T16257] __x64_sys_openat+0xef/0x110 [ 1688.223707][T16257] do_syscall_64+0x4a/0x90 11:38:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1688.240864][T16269] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.243874][T16257] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1688.260746][T16257] RIP: 0033:0x4196c4 [ 1688.264639][T16257] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1688.267367][T16273] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.284241][T16257] RSP: 002b:00007f6a5b60ced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1688.284266][T16257] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 1688.284276][T16257] RDX: 0000000000000002 RSI: 00007f6a5b60d000 RDI: 00000000ffffff9c [ 1688.284287][T16257] RBP: 00007f6a5b60d000 R08: 0000000000000000 R09: ffffffffffffffff [ 1688.284298][T16257] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1688.312403][T16271] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.319824][T16257] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 11:38:45 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:45 executing program 3: ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000040)="2009093889776d1b447c499e721aae7347fa67f8b9696f3bbebaf7800d80ebddad72168b272af608ae1564c87a879643f4fbf9877b81a2b9004b32fd") r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x2, 0x2, 0x80, 0x4}, {0x5, 0x5, 0x80, 0x2}, {0x0, 0x9, 0x1f, 0x80000000}, {0x6, 0x7, 0x3, 0x400}]}, 0x10) r2 = openat(r1, &(0x7f0000000b00)='./file0\x00', 0x4280, 0x143) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000005000), 0x3, 0x30001) getresgid(&(0x7f0000005040)=0x0, &(0x7f0000005080), &(0x7f00000050c0)) r6 = getpid() r7 = gettid() rt_sigqueueinfo(r7, 0x3c, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000005100)={{{@in=@broadcast, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6}}, &(0x7f0000005200)=0xe8) fstat(r3, &(0x7f0000005240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005400)={&(0x7f0000000900)=@proc={0x10, 0x0, 0x25dfdbfb, 0x48811000}, 0xc, &(0x7f0000000f40)=[{&(0x7f0000000940)={0x148, 0x2f, 0x8, 0x70bd2d, 0x25dfdbfb, "", [@generic="d587ac808877da2e1147af95dbd9400d652a2cd4f6", @generic="33f59a77145b1a5a58bcb1019eea1a5a3d66534c61d1a9e175b823e3527f5e44b0c1a7799c6bd9fdf5d61eb75b596c951184ebe23c791000008b30cb07055840956e5c1e036b607f1ca9ad572bfdb93706b33e9b12ac955c5e", @generic="eb7d93b8d6ee112238b129f6127fe6c3b27836a8afe1a5e7cba4599159ccde41a3488043f435438496522caedc5f8734596b391b055f1ca67e2a35d4fe0c50708e7a81d7e9a8c2dd5e211aaef8c12c7a1031e7b8c0dd0f13fda2897b8c178d7ddd34118e761cf8025d98b94bfbf41b7c476cd7a528154d0118a168bd776924527d67fe30a33090a321fde436b88b93f6", @generic="b499b5a2c4d56b3e9151cb7f74a50f8bc566e93b996d9b9ed56b0192a90644188e38d453e7083ad5cd3606c7aac9e29eebcf427f7309cbd06d"]}, 0x148}, {&(0x7f0000000ac0)={0x10, 0x3c, 0x8, 0x70bd2d, 0x25dfdbfb}, 0x10}, {&(0x7f0000001180)={0x1178, 0x20, 0x8, 0x70bd2c, 0x25dfdbfe, "", [@generic="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", @nested={0x160, 0x1a, 0x0, 0x1, [@generic="e37bd0030909418d4bd751b4efd7dedcf266b404c08d885a6e1df805a6c343cdf874e8e78cda403907bd8bc55deaa2f0e416ba5963452d5c1ff42563f4e83b3278c79caef6a399482fdc621d138ec4f4cbd0d2818e436dbca411e6dc242ad1f11f9e83490059a9ff951e05ebf9b13a5a55d687dc4dd94860c44161fc6f1a506fb16bbf567fb778f347eb44a331af0f4aefd29ceaaf271937749f77f607c3971de3172ec1be16519e43e286bfc2fe3838c1c2c6d837a61930f52f51968ea0906a920b634239c93907aa76905fa526f34f9adc13aa29b348dc5906903e8245a8fec441e177a36aa426ac7c59a46ced5ce065", @generic="c9805bae8e18de34f49d64dbf9bc93", @generic="96704f30308783ae19b15df90f46f4db4884ff18509793abbfa12e98d67ef9926a46f7903fa9b79a4ddfd5b9f9246c8fff8e67675c60c0149e0d1ac32c900d61311514af678af2dd", @typed={0x14, 0x1a, 0x0, 0x0, @ipv6=@empty}]}, @typed={0x8, 0x33, 0x0, 0x0, @fd}]}, 0x1178}, {&(0x7f0000002300)={0x12a4, 0x3b, 0x8, 0x70bd27, 0x25dfdbfe, "", [@typed={0x8, 0x67, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x34}}, @typed={0x8, 0x82, 0x0, 0x0, @u32=0x794}, @nested={0x127a, 0x66, 0x0, 0x1, [@generic="90d1e8089053b380df5be4b3e11d9148e4db15c52733a2dd94194c1dbcb4a90b1de3d5d223163450136552445d3a94d5cba06e8c4d9d581c98aa18009cc27c92340d6af8d3614e6a35f7679c83fa5d09e14e7bae3f61337d34069a57bae09ce38444061a69b74aebfdb870162c9092ac6c7b5f3ed6cff205e9b516dbe004148a91c25ea1", @typed={0x8, 0x7b, 0x0, 0x0, @pid}, @generic="d21b5e3ea47bc50f57a7006fbc85df26e7bb4c1dd6b060e1188c3c754b39df336ef2384ca453f2fb9859b87acb848c67a07208a2598b92b01b5d5ba9e4359e7c2f4748171d0a7f7919dce7c9fcbe0cf1e290f6b8cce83b54bd744a2394e470860b9cb94ef6e22bf9104efe714a4f99bd602c9aab1117d874b6e72185ecf3ae586b7766ffba8a91a7645587e1aa1c3a92f15281d61cba5b428c4c260581f34798ede6b91099acb91c19339d31be5996591720c2b68199eb884de514549aade85fd3acde50c8b1de944483d51bac360c7647581c", @typed={0x8, 0x78, 0x0, 0x0, @u32=0xf99}, @typed={0x8, 0x56, 0x0, 0x0, @uid=0xee01}, @typed={0x8, 0x37, 0x0, 0x0, @ipv4=@private=0xa010102}, @typed={0x8, 0x7a, 0x0, 0x0, @uid}, @typed={0x4, 0x44}, @generic="7dee8fe8ea05e8074fe2b0b25ff93200bd31012758cdad9421118ea9a1a20dea6792e1429bd2072637ba3f965fbbe397e85f7a925250a357b536870083168290201e28a8aed65dbcd5db0c64086c108759a4ea467a5025294b8c8e0c5f63748bc46d98396787ffe3102e8a3e01439ed04dc4595983cae38ef2bacc20859e7690a737eeca985bab0066af990f8e6dedd776a6b589f49f8c3b2986b9b8d210e5546fd80a8926e6cebbca89540c85f2a24ef8f57c3d80afaab6635e115c458f56e34023ca3124c3c902c8b3668b4efc63f32286192fe809f0f5ba56f38cb6c48fcebd49a602d6586b31fd371014d6c19fced66eaea22742b155c5810e915bac084c4e7d3457c81d15873cea65fc5a8b2ca2db0d1f9810a22c47fa585739cef5362c7499da63dea7f72a964baf290b727805f00aa00dcc857055f2591a6e4409f96f137eed6fb484b93e1fa4f19bfa46e2c4773a10251de6e17a94312c8991be0806c89d8bec12545c73911a6d01de59656a13473abc7d65606e5ab41106d5a5f3be9e5b9dfc1ea851675ce0fa886daf3ed8686c8ce633e93eb34efb05d7dd7f8977bdcc7962765d9de14b5691a2189a0d303c7b2bc2f63d9ed67a211127ef67ec00a7254f9da524344d7460a116f8a1dfc9e847f9e049255450dc9157f680b4639260843aec28b9b9bada66c521c07db3fb142041b6f61f4f0e98e658088fe47a0982dbde76471fe1407b5e5202c1b73e6a67596f5e037f5b843c18b546de3a85a0cdbdb54f50f9c152ea3c304cb2ee3a9ee39176430d08754172d62e2daa26762b108fd3a32026b92501f370c9ab96f77ad930a5e121dfda2901a2a3f7f418395fb30623fb2b05ed305c45e38c83c4bfc538c9c4e4babfe97d8420c40fa3ec43cdfcf58ad68e848c9828994a70c2b83ddc1e19eef04cc1ff069de3e17d9ef03f5ef691143bbd91a5138f5a600d44ed06e31ba712f4b39c86e86dda62f1068d25d29dd5b49349f620ae04045f136a8d383ac5007ed36788b32707418127b46e328701d711913cf526ba0075a1e5646e8bd939160e2e8cb5f5e240931e9732a6d223d31fa9689cc5da1997ecf2defa323272ffff185e26f2d6449e8dbb9792179a7e8e328a9321cd822337a3a30442422da826e7ec9e5941ef7ca9dec8e61142bdf8e789934c9b7839737983ea04ef4af44c9abf32fbe5d27c7ea70f84cc76b4e345f70d886dfe36671614679ffd8220ba146cd29e339d584de889b47eb182b9f1335f122da28bb2ea80c8334ad0821cf134d79d02575bffd97ef142088f79bb27515a0b88a37405001eab8f7fdbc481b5b69807b631219e0c3a44bbe4f2cb4cf3cf80a79425480f0f1803dbdb414a6bf73919d89132f9a9647a63150b35b95e4cd69663fc9c7bb9f00f0702c9eed6f2469bf38dbd457b7aa874b6054d7e65ede548a5b279858c29974038d23537323fd70f9fffe1a0a53a9b553ba913e245e732d9984f9cbe835b3f4aa540a3b33971e182c58812d4b9761e5fb58f9a24b8a5d58e2c61d4155712fbc9e26fff8964c43dd118293f896ceb87d159d18c79e86953772878357a1bc712f7ddf9124583b41e4a9f666c8bed59baa32ecaad7e3808c188d22222ef2d5eaa3824b90031a0bc57d5c4d6553aaa01f35c56f761f4f7f84801c3aa41237d1524da71620cb3257035018100edaa824f2f02c14f8674f4fde068bdbc02e1370ecf687f284867b68a112b98448b4ee4318c9438c8eb7f2e8e38f42ea4ae20b685428c14ae85cdedf63a6bf08453495e7bc08ef3e87f68de16513d2c07c97ad6218e37cf1612916b6cd100f0b8a62c211312051b9bc33bc5571174e453932a96c5e8a0599bbd7e6f7e22f8da162304463682478b266758226cf8e259d71a4fcadf301ed45675fe92447f0ea53a8f60cb4df43c5c0106312f37e711f0c291dc4f47051fbd4caf86ac1bdc537640d75c6cf10cb1859991a45d1d32ad7d2af98e59707df246d1cef0c066b0e76fbfc07c311cda5416eda012735db43e5f5722f1b3e3746ce041fb503eeb44e2c1f6a626f5fa93cbeaf62e826709b62d0e096eece0e965436a614d0995ae114d3b5cef9f3985f6581dfedaca20a8bd703ec6e71600cfb155c782996d9c20c20f9131fb0a1f8f0333ce1c3dff89144795777927c84e5f9a6b1d72c443e993ccea44e239ea18e25bd3f3b308dedd5f3b51a784ddef3c302b15e1f6dd0da7bc912b4d75868cd4fa404cb564d076ddbc55b85bd6b39ebd3746894955143e4b6808ec70161c95c97254e72322d5dbec778d25c11ec01c89638d2d0f9239387107468610d1623616ea9c40c9d12ef56edef474a213fe5bb7ac3cb1f1294dcb163fa0f8368ffeb30477cf3282e1f6869695f4dd4943d4188e2ce5bdc3167705d7b02ecc689fe18fdc3ab5cd3e6cbbe4ba92636c5af670c1ee08f271c5fc3cb236865456937b945c459b8d940d17df85115637e36f5d4b1cfee4bd1b121d2f7a87777d824693019217f42b084c29779065e42285bad254791f43697596dacf6370bf15c8966423aa177d615cbba4e6b840cafc8aa646c471f9e74bdafb3c1bbf68ef8bd49633d3c221c8c464decc760b9bdfb0bfd0fb953c12168754fa3b32bd6c1828453dae1f111a7ec53972c9bdf3549ca534f33991f3b757aa24fd36b34147bd787edd674be12f9b68a8c9d2cdfe90837b2adaa4fcf8fcff8af5db864f9e7490d7ce8ac51745923af4c8d859816f380f21f9cf51dec9923595a489f7df88cb15a39918d9a3a065836942beca47a73cbfc11e8ff97b30d6e15a731aeef367ff96e5d9ad3253dcb3fbb9770a57a19acf6934d1808d0aeeccc38ed466dc089febc23ea6a230d97d39d939d309b230a3d83bb6ddda6984b4768b610c49487ab57caac6e37b60f94973b30f536cc55d376c27ec24d1045003947dc1ccbd08ad7c67521738e696e6fef6f04068d8d6063b672660c99a7e49d391d31e8ce77739122c5eef41f0cb06b5cb164a5570373abbd2b4ad9fbe65776e71b5eae3ab360da7872186ea172d24aad5122a9ed7061491a0830f2003bb5787125bb1499fa6e075ba22aec9a06030d1f33c4b405aacfc2d5bc94832a53e64d57cd8c33d1dec97ccd740fb9210ece6a83ce71cb9c65ed2cc00583b64b8d8f52d03f3b178d4f803b8ae8245d2f0f130921b7222234448e36146f40b88edac8d0a88efadaba05723b7d970616a617f400e659cf510b55c639e35e09f87ea774968a91e96fde980b7075307081e7cbbf861ef2b599f78052d3448df1721d9ec22e8516524d450a87793bdc07d80a06661969f2111cfe39d8ebfd29e36879632b2e4e3b30c528608518db3e5a9a75d9b1061c8bddb6ab65e089ff64ee3aa14454425f8358be030409aab7ae77c4403e10f8fecd311a58792ee4e7183ab2d30dc9e1e9121ed26daf3c57d812c57a653d67d7850d7bf8f1616b27c556be17ec5359d42e87a91467b8c696945830e86e1c54f7f5342113507dbe0ec697d74efcba2df9d00e60b1aef7a9f1a8979d619cc03b924c86c9c7a4ba2f6933b2aac2076ede92c92a568fda994e657f11dc3964e04f21f447cb7850422c65bc7fb6931bb3f48d344fb407f0894e42eb4d87ab8608d18afec136055c73127f3c615269718f7ebcf43499e748d6b6c2ccb2db9c5542dc8d6e30bdd2f2cf14347fcf192fd0daa542d592ef577abeb3c7a811145d9b870afebbd1c871504b7ab29c96ac28310e25086ec29c925b33014844abd315f0a0e8eb8d90889f7a68e7707d2660b4e4954e5a40cae9fcfae340e55a189bc92c316da940ed28ac6fce12e2ca4e1f5f2249daa0f4b6e64a7075028deda44add24acbea685832d0017db6483b1df322cdeb5833c1343e25bd6b1482670df0678c1cf04cb5b02a85e320030c409d9999d9d4238acc807ab63c212b17b1b5eaf34d81a7bedd69dee6c3aaa5c142213a4f68d4b3da6ff808bad5729cee9e9bc28d7a1ea2e884bb61b407dedb60e487ef3d329056ba1ca39d8b354dcbead5760ce71689488a0742656ce2bc71ccb321d7b6a672e13851c590b67d874fa91cb75e5bf37c4eb9baca4f3eaad30f8a725b21982f5102d8590a53197195bcbeff30d2893e3e09433fb146c8412ae0655c6462df0b4b2df6e01dfedddaa01d2134c84fe6acb5aaeb85c61d7e826c3cf3e1f4d71152c576fbbd481a2411ce4d6ee2124d88538e34fe72cc26d91a050fef1f2cbeeec1178ff1e39ee41301411861c2239a3726aefae8209446e3ac505a63f4ebb91d9868bb0eded79d515fd6e5818d6cf53fedb0529bdaa33f09cc52d3a86c1c9769b8821ee9a657fa246150140e06c530c1302d24322eb1093ec2b05289581c10b2591cfd40e86bc67ba4817df6ea5e5d090a364a7b83893f18d7d7445e2600232d5e0373751cadaa631677a3c9bed0e46d04ab64017dce7d15bb9f4dab701821901732c422fdb50bce473fb83d3e4ad5d9f9bd6ab1c56d6ba9e1a2bdb08514566aa1362ad9868950ba56ad970d318a1e2833381403daebfa2e09cce3641e265a4df45609d845b3bb952a6ea9b775f239b1cac27562b8dacf3029c87a77384cd4d09935dfbaeb9b954c8c4b1a933add5e1ef9d0a647cbec27dcb98fb92033292fe8807b949ff4ce331692e05faf047ea74ce0af43501cb061634d400512256f62e7638b5a61e74907e6101c7bb283b1ca6ab4846d8742d927fba11798502cf9e7fdac8961e5676cd7c7aad733ba9748839dce4a69b2f013f0a99ba88dbe9384f837dd2dc016fbfd3f7b3903eff61410f370af05c250defa936e0dbc38e5ebf9204d41b785d3f985895288588eec4733a69baeb91b49dd5e6a12ac23a09dc42e88086a4f78865462f9a0f6ac8d932691fc6df3eac0311becf63377c87a4a2e0841c49a157066c96aa178b55975001b7d824dc9430fc4a294f2666839f81b12978b6903cc9acf6c0cf440c5e58779a70ad5130ea3791e6c3263d7776cb177f89cbc696926c68665c9c9017dd7b0ede8830fdb9d2b661965124cb682cfd440a4dc90f91257aa019837d473329bafe72572f7b5769889cc2d0e2221ec1f0c9bdf419f8c824375512526ed293dba795a73c6310eaba7718179ad4f8317043a28a650661c058a5847898e64508081291b2b89c3e5e730c99bb93a070cce0dab5b13ac7aacf3ceee69a8d81ef4be21ca3eab1bba517a66eab38503c44c03dbe1e60857e500b8acfa03b4a4da0e932a198bfb2237923eb4cafb0f947ad0773b0bb39349bf5a71665fdcdec64f0caa1b91391b1376466ffe16ed3546805c180304e6193c0e99808e650d79ad6339a620763766e87084266d7e5f3cd7b5d6e383950d8dfe75774a397c00a8bdedba840e7ae20216c5f0a17e2aa07160f7d3cd613bcf1342d00432a703abcc21a876252c864933dd8d5abb87b963db6767fd3cac12e834fa4291eb55537568c35aaf6d07b347783d5f995c288b403d4d03a7b8f6daac83a3aeb1893f466650adc3e26476b43ea74e9d47cb49da75f8ebf2b29085944e8a8e7027714292b0e4c021172949bf2e0ddd172e3060553143cfd4c00c5671f738921867dbdc4c511f5cca6e233695782f8cf5b44a215feb16a44d76b621e9ac0ff35a15bfffcac5f94f10b4d3673220c487b96e5f33b63dd771345dc8e2007c323b60b8fef5d11073be9908b4a6ef4b1abfd8bd539bd7436ce3bf105c46be3b66eff0dbd49ff3d3c23577ac837016bb9e8a6c68610a6a98ec9ef06482fe59a8eb43da5f05", @generic="0b12d9ad2c4361574c95909947426ba540be8710af1e4899e0be4790275656266fd0a82de3c426baf30a0d51356474bfa7cb9ad11b1e7eabe335a7c9c023aef00a074f807e69e4c22f937e4cdcef59ab789c6346b138b6581b3747af9e764a72adcc5f244d406cb9c18243e7bffb0ec0bf07e20e3736e49f70ad699972a6b27b5730f9117a85b1e5bd69a0c40e4c5ec6ff6fdfe1735d5f3cc995a8fb3fa369e9797bf4cdf7df3d1435d3d94246899a8300005cdec17ec345cd3f33ad3c4e9d5f16f566f37e9321ab97ed8ddb1ee8a95714370a9ce3968df8a3ffc090694d9f8ce747f2533b76d2b95d9e812f8f9f9b03683d06"]}, @typed={0x8, 0x8a, 0x0, 0x0, @uid=0xee01}]}, 0x12a4}, {&(0x7f0000000b40)={0x10, 0x10, 0x4, 0x70bd26, 0x25dfdbfd}, 0x10}, {&(0x7f0000000b80)={0x2d0, 0x10, 0x10, 0x70bd2c, 0x25dfdbfd, "", [@generic="4848eac3205102da1de1ba38f705ff97b1f3e09a25cc201389733782ea36a891033657d926", @nested={0x296, 0x1, 0x0, 0x1, [@generic="768319b64f15eb7d5dddcf46c5c1fde7f0c85bd7b108553235886c1a2a0454b3ae73c3514457289c068a66dc7444191961d56c2d85538c2ec7a2a6fb4a84d83a7f442218862881add022e46d640e927fe02feab6734af08a593eb05468b76a3ac8b3dea62ed3790ebd8598b40ab2c839", @typed={0x8, 0x34, 0x0, 0x0, @u32=0x9}, @typed={0xc, 0x33, 0x0, 0x0, @u64}, @generic="ba9399727d80916ab01c1a87402f2c73d8d39423989f7c443b6c1782ac00f0bcc913b45574ef61bc9e722c180df27878c976d12afcc733703e25d1e362f54951ba6df9081d393eecc59c082b5a2cdecf322aaf07604311858d9599dff35f86dbe45431c3a7bcd062a97e39b85a8d7e48f78342ad5ff8191cabc1554893b1d218421eebd26e94976192849907e870eef1f718db561aec1861c907b8f7195dff2c4bd709027c0e81b73dd2167bea8f8cc62e34907ac6bf45ef49e68eba4593", @generic="263050bc0c201d7d8c7de00ac00ed71028fc31f9fcd647c2df7462b51630393893c01a8c32b5d8522d93f3ae1bb2b2312503b587b23859b585fafacac9dc6695b057b258195f7d27656c0a93afe515b4218618059e2c29583df83870e98641aae36f78ba25981f44fbfd81d04b8cd803bb66efcb47a9bf5a1fa1bcb7a8f6e0b5cf65b9b92172", @typed={0x4, 0x64}, @typed={0x8, 0x46, 0x0, 0x0, @fd=r0}, @generic="a5e0bda6c28c4345d97edd8263e9fd6b52b4ecec375e10217c6d9e0ff32531acd3842d19e0faf8cd4fadc93dcc686f16590ab8cde1f2ac903ff3d235bc1053e41d6160b8acd7b483cc4d5e607d3afef9b860cfd54dd3c3b566dbf8d062daef60f9f35d15cbcdb6091c133d76463c396afeedc4523fddf2b1d632e8d905862b315eb3dd0978b768c4a4fc8ad7184228393f3e2fa2d80cc77d871e5eab5641b579dbffb0d07ed205482188ae367f3306ea826295c97a9c138f14006b95d008"]}]}, 0x2d0}, {&(0x7f0000000e80)={0x68, 0x41, 0x800, 0x70bd29, 0x25dfdbff, "", [@generic="780e61d0151d3c4959a7a9bcd46a09a3f89b671526a409f93b26d786f9aec05f1768d6279674cd1febf0c5b3ffb4cff912f83f52c27dff0fec3232f6534bb909c4e005f929d689ebf23fc80bbb59a1eaf855117cd6"]}, 0x68}, {&(0x7f00000035c0)={0x155c, 0x35, 0x1, 0x70bd2b, 0x25dfdbfe, "", [@generic="67207e2107390b61a2369a8830da510cace91ea6305af40b0cba49a6a97c9fce4c3aff0fe4dbd39afc8287cb3bafcbe3a9ee0e3ff3f29f8dfa656cd423d5b7940f7b068c5327c3e0761254aa8d67998dabbcafd9711687a5c3c18e6b16116bfece47b9fef28c5424670fdf75d43aaaeba03cfd9c8eccded7ba4a4d105bc6d4e4eacde06b9d75a8a1354b4cebb4cbfc", @nested={0x136, 0x7f, 0x0, 0x1, [@typed={0x8, 0x30, 0x0, 0x0, @pid}, @typed={0x8, 0x72, 0x0, 0x0, @ipv4=@multicast1}, @generic="101db578035b697fd997d413f50f79109e4f5503ca5322fe3efc0b1429669dbda120b73fba58f8822c2d936f0dfbf5b6c615ecd7edc61fefb1b4a2a92adc792a8255e9d7658502", @generic="c8b92f5abdccee51370e45a2e20b04a45d158f22d1e641fccd794af811cc6107c78f3ad42aa1a24aee7c1678cb7854f12ca5b44f68bde7400bd77b23cb4f47d7bdef5b1e18acd75983e16edc83c752207b4146e8a17d501cff69a48c12b46077809821d75938cc1b87120cbe003b2cf752112b611e53c6ec811d88150323bafe3d8b9754c6c7c38a78e174a4f9aec6afe8e065ed24f87b4884db918e67b8a10827478fabf0db31e1130c8030308d08c0b649c6d2df420e531fbb29b092476d", @typed={0x8, 0x8c, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x2, 0x0, 0x0, @ipv4=@local}, @typed={0xc, 0x3f, 0x0, 0x0, @u64=0x5}]}, @typed={0x4, 0x59}, @generic, @generic="5074d5c72a3802c6efb9dab16fac804aee60234078993656beae22f6941bfbbdcae7c0b81304cd2602f1c0e54b5000e5ecd2ac22e8d3d11fafcc21b79777778e6303747a55b9cb72204970ea9bc9240a67c1a36090e4bcd2b3c3b1dbce187cce5cc9e9874abc6da96c833be2c780d5d79b68c1111ba3db0ec6f3d599f79dce1eaa95702cc809f5c247f9a3f76b779c7e579af4e801f82071a725fa340f7b", @nested={0x1d2, 0x2c, 0x0, 0x1, [@generic="d5fac2024630b05bc57f22bde12c28c6293ca71aedf9f35bb8c53f5f2644d7dafed59d8618d6ad24b635b21404e9f200d8f7af8ac1d5d2f0743b1abd8235462ef52bb6cfa45db063c24066eb01d467daf0b170d527168d2ae93da2723e7589b0cab347152c54c8773030aa129a9b03aee92b7f4bcfa0f22b776376d73361d2d7889351bc1b750aa218b19631fab972ffbcdb021715d1c3c07242d78586c259f6fe31c2f9cc773b68f97d68da8a3ad979cba868b87542750646439be96130c952d4adb559799cd614e299171e7470fbbd100c682320c6177e3adc94f7cc3b6ba82402b4850e29811094", @typed={0xa, 0xb, 0x0, 0x0, @str='!([+]\x00'}, @typed={0x14, 0x46, 0x0, 0x0, @ipv6=@mcast2}, @generic="ba4fb4343e5328488f6e066e167c71bce8f95d64d06e2ec59d611191b722c8afe379c3ecc957eefdef2ad345b1637fdcf4bcc6a97dd5dae607e8b1b8693094f3cd6facb81e2eadcff37e2847d1b7db7c850f8fce264ff38af739d88329928ccf8cf3ce4f270ea9a8f099eadc04b759a698643e85e5f562be462c9a8586f1062d7e8268cc457d75cdf75ee625f9c185be5b75f69a7c6bf70340614a414c0293327f2fc943148be87728b3a6d565b67edf79f2a70f52c0e6efa87224605c8f27e7673d206631"]}, @nested={0x1104, 0x27, 0x0, 0x1, [@typed={0xc, 0x7, 0x0, 0x0, @u64=0x8000}, @generic="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", @typed={0x8, 0x38, 0x0, 0x0, @fd}, @generic="548e3494dcc4dd3220bab49d2ed972106ff585fff18e7db55867ee02951bd9777c4f4f7017e66ab3250e88a7cf162fd3a232618858abe0f531da0d22488650a421134056a36a0ff3282e536ecb2205a8b1a201bed44a907f44544cc4d81c5bf9c0e3a58d4004466d92fb3bde895a422f4b01cbe3bb4a6d9eb6967eb759f44507be96da9b52", @generic="ced9127d2e4d936da5974debcb57b986120d4f056faf60f0dabbf8ecb88929ddac18c83b4511382fd2d6d93dad88059ef5752f15b59a700394b9918e17d197888acc33574c48e6bb804b34", @typed={0x7, 0x88, 0x0, 0x0, @str='][\x00'}, @typed={0x11, 0xf, 0x0, 0x0, @str='/dev/usbmon#\x00'}]}, @typed={0x8, 0x1f, 0x0, 0x0, @pid}, @generic="7f95"]}, 0x155c}], 0x8, &(0x7f00000052c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r3, 0xffffffffffffffff, r2, 0xffffffffffffffff, r4, r0, r3]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r5}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}], 0x130, 0x400880c}, 0xc0) sendmsg$netlink(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r3, 0x70c8a000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1688.320695][T16254] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1688.339031][T16279] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.346874][T16254] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1688.346887][T16254] tc_dump_action: action bad kind [ 1688.351724][T16281] tc_dump_action: action bad kind 11:38:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1688.357418][T16282] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.422140][T16286] FAULT_INJECTION: forcing a failure. [ 1688.422140][T16286] name failslab, interval 1, probability 0, space 0, times 0 [ 1688.434132][T16280] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:45 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1688.434771][T16286] CPU: 0 PID: 16286 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1688.434790][T16286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1688.434840][T16286] Call Trace: [ 1688.434847][T16286] dump_stack+0x137/0x19d [ 1688.434864][T16286] should_fail+0x23c/0x250 [ 1688.434878][T16286] ? loop_set_status_from_info+0x3a0/0x3a0 [ 1688.434893][T16286] __should_failslab+0x81/0x90 [ 1688.434910][T16286] ? __kthread_create_on_node+0x7a/0x290 [ 1688.447612][T16274] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.456131][T16286] should_failslab+0x5/0x20 [ 1688.494876][T16287] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.505328][T16286] kmem_cache_alloc_trace+0x49/0x310 [ 1688.519909][T16276] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1688.520865][T16286] ? loop_set_status_from_info+0x3a0/0x3a0 [ 1688.535058][T16293] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:45 executing program 3: poll(&(0x7f0000000240)=[{}], 0x1, 0x81) r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1688.537216][T16286] __kthread_create_on_node+0x7a/0x290 [ 1688.550524][T16297] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.554002][T16286] ? __cond_resched+0x11/0x40 [ 1688.554023][T16286] ? __blkdev_get+0x8c/0x6c0 [ 1688.561183][T16294] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.570490][T16286] ? loop_set_status_from_info+0x3a0/0x3a0 11:38:45 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:45 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1688.590671][T16298] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.590745][T16286] kthread_create_on_node+0x72/0xa0 [ 1688.596943][T16296] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.607521][T16286] loop_configure+0x597/0xcb0 [ 1688.628390][T16286] ? mntput+0x45/0x70 [ 1688.632441][T16286] lo_ioctl+0x555/0x11f0 [ 1688.636694][T16286] ? path_openat+0x19ab/0x20b0 [ 1688.641448][T16286] ? putname+0xa5/0xc0 [ 1688.645513][T16286] ? ___cache_free+0x3c/0x300 11:38:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1688.647979][T16304] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.650183][T16286] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1688.650206][T16286] ? selinux_file_ioctl+0x8e0/0x970 [ 1688.661973][T16305] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.666548][T16286] ? lo_release+0x120/0x120 [ 1688.666615][T16286] blkdev_ioctl+0x1d0/0x3c0 [ 1688.691939][T16286] block_ioctl+0x6d/0x80 [ 1688.696256][T16286] ? blkdev_iopoll+0x70/0x70 [ 1688.700893][T16286] __se_sys_ioctl+0xcb/0x140 11:38:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1688.705533][T16286] __x64_sys_ioctl+0x3f/0x50 [ 1688.710171][T16286] do_syscall_64+0x4a/0x90 [ 1688.714663][T16286] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1688.720608][T16286] RIP: 0033:0x466397 [ 1688.724491][T16286] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1688.729116][T16308] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:45 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1688.744084][T16286] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1688.744124][T16286] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1688.757674][T16314] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.763496][T16286] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1688.763510][T16286] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1688.763521][T16286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1688.763532][T16286] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 [ 1688.792700][T16317] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.831582][T16318] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.832413][T16323] FAULT_INJECTION: forcing a failure. [ 1688.832413][T16323] name failslab, interval 1, probability 0, space 0, times 0 [ 1688.844447][T16313] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1688.855214][T16323] CPU: 1 PID: 16323 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1688.866559][T16310] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.876427][T16323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1688.876456][T16323] Call Trace: [ 1688.876463][T16323] dump_stack+0x137/0x19d [ 1688.889613][T16325] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.897490][T16323] should_fail+0x23c/0x250 [ 1688.897511][T16323] ? __kernfs_new_node+0x6a/0x330 [ 1688.897537][T16323] __should_failslab+0x81/0x90 [ 1688.906622][T16326] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.916096][T16323] should_failslab+0x5/0x20 [ 1688.916121][T16323] kmem_cache_alloc+0x46/0x2f0 11:38:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:45 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xd9f, 0x0) r2 = dup(r0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000000c0)=""/59, 0x3b}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) faccessat2(r3, &(0x7f0000000040)='./file0\x00', 0x0, 0x1080) 11:38:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:45 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1688.929434][T16328] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1688.930300][T16323] ? kvm_sched_clock_read+0xd/0x20 [ 1688.965348][T16315] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1688.966684][T16323] __kernfs_new_node+0x6a/0x330 [ 1688.982522][T16323] ? select_task_rq_fair+0x186/0xc00 [ 1688.987888][T16323] ? rb_insert_color+0x7e/0x310 [ 1688.992725][T16323] kernfs_create_dir_ns+0x5e/0x140 [ 1688.997905][T16323] internal_create_group+0x138/0x850 [ 1689.003195][T16323] ? check_preempt_wakeup+0x1bb/0x360 [ 1689.008567][T16323] sysfs_create_group+0x1b/0x20 [ 1689.013481][T16323] loop_configure+0xa21/0xcb0 [ 1689.018188][T16323] lo_ioctl+0x555/0x11f0 [ 1689.022455][T16323] ? path_openat+0x19ab/0x20b0 [ 1689.024516][T16335] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1689.027288][T16323] ? putname+0xa5/0xc0 [ 1689.027307][T16323] ? ___cache_free+0x3c/0x300 [ 1689.047265][T16323] ? blkdev_common_ioctl+0x9c3/0x1040 11:38:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:45 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1689.050435][T16339] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.052668][T16323] ? selinux_file_ioctl+0x8e0/0x970 [ 1689.052687][T16323] ? lo_release+0x120/0x120 [ 1689.052700][T16323] blkdev_ioctl+0x1d0/0x3c0 [ 1689.065871][T16337] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.068859][T16323] block_ioctl+0x6d/0x80 [ 1689.068882][T16323] ? blkdev_iopoll+0x70/0x70 11:38:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1689.075001][T16336] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1689.077833][T16323] __se_sys_ioctl+0xcb/0x140 [ 1689.105246][T16340] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.108764][T16323] __x64_sys_ioctl+0x3f/0x50 [ 1689.108788][T16323] do_syscall_64+0x4a/0x90 [ 1689.124944][T16338] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.128908][T16323] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1689.139758][T16343] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.144291][T16323] RIP: 0033:0x466397 [ 1689.165053][T16323] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1689.184673][T16323] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1689.188150][T16351] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:45 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1689.193151][T16323] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1689.193165][T16323] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1689.193177][T16323] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1689.207421][T16349] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1689.212114][T16323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1689.212125][T16323] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 11:38:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1689.212188][T16323] loop1: detected capacity change from 0 to 136 [ 1689.221276][T16353] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1689.273316][T16352] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.293612][T16360] FAULT_INJECTION: forcing a failure. [ 1689.293612][T16360] name failslab, interval 1, probability 0, space 0, times 0 [ 1689.298463][T16350] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.306222][T16360] CPU: 0 PID: 16360 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1689.327465][T16360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1689.337514][T16360] Call Trace: [ 1689.338861][T16354] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.340850][T16360] dump_stack+0x137/0x19d 11:38:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1689.340874][T16360] should_fail+0x23c/0x250 [ 1689.352827][T16363] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1689.356181][T16360] ? radix_tree_node_alloc+0x154/0x1f0 [ 1689.356204][T16360] __should_failslab+0x81/0x90 [ 1689.356225][T16360] should_failslab+0x5/0x20 [ 1689.364275][T16365] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.371806][T16360] kmem_cache_alloc+0x46/0x2f0 [ 1689.371830][T16360] ? kvm_sched_clock_read+0xd/0x20 [ 1689.377670][T16367] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1689.382041][T16360] ? sched_clock_cpu+0x11/0x180 [ 1689.382061][T16360] radix_tree_node_alloc+0x154/0x1f0 [ 1689.390227][T16366] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.397786][T16360] idr_get_free+0x22a/0x5d0 [ 1689.397834][T16360] idr_alloc_cyclic+0xe3/0x2d0 [ 1689.397853][T16360] ? __radix_tree_preload+0x16f/0x190 [ 1689.406140][T16368] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.407722][T16360] __kernfs_new_node+0xb4/0x330 [ 1689.442245][T16369] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.444552][T16360] ? select_task_rq_fair+0x186/0xc00 [ 1689.444580][T16360] ? rb_insert_color+0x2fa/0x310 [ 1689.444597][T16360] kernfs_create_dir_ns+0x5e/0x140 [ 1689.477342][T16371] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1689.481526][T16360] internal_create_group+0x138/0x850 [ 1689.488110][T16372] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1689.492244][T16360] ? check_preempt_wakeup+0x1bb/0x360 [ 1689.530674][T16360] sysfs_create_group+0x1b/0x20 [ 1689.535557][T16360] loop_configure+0xa21/0xcb0 [ 1689.540215][T16360] lo_ioctl+0x555/0x11f0 [ 1689.544435][T16360] ? path_openat+0x19ab/0x20b0 [ 1689.549173][T16360] ? putname+0xa5/0xc0 [ 1689.553217][T16360] ? ___cache_free+0x3c/0x300 [ 1689.557902][T16360] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1689.563267][T16360] ? selinux_file_ioctl+0x8e0/0x970 [ 1689.568445][T16360] ? lo_release+0x120/0x120 [ 1689.572928][T16360] blkdev_ioctl+0x1d0/0x3c0 [ 1689.577442][T16360] block_ioctl+0x6d/0x80 [ 1689.581664][T16360] ? blkdev_iopoll+0x70/0x70 [ 1689.586266][T16360] __se_sys_ioctl+0xcb/0x140 [ 1689.590852][T16360] __x64_sys_ioctl+0x3f/0x50 [ 1689.595448][T16360] do_syscall_64+0x4a/0x90 [ 1689.599884][T16360] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1689.605764][T16360] RIP: 0033:0x466397 [ 1689.609696][T16360] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1689.629285][T16360] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1689.637718][T16360] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1689.645685][T16360] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1689.653634][T16360] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1689.661587][T16360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1689.669561][T16360] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 [ 1689.677698][T16360] loop1: detected capacity change from 0 to 136 11:38:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:46 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:46 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/41, 0xfffffffffffffd2f}, {&(0x7f0000000040)=""/217, 0xd9}, {&(0x7f0000000140)=""/128, 0x80}, {&(0x7f0000000280)=""/151, 0x97}], 0x4, 0x7, 0x1) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:46 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1689.929050][T16382] FAULT_INJECTION: forcing a failure. [ 1689.929050][T16382] name failslab, interval 1, probability 0, space 0, times 0 [ 1689.936735][T16388] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.941699][T16382] CPU: 0 PID: 16382 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1689.953517][T16389] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:46 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1689.962853][T16382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1689.962864][T16382] Call Trace: [ 1689.962870][T16382] dump_stack+0x137/0x19d [ 1689.962893][T16382] should_fail+0x23c/0x250 [ 1689.962909][T16382] ? __kernfs_new_node+0x6a/0x330 [ 1689.977668][T16390] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.983941][T16382] __should_failslab+0x81/0x90 [ 1689.983968][T16382] should_failslab+0x5/0x20 11:38:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1689.990377][T16391] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1689.991594][T16382] kmem_cache_alloc+0x46/0x2f0 [ 1689.991618][T16382] ? __cond_resched+0x11/0x40 [ 1689.996926][T16387] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1690.001036][T16382] __kernfs_new_node+0x6a/0x330 [ 1690.001058][T16382] ? idr_alloc_cyclic+0x249/0x2d0 [ 1690.001074][T16382] ? rb_insert_color+0x7e/0x310 [ 1690.001087][T16382] kernfs_new_node+0x5b/0xd0 11:38:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1690.023859][T16393] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.032294][T16382] __kernfs_create_file+0x45/0x1a0 [ 1690.032319][T16382] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1690.047259][T16394] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.052878][T16382] internal_create_group+0x2e4/0x850 [ 1690.063414][T16396] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1690.067676][T16382] sysfs_create_group+0x1b/0x20 11:38:46 executing program 3: setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x4f, 0x3, 0x7f, "bd7d5adb958eaa65ef16f354a6983311", "24cea9f35321ca99924aefc36c9db13e498f7ce3da27b5db6b89237a2c571cb0fd2b5cb7ac0a71fa17d594d1797935bc363bf96e5af6297c4e09"}, 0x4f, 0x3) r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1690.067700][T16382] loop_configure+0xa21/0xcb0 [ 1690.074184][T16397] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.083509][T16382] lo_ioctl+0x555/0x11f0 [ 1690.083531][T16382] ? path_openat+0x19ab/0x20b0 [ 1690.132153][T16403] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.141840][T16382] ? putname+0xa5/0xc0 [ 1690.164041][T16402] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:46 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1690.165932][T16382] ? ___cache_free+0x3c/0x300 [ 1690.165955][T16382] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1690.183389][T16404] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.186988][T16382] ? selinux_file_ioctl+0x8e0/0x970 [ 1690.187011][T16382] ? lo_release+0x120/0x120 [ 1690.187027][T16382] blkdev_ioctl+0x1d0/0x3c0 [ 1690.187045][T16382] block_ioctl+0x6d/0x80 [ 1690.216495][T16382] ? blkdev_iopoll+0x70/0x70 [ 1690.221164][T16382] __se_sys_ioctl+0xcb/0x140 [ 1690.225745][T16382] __x64_sys_ioctl+0x3f/0x50 11:38:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1690.230340][T16382] do_syscall_64+0x4a/0x90 [ 1690.231867][T16406] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.234748][T16382] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1690.234779][T16382] RIP: 0033:0x466397 [ 1690.234791][T16382] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:38:46 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1690.246255][T16405] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1690.251657][T16382] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1690.251675][T16382] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1690.258896][T16409] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.275305][T16382] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1690.275320][T16382] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1690.275332][T16382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1690.275343][T16382] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 [ 1690.282792][T16382] loop1: detected capacity change from 0 to 136 [ 1690.306362][T16417] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.363866][T16413] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.375953][T16414] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.387327][T16408] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1690.399245][T16420] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.415646][T16426] FAULT_INJECTION: forcing a failure. [ 1690.415646][T16426] name failslab, interval 1, probability 0, space 0, times 0 11:38:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x270}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1690.417385][T16423] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.428284][T16426] CPU: 0 PID: 16426 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1690.449395][T16426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1690.453133][T16425] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.459549][T16426] Call Trace: [ 1690.459558][T16426] dump_stack+0x137/0x19d 11:38:47 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/user\x00') close(r2) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/120, 0x78}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000100)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1690.459583][T16426] should_fail+0x23c/0x250 [ 1690.482642][T16426] ? __kernfs_new_node+0x6a/0x330 [ 1690.487678][T16426] __should_failslab+0x81/0x90 [ 1690.492444][T16426] should_failslab+0x5/0x20 [ 1690.497071][T16426] kmem_cache_alloc+0x46/0x2f0 [ 1690.501831][T16426] __kernfs_new_node+0x6a/0x330 [ 1690.506680][T16426] ? __cond_resched+0x11/0x40 [ 1690.511369][T16426] ? mutex_lock+0x9/0x30 [ 1690.513604][T16431] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.515605][T16426] kernfs_new_node+0x5b/0xd0 [ 1690.515643][T16426] __kernfs_create_file+0x45/0x1a0 [ 1690.536317][T16426] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1690.541704][T16426] internal_create_group+0x2e4/0x850 [ 1690.547217][T16426] sysfs_create_group+0x1b/0x20 [ 1690.552077][T16426] loop_configure+0xa21/0xcb0 [ 1690.556755][T16426] lo_ioctl+0x555/0x11f0 [ 1690.558825][T16432] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1690.560997][T16426] ? path_openat+0x19ab/0x20b0 [ 1690.561020][T16426] ? putname+0xa5/0xc0 11:38:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1690.561034][T16426] ? ___cache_free+0x3c/0x300 [ 1690.578426][T16434] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.580949][T16426] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1690.585892][T16438] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.596625][T16426] ? selinux_file_ioctl+0x8e0/0x970 [ 1690.596646][T16426] ? lo_release+0x120/0x120 [ 1690.596667][T16426] blkdev_ioctl+0x1d0/0x3c0 11:38:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1690.604306][T16439] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.613042][T16426] block_ioctl+0x6d/0x80 [ 1690.613066][T16426] ? blkdev_iopoll+0x70/0x70 [ 1690.613106][T16426] __se_sys_ioctl+0xcb/0x140 [ 1690.651744][T16426] __x64_sys_ioctl+0x3f/0x50 [ 1690.653935][T16440] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1690.656323][T16426] do_syscall_64+0x4a/0x90 [ 1690.656344][T16426] entry_SYSCALL_64_after_hwframe+0x44/0xae 11:38:47 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x115840) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000000)='./file0\x00', 0x62201, 0x40) mount$9p_virtio(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1040, &(0x7f0000000100)={'trans=virtio,', {[{@aname={'aname', 0x3d, '/dev/usbmon#\x00'}}, {@access_uid}, {@cachetag={'cachetag', 0x3d, '/dev/usbmon#\x00'}}, {@cachetag={'cachetag', 0x3d, '\xbf/'}}, {@dfltuid}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, '/dev/usbmon#\x00'}}]}}) 11:38:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1690.669271][T16442] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.671839][T16426] RIP: 0033:0x466397 [ 1690.671855][T16426] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1690.712316][T16426] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1690.720722][T16426] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1690.728686][T16426] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1690.736646][T16426] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1690.744619][T16426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1690.749334][T16448] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.752580][T16426] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 [ 1690.764955][T16426] loop1: detected capacity change from 0 to 136 11:38:47 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1690.772857][T16455] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.789365][T16451] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.803959][T16452] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1690.817543][T16453] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1690.828862][T16458] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.840722][T16460] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.859416][T16461] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1690.865472][T16467] FAULT_INJECTION: forcing a failure. [ 1690.865472][T16467] name failslab, interval 1, probability 0, space 0, times 0 11:38:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x3d0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1690.879286][T16463] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.883264][T16467] CPU: 1 PID: 16467 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1690.883281][T16467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1690.883290][T16467] Call Trace: [ 1690.883295][T16467] dump_stack+0x137/0x19d [ 1690.883314][T16467] should_fail+0x23c/0x250 11:38:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:47 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYRES64=r1], 0x120}], 0x1}, 0x0) sendmsg(r2, &(0x7f0000000280)={&(0x7f00000000c0)=@phonet={0x23, 0x4, 0x7f, 0xf8}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000b40)="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", 0x1000}], 0x1, &(0x7f0000000180)=[{0x80, 0x84, 0x8, "2f8819f26e9867f521279a8c854ffbbc4ce003c1223a53e8a2854c1530f23a2d778dc8897b710427740d61bce8c0d317ef604fe291f7fb72818d7b533bfc8eb3dd58bcc3dfd956051200c98b3dd3dcba100799282745c715928f5f65e24e4269d39dcf11e7d27370b8e96d"}], 0x80}, 0x40) r3 = syz_open_dev$loop(&(0x7f0000000000), 0x3, 0x101000) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xda0, 0x0) 11:38:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1690.903788][T16469] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.904442][T16467] ? __kernfs_new_node+0x6a/0x330 [ 1690.934347][T16471] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1690.937451][T16467] __should_failslab+0x81/0x90 [ 1690.949290][T16474] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1690.953470][T16467] should_failslab+0x5/0x20 [ 1690.973805][T16467] kmem_cache_alloc+0x46/0x2f0 [ 1690.978588][T16467] __kernfs_new_node+0x6a/0x330 11:38:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1690.983532][T16467] ? __cond_resched+0x11/0x40 [ 1690.988207][T16467] ? mutex_lock+0x9/0x30 [ 1690.992445][T16467] kernfs_new_node+0x5b/0xd0 [ 1690.997113][T16467] __kernfs_create_file+0x45/0x1a0 [ 1691.000996][T16475] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.002228][T16467] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1691.002252][T16467] internal_create_group+0x2e4/0x850 [ 1691.019173][T16478] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.023899][T16467] sysfs_create_group+0x1b/0x20 [ 1691.039883][T16467] loop_configure+0xa21/0xcb0 [ 1691.044570][T16467] lo_ioctl+0x555/0x11f0 [ 1691.045133][T16481] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1691.048868][T16467] ? path_openat+0x19ab/0x20b0 [ 1691.064782][T16467] ? putname+0xa5/0xc0 [ 1691.068855][T16467] ? ___cache_free+0x3c/0x300 [ 1691.069116][T16482] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.073530][T16467] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1691.073551][T16467] ? selinux_file_ioctl+0x8e0/0x970 [ 1691.095104][T16467] ? lo_release+0x120/0x120 [ 1691.099622][T16467] blkdev_ioctl+0x1d0/0x3c0 [ 1691.102055][T16484] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.104123][T16467] block_ioctl+0x6d/0x80 [ 1691.104146][T16467] ? blkdev_iopoll+0x70/0x70 [ 1691.119696][T16485] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.123934][T16467] __se_sys_ioctl+0xcb/0x140 [ 1691.123956][T16467] __x64_sys_ioctl+0x3f/0x50 [ 1691.144089][T16467] do_syscall_64+0x4a/0x90 [ 1691.146054][T16488] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.148500][T16467] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1691.165414][T16467] RIP: 0033:0x466397 11:38:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:47 executing program 3: syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200100003200000a010100080001000000000000000000000000001f64dd9f1f888970025cd0bc8253c8ba8c146fe525cbbddf1f894853c77df55884dd2510720e793cdcdec034be"], 0x120}], 0x1}, 0x0) poll(&(0x7f0000000240)=[{r0, 0x1525}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) preadv2(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/79, 0x4f}, {&(0x7f0000000080)=""/123, 0x7b}], 0x2, 0x2bcd, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1691.169538][T16467] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1691.178561][T16489] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1691.189311][T16467] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1691.189330][T16467] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1691.189341][T16467] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1691.224740][T16467] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1691.232702][T16467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1691.238117][T16492] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.240660][T16467] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 [ 1691.242520][T16467] loop1: detected capacity change from 0 to 136 [ 1691.263473][T16493] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:47 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:47 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x40000002}) 11:38:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1691.281455][T16498] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.293047][T16499] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1691.304489][T16502] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.316375][T16503] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.370260][T16513] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.377960][T16512] FAULT_INJECTION: forcing a failure. [ 1691.377960][T16512] name failslab, interval 1, probability 0, space 0, times 0 [ 1691.382494][T16515] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1691.393958][T16512] CPU: 0 PID: 16512 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1691.406932][T16516] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.415161][T16512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1691.428577][T16518] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.436308][T16512] Call Trace: [ 1691.436322][T16512] dump_stack+0x137/0x19d [ 1691.436344][T16512] should_fail+0x23c/0x250 [ 1691.436361][T16512] ? __kernfs_new_node+0x6a/0x330 [ 1691.448951][T16519] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.450646][T16512] __should_failslab+0x81/0x90 [ 1691.450671][T16512] should_failslab+0x5/0x20 [ 1691.457895][T16520] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1691.459454][T16512] kmem_cache_alloc+0x46/0x2f0 [ 1691.471309][T16522] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.475474][T16512] __kernfs_new_node+0x6a/0x330 [ 1691.475497][T16512] ? __cond_resched+0x11/0x40 [ 1691.475513][T16512] ? mutex_lock+0x9/0x30 [ 1691.491194][T16521] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.495924][T16512] kernfs_new_node+0x5b/0xd0 [ 1691.495946][T16512] __kernfs_create_file+0x45/0x1a0 [ 1691.495963][T16512] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1691.495979][T16512] internal_create_group+0x2e4/0x850 [ 1691.495996][T16512] sysfs_create_group+0x1b/0x20 [ 1691.552884][T16525] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.557056][T16512] loop_configure+0xa21/0xcb0 [ 1691.557080][T16512] lo_ioctl+0x555/0x11f0 [ 1691.568467][T16526] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1691.572907][T16512] ? path_openat+0x19ab/0x20b0 [ 1691.582851][T16529] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.592947][T16512] ? putname+0xa5/0xc0 [ 1691.592966][T16512] ? ___cache_free+0x3c/0x300 [ 1691.592984][T16512] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1691.600109][T16532] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1691.608776][T16512] ? selinux_file_ioctl+0x8e0/0x970 [ 1691.608797][T16512] ? lo_release+0x120/0x120 [ 1691.608812][T16512] blkdev_ioctl+0x1d0/0x3c0 [ 1691.637768][T16534] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.639168][T16512] block_ioctl+0x6d/0x80 11:38:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x18000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1691.651002][T16533] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.659105][T16512] ? blkdev_iopoll+0x70/0x70 [ 1691.659127][T16512] __se_sys_ioctl+0xcb/0x140 [ 1691.673248][T16537] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.674365][T16512] __x64_sys_ioctl+0x3f/0x50 [ 1691.674388][T16512] do_syscall_64+0x4a/0x90 [ 1691.679652][T16539] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.683551][T16512] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1691.683576][T16512] RIP: 0033:0x466397 [ 1691.683587][T16512] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1691.706508][T16538] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1691.714532][T16512] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1691.722905][T16533] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.724355][T16512] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1691.724368][T16512] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1691.724379][T16512] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1691.746740][T16531] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.755059][T16512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 11:38:48 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:48 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80900) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000040)=0x29, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f0000000080)="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", 0xfd}, {&(0x7f0000000180)="0e940c8450bf21560d8f8a2a3b9525953f5d16a12efc23e06bbf25a0d3f3324b8a19e0e8fbba03b442694f54e18a58fb14469f97b678d4e322130598ceb4fa9f6c7f8719b78bc82bd48e7988f973df0b6e16b8196c780bdf212f48342b2878bbcaa35027164b2c7f45ec14996d839bcd4dc1de", 0x73}, {&(0x7f00000003c0)="11773d71d4780d8c536215bbd71bc8aa50c9e209f77d98dfb45dac77e5745eadc1b8dadc153cca7f042a33", 0x2b}, {&(0x7f00000002c0)="e4befe0f2143bdbea0f43ba342caaf03cb83be6a22752f7fe9719972d64fae50393e9c70805d99a54bc649f522858323af0da137660fb9df45881decb6f2131c4ed8fc91f51a2aae699d5ddec93bf3ba170c9682b538c11e1bce9242ab01f4f97723b0ce47611645482ee73d9225dd8c9f9aa0e9a1f5c8fd58db3fef3b6bf965b47ef0a8ecc668800774111dbfa6bb5a23e529a8", 0x94}], 0x4) 11:38:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1691.755072][T16512] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 [ 1691.767263][T16512] loop1: detected capacity change from 0 to 136 [ 1691.802460][T16540] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1691.885100][T16555] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1691.897524][T16557] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.899408][T16556] FAULT_INJECTION: forcing a failure. [ 1691.899408][T16556] name failslab, interval 1, probability 0, space 0, times 0 [ 1691.909831][T16558] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.921168][T16556] CPU: 1 PID: 16556 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1691.934828][T16561] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.942324][T16556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1691.954486][T16562] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1691.963363][T16556] Call Trace: [ 1691.963384][T16556] dump_stack+0x137/0x19d 11:38:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1691.975881][T16563] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.977753][T16556] should_fail+0x23c/0x250 [ 1691.977772][T16556] ? __kernfs_new_node+0x6a/0x330 [ 1691.977830][T16556] __should_failslab+0x81/0x90 [ 1691.982204][T16564] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1691.993129][T16556] should_failslab+0x5/0x20 [ 1691.993152][T16556] kmem_cache_alloc+0x46/0x2f0 [ 1692.017405][T16565] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.018538][T16556] __kernfs_new_node+0x6a/0x330 [ 1692.043574][T16556] ? __cond_resched+0x11/0x40 [ 1692.048312][T16556] ? mutex_lock+0x9/0x30 [ 1692.052555][T16556] kernfs_new_node+0x5b/0xd0 [ 1692.057259][T16556] __kernfs_create_file+0x45/0x1a0 [ 1692.062630][T16556] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1692.064817][T16571] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.067997][T16556] internal_create_group+0x2e4/0x850 11:38:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1692.084256][T16556] sysfs_create_group+0x1b/0x20 [ 1692.089007][T16570] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1692.089154][T16556] loop_configure+0xa21/0xcb0 [ 1692.102081][T16573] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.104884][T16556] lo_ioctl+0x555/0x11f0 [ 1692.104904][T16556] ? path_openat+0x19ab/0x20b0 [ 1692.104921][T16556] ? putname+0xa5/0xc0 11:38:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1692.118060][T16572] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.120328][T16556] ? ___cache_free+0x3c/0x300 [ 1692.126388][T16574] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.129122][T16556] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1692.129143][T16556] ? selinux_file_ioctl+0x8e0/0x970 [ 1692.156352][T16576] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.161206][T16556] ? lo_release+0x120/0x120 [ 1692.161227][T16556] blkdev_ioctl+0x1d0/0x3c0 [ 1692.186650][T16556] block_ioctl+0x6d/0x80 [ 1692.190898][T16556] ? blkdev_iopoll+0x70/0x70 [ 1692.195574][T16556] __se_sys_ioctl+0xcb/0x140 [ 1692.198325][T16559] tc_dump_action: action bad kind [ 1692.200199][T16556] __x64_sys_ioctl+0x3f/0x50 [ 1692.200222][T16556] do_syscall_64+0x4a/0x90 [ 1692.200258][T16556] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1692.206576][T16579] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.209872][T16556] RIP: 0033:0x466397 [ 1692.209887][T16556] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1692.231510][T16584] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1692.235338][T16556] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1692.235358][T16556] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1692.235370][T16556] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1692.256330][T16583] tc_dump_action: action bad kind [ 1692.266050][T16556] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1692.266081][T16556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1692.266092][T16556] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 [ 1692.268260][T16582] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.285184][T16556] loop1: detected capacity change from 0 to 136 11:38:49 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x30000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:49 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0, 0x2000}], 0x1, 0x7d) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, 0x4, &(0x7f0000000380)=[{&(0x7f0000000080)="902f5dc66f03cda699eeb5fbce0a107fc5c3419e417199ea60cb69066879801c3105329ddaa2529c846a450c45bfa29ee5b1f2", 0x33, 0xfffffffffffffff7}, {&(0x7f00000000c0)="43b679222e6bc80cdd6db03d8fd039f866c9", 0x12}, {&(0x7f0000000100)="7e5def2b3c18620880cbad47c95b158f043f1f47b6086ed3801e2842dd79f65fce2de8b6ceb20c078b67c72611d193355a961b9422f08cd1046fd7c2c095b6bb5cd9f99ee0703cdff67c4378f9cf5b6f936495f26da6dc0fd241855ee8c96a902fb9ff27c918878dfdd5369f1aea8964391641e29811c387d794d9e02d78fff87794b9128522813151d8f5a7605daf86e879b2df1ed5288b79d3ddc4417837b0019c750271f334bcb26000e09e578488c1c19dc51137102efc17367e2d2f9cdd4e88ba586fc5c243745703835fd13158565bde11f63fec994f9ca4a995edcfd5ee02b89dc904b03120de2d", 0xeb, 0x200}, {&(0x7f0000000280)="ce895c83172e86af81ceddc7b48978e8e09a1c025e47b108c54fd139d0f3bb9dedf5f23e1ebcf6e1f812effa4d024e408b74c70ec7bbc26a0c8d7cc1e28d970a2cfe32f57925d99e76c021cc74f7069cf2bb96d8984e65fa4843b865c9fd105fad995082681369f96b0deca94790f68b0c985445ad30204e99dc83819dc63cb5608a36a25c8f17e1a10ee30188eae58944af560cb5bed16b050a059f92187e5b074d20d90d91c731135ac26405d9219ea586552f008af19c6afdd35b962a44b138ef", 0xc2, 0x1}], 0x2200002, &(0x7f0000000400)=ANY=[@ANYBLOB='debug,tz=UTC,seclabel,dont_hash,pcr=00000000000000000036,uid>', @ANYRESDEC=0xee00, @ANYBLOB="1f666f776e65693e", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) preadv(r2, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/53, 0x35}], 0x1, 0x100, 0x0) 11:38:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1692.292370][T16585] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1692.404710][T16599] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.405038][T16596] FAULT_INJECTION: forcing a failure. [ 1692.405038][T16596] name failslab, interval 1, probability 0, space 0, times 0 [ 1692.416435][T16601] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.428550][T16596] CPU: 1 PID: 16596 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 11:38:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1692.441351][T16603] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.449807][T16596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1692.449818][T16596] Call Trace: [ 1692.449824][T16596] dump_stack+0x137/0x19d [ 1692.463949][T16604] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.470862][T16596] should_fail+0x23c/0x250 [ 1692.470884][T16596] ? __kernfs_new_node+0x6a/0x330 [ 1692.498857][T16596] __should_failslab+0x81/0x90 [ 1692.503622][T16596] should_failslab+0x5/0x20 [ 1692.508126][T16596] kmem_cache_alloc+0x46/0x2f0 [ 1692.512902][T16596] __kernfs_new_node+0x6a/0x330 [ 1692.515223][T16607] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.517819][T16596] ? __cond_resched+0x11/0x40 [ 1692.529369][T16608] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.533488][T16596] ? mutex_lock+0x9/0x30 [ 1692.533507][T16596] kernfs_new_node+0x5b/0xd0 11:38:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd803}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1692.533524][T16596] __kernfs_create_file+0x45/0x1a0 [ 1692.552420][T16610] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.553337][T16596] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1692.565991][T16612] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.569534][T16596] internal_create_group+0x2e4/0x850 [ 1692.591240][T16596] sysfs_create_group+0x1b/0x20 [ 1692.596303][T16596] loop_configure+0xa21/0xcb0 [ 1692.600980][T16596] lo_ioctl+0x555/0x11f0 [ 1692.605221][T16596] ? path_openat+0x19ab/0x20b0 [ 1692.609988][T16596] ? putname+0xa5/0xc0 [ 1692.611186][T16614] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.614039][T16596] ? ___cache_free+0x3c/0x300 [ 1692.629737][T16596] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1692.635129][T16596] ? selinux_file_ioctl+0x8e0/0x970 [ 1692.639419][T16616] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.640324][T16596] ? lo_release+0x120/0x120 11:38:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1692.651681][T16617] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.655807][T16596] blkdev_ioctl+0x1d0/0x3c0 [ 1692.655829][T16596] block_ioctl+0x6d/0x80 [ 1692.668441][T16618] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.671303][T16596] ? blkdev_iopoll+0x70/0x70 [ 1692.691103][T16596] __se_sys_ioctl+0xcb/0x140 [ 1692.695752][T16596] __x64_sys_ioctl+0x3f/0x50 [ 1692.700369][T16596] do_syscall_64+0x4a/0x90 [ 1692.704797][T16596] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1692.710698][T16596] RIP: 0033:0x466397 [ 1692.714582][T16596] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1692.716005][T16621] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.734264][T16596] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1692.734284][T16596] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1692.734296][T16596] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1692.746286][T16622] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.753672][T16596] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1692.753686][T16596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1692.753697][T16596] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 11:38:49 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:49 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x3c, 0x23, 0x11, 0x16, 0x8, 0x6, 0x5, 0xde}}) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0xe81db6d261f0b8) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, &(0x7f0000000000)={r2}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1692.756364][T16596] loop1: detected capacity change from 0 to 136 [ 1692.769219][T16600] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1692.822506][T16602] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.833886][T16627] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.845383][T16628] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1692.875850][T16623] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1692.884347][T16632] loop1: detected capacity change from 0 to 136 [ 1692.893269][T16624] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.894591][T16632] FAULT_INJECTION: forcing a failure. [ 1692.894591][T16632] name failslab, interval 1, probability 0, space 0, times 0 [ 1692.916964][T16632] CPU: 1 PID: 16632 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1692.927216][T16632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1692.937272][T16632] Call Trace: [ 1692.940558][T16632] dump_stack+0x137/0x19d [ 1692.944926][T16632] should_fail+0x23c/0x250 [ 1692.949338][T16632] __should_failslab+0x81/0x90 [ 1692.954093][T16632] ? kobject_uevent_env+0x1a7/0xc40 [ 1692.959344][T16632] should_failslab+0x5/0x20 [ 1692.963850][T16632] kmem_cache_alloc_trace+0x49/0x310 [ 1692.965004][T16641] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1692.969138][T16632] ? dev_uevent_filter+0x70/0x70 [ 1692.980690][T16642] __nla_validate_parse: 6 callbacks suppressed [ 1692.980699][T16642] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1692.985065][T16632] kobject_uevent_env+0x1a7/0xc40 [ 1692.985169][T16632] kobject_uevent+0x18/0x20 [ 1692.991223][T16642] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1693.000559][T16632] loop_configure+0xb3c/0xcb0 11:38:49 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f00000000c0)={&(0x7f0000000080), &(0x7f0000000b40)=""/4096, 0x1000}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x100, 0x0, 0xd}, 0x18) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1693.005608][T16642] tc_dump_action: action bad kind [ 1693.009707][T16643] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1693.010119][T16632] lo_ioctl+0x555/0x11f0 [ 1693.020163][T16644] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.023938][T16632] ? path_openat+0x19ab/0x20b0 [ 1693.023958][T16632] ? putname+0xa5/0xc0 [ 1693.023972][T16632] ? ___cache_free+0x3c/0x300 11:38:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1693.031006][T16645] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.040037][T16632] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1693.040075][T16632] ? selinux_file_ioctl+0x8e0/0x970 [ 1693.045279][T16647] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.055331][T16632] ? lo_release+0x120/0x120 [ 1693.055351][T16632] blkdev_ioctl+0x1d0/0x3c0 [ 1693.055369][T16632] block_ioctl+0x6d/0x80 [ 1693.075295][T16648] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1693.079787][T16632] ? blkdev_iopoll+0x70/0x70 [ 1693.079806][T16632] __se_sys_ioctl+0xcb/0x140 [ 1693.098310][T16649] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.101405][T16632] __x64_sys_ioctl+0x3f/0x50 [ 1693.101428][T16632] do_syscall_64+0x4a/0x90 [ 1693.113233][T16651] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.114662][T16632] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1693.114686][T16632] RIP: 0033:0x466397 11:38:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1693.175917][T16632] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1693.176132][T16656] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.195645][T16632] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1693.195666][T16632] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 11:38:49 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1693.195675][T16632] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1693.195686][T16632] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1693.234412][T16659] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1693.239014][T16632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1693.239027][T16632] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 [ 1693.266510][T16660] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.278202][T16662] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.298833][T16656] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.303506][T16671] loop1: detected capacity change from 0 to 136 [ 1693.310264][T16666] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1693.316339][T16671] FAULT_INJECTION: forcing a failure. [ 1693.316339][T16671] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.338206][T16669] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.340184][T16671] CPU: 0 PID: 16671 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1693.361446][T16671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:38:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:50 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1693.370115][T16670] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.371526][T16671] Call Trace: [ 1693.371533][T16671] dump_stack+0x137/0x19d [ 1693.390114][T16671] should_fail+0x23c/0x250 [ 1693.394535][T16671] ? kzalloc+0x1d/0x30 [ 1693.398667][T16671] __should_failslab+0x81/0x90 [ 1693.402474][T16674] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.403421][T16671] should_failslab+0x5/0x20 [ 1693.403445][T16671] __kmalloc+0x66/0x340 [ 1693.423079][T16671] kzalloc+0x1d/0x30 [ 1693.427011][T16671] kobject_get_path+0x7c/0x110 [ 1693.431773][T16671] kobject_uevent_env+0x1be/0xc40 [ 1693.436801][T16671] kobject_uevent+0x18/0x20 [ 1693.438284][T16676] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1693.441337][T16671] loop_configure+0xb3c/0xcb0 [ 1693.441357][T16671] lo_ioctl+0x555/0x11f0 [ 1693.461312][T16671] ? path_openat+0x19ab/0x20b0 [ 1693.466163][T16671] ? putname+0xa5/0xc0 11:38:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:50 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1693.468501][T16681] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.470228][T16671] ? ___cache_free+0x3c/0x300 [ 1693.481691][T16682] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1693.485997][T16671] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1693.486020][T16671] ? selinux_file_ioctl+0x8e0/0x970 [ 1693.486037][T16671] ? lo_release+0x120/0x120 [ 1693.499718][T16683] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.502482][T16671] blkdev_ioctl+0x1d0/0x3c0 [ 1693.502503][T16671] block_ioctl+0x6d/0x80 [ 1693.520240][T16684] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.523138][T16671] ? blkdev_iopoll+0x70/0x70 [ 1693.547423][T16671] __se_sys_ioctl+0xcb/0x140 [ 1693.552090][T16671] __x64_sys_ioctl+0x3f/0x50 [ 1693.556741][T16671] do_syscall_64+0x4a/0x90 [ 1693.558833][T16687] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1693.561196][T16671] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1693.572869][T16688] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.578165][T16671] RIP: 0033:0x466397 [ 1693.578179][T16671] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1693.578194][T16671] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1693.578209][T16671] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1693.629053][T16671] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1693.634837][T16689] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1693.637012][T16671] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1693.656107][T16671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1693.658512][T16684] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1693.664065][T16671] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 11:38:50 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:50 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:50 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f0000000100)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000040)=""/182, 0xb6}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x202000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40200, 0x0) ioctl$MON_IOCX_GET(r3, 0x40189206, &(0x7f0000000280)={&(0x7f0000000180), &(0x7f00000002c0)=""/16, 0x10}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x5a000, 0x9c) r5 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000380)={&(0x7f00000003c0), &(0x7f0000000400)=""/31, 0x1f}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1694.008940][T16703] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.020874][T16704] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.033271][T16710] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.034112][T16708] loop1: detected capacity change from 0 to 136 [ 1694.045335][T16707] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.050743][T16708] FAULT_INJECTION: forcing a failure. [ 1694.050743][T16708] name failslab, interval 1, probability 0, space 0, times 0 [ 1694.071441][T16706] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1694.074222][T16708] CPU: 0 PID: 16708 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1694.092020][T16712] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:50 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1694.095529][T16708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1694.095540][T16708] Call Trace: [ 1694.095548][T16708] dump_stack+0x137/0x19d [ 1694.095572][T16708] should_fail+0x23c/0x250 [ 1694.112907][T16714] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.116646][T16708] __should_failslab+0x81/0x90 [ 1694.116674][T16708] should_failslab+0x5/0x20 11:38:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1694.122349][T16716] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.124281][T16708] kmem_cache_alloc_node+0x58/0x2b0 [ 1694.124302][T16708] ? __alloc_skb+0xed/0x420 [ 1694.134103][T16715] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1694.139711][T16708] __alloc_skb+0xed/0x420 [ 1694.139731][T16708] alloc_uevent_skb+0x5b/0x120 [ 1694.139749][T16708] kobject_uevent_env+0x863/0xc40 [ 1694.171726][T16717] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:50 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1694.180799][T16708] kobject_uevent+0x18/0x20 [ 1694.180823][T16708] loop_configure+0xb3c/0xcb0 [ 1694.200307][T16720] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.206074][T16708] lo_ioctl+0x555/0x11f0 [ 1694.206095][T16708] ? path_openat+0x19ab/0x20b0 [ 1694.206114][T16708] ? putname+0xa5/0xc0 [ 1694.227029][T16723] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.230587][T16708] ? ___cache_free+0x3c/0x300 11:38:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1694.230608][T16708] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1694.230640][T16708] ? selinux_file_ioctl+0x8e0/0x970 [ 1694.230656][T16708] ? lo_release+0x120/0x120 [ 1694.261644][T16725] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.265610][T16708] blkdev_ioctl+0x1d0/0x3c0 [ 1694.265634][T16708] block_ioctl+0x6d/0x80 [ 1694.276335][T16727] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.281111][T16708] ? blkdev_iopoll+0x70/0x70 [ 1694.281135][T16708] __se_sys_ioctl+0xcb/0x140 11:38:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1694.291141][T16727] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.300823][T16708] __x64_sys_ioctl+0x3f/0x50 [ 1694.300846][T16708] do_syscall_64+0x4a/0x90 [ 1694.318400][T16729] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.320980][T16708] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1694.346840][T16708] RIP: 0033:0x466397 [ 1694.348281][T16728] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.350727][T16708] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1694.362069][T16730] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1694.381337][T16708] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1694.381357][T16708] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 11:38:51 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1694.381369][T16708] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1694.381379][T16708] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1694.381390][T16708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1694.394998][T16731] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.400852][T16708] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 11:38:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:51 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000650000/0x4000)=nil, 0x4000, 0x0, 0x810, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1694.452348][T16736] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.479029][T16737] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.512369][T16735] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1694.512436][T16748] loop1: detected capacity change from 0 to 136 [ 1694.528944][T16744] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.530048][T16748] FAULT_INJECTION: forcing a failure. [ 1694.530048][T16748] name failslab, interval 1, probability 0, space 0, times 0 [ 1694.552099][T16752] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.553535][T16748] CPU: 1 PID: 16748 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1694.574650][T16748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1694.577042][T16750] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.584761][T16748] Call Trace: [ 1694.584769][T16748] dump_stack+0x137/0x19d [ 1694.603334][T16748] should_fail+0x23c/0x250 [ 1694.607814][T16748] __should_failslab+0x81/0x90 [ 1694.612689][T16748] should_failslab+0x5/0x20 [ 1694.613596][T16755] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.617250][T16748] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1694.633951][T16748] ? __kmalloc_node_track_caller+0x30/0x40 [ 1694.639775][T16748] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 1694.645264][T16748] __kmalloc_node_track_caller+0x30/0x40 [ 1694.650892][T16748] ? alloc_uevent_skb+0x5b/0x120 [ 1694.655827][T16748] __alloc_skb+0x187/0x420 [ 1694.660293][T16748] alloc_uevent_skb+0x5b/0x120 [ 1694.665084][T16748] kobject_uevent_env+0x863/0xc40 [ 1694.670177][T16748] kobject_uevent+0x18/0x20 [ 1694.674689][T16748] loop_configure+0xb3c/0xcb0 [ 1694.679363][T16748] lo_ioctl+0x555/0x11f0 [ 1694.680811][T16760] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.683603][T16748] ? path_openat+0x19ab/0x20b0 [ 1694.683625][T16748] ? putname+0xa5/0xc0 [ 1694.703636][T16748] ? ___cache_free+0x3c/0x300 11:38:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:51 executing program 3: poll(&(0x7f0000000240)=[{}], 0x1, 0x81) r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x48) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1694.707429][T16761] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1694.708355][T16748] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1694.708378][T16748] ? selinux_file_ioctl+0x8e0/0x970 [ 1694.729971][T16748] ? lo_release+0x120/0x120 [ 1694.733304][T16766] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.734464][T16748] blkdev_ioctl+0x1d0/0x3c0 [ 1694.734498][T16748] block_ioctl+0x6d/0x80 [ 1694.734543][T16748] ? blkdev_iopoll+0x70/0x70 [ 1694.734557][T16748] __se_sys_ioctl+0xcb/0x140 11:38:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1694.746514][T16767] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.750030][T16748] __x64_sys_ioctl+0x3f/0x50 [ 1694.750053][T16748] do_syscall_64+0x4a/0x90 [ 1694.771404][T16767] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.774441][T16748] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1694.781759][T16764] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.783434][T16748] RIP: 0033:0x466397 [ 1694.783449][T16748] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1694.810320][T16768] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.811501][T16748] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1694.811521][T16748] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1694.850884][T16776] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.854367][T16748] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1694.854382][T16748] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1694.854393][T16748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1694.875908][T16779] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:51 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1694.881299][T16748] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 [ 1694.917184][T16777] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.928681][T16780] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.941583][T16778] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1694.961823][T16782] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1694.979387][T16786] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1694.990749][T16792] loop1: detected capacity change from 0 to 136 [ 1694.993357][T16787] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1695.008423][T16794] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.010052][T16792] FAULT_INJECTION: forcing a failure. [ 1695.010052][T16792] name failslab, interval 1, probability 0, space 0, times 0 [ 1695.030770][T16796] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.032070][T16792] CPU: 1 PID: 16792 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1695.032087][T16792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1695.032095][T16792] Call Trace: [ 1695.032100][T16792] dump_stack+0x137/0x19d [ 1695.032173][T16792] should_fail+0x23c/0x250 [ 1695.032187][T16792] ? skb_clone+0x12c/0x1f0 [ 1695.076717][T16797] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1695.078473][T16792] __should_failslab+0x81/0x90 [ 1695.095093][T16804] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.098826][T16792] should_failslab+0x5/0x20 11:38:51 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='./file0\x00', 0x0, 0x8b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x58) mmap$usbmon(&(0x7f00007ec000/0x3000)=nil, 0x3000, 0x1000000, 0x10010, r2, 0x4) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000799000/0x3000)=nil, 0x3000, 0x2000004, 0x101030, r1, 0x44486000) 11:38:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1695.114386][T16792] kmem_cache_alloc+0x46/0x2f0 [ 1695.119145][T16792] skb_clone+0x12c/0x1f0 [ 1695.119706][T16802] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1695.123485][T16792] netlink_broadcast_filtered+0x50d/0xb90 [ 1695.123508][T16792] ? skb_put+0xb9/0xf0 [ 1695.144357][T16792] netlink_broadcast+0x35/0x50 [ 1695.149121][T16792] kobject_uevent_env+0x8c9/0xc40 [ 1695.154144][T16792] kobject_uevent+0x18/0x20 [ 1695.158650][T16792] loop_configure+0xb3c/0xcb0 11:38:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1695.163357][T16792] lo_ioctl+0x555/0x11f0 [ 1695.167595][T16792] ? path_openat+0x19ab/0x20b0 [ 1695.167925][T16806] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.172402][T16792] ? putname+0xa5/0xc0 [ 1695.172419][T16792] ? ___cache_free+0x3c/0x300 [ 1695.192220][T16792] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1695.197591][T16792] ? selinux_file_ioctl+0x8e0/0x970 [ 1695.199878][T16806] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.202803][T16792] ? lo_release+0x120/0x120 [ 1695.218307][T16792] blkdev_ioctl+0x1d0/0x3c0 [ 1695.222808][T16792] block_ioctl+0x6d/0x80 [ 1695.227055][T16792] ? blkdev_iopoll+0x70/0x70 [ 1695.231797][T16792] __se_sys_ioctl+0xcb/0x140 [ 1695.236399][T16792] __x64_sys_ioctl+0x3f/0x50 [ 1695.240642][T16814] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1695.241000][T16792] do_syscall_64+0x4a/0x90 [ 1695.241023][T16792] entry_SYSCALL_64_after_hwframe+0x44/0xae 11:38:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1695.252435][T16807] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.256695][T16792] RIP: 0033:0x466397 [ 1695.256712][T16792] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1695.256743][T16792] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 [ 1695.267538][T16810] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1695.273601][T16792] ORIG_RAX: 0000000000000010 [ 1695.273610][T16792] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1695.273622][T16792] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1695.273634][T16792] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1695.303894][T16815] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1695.314209][T16792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1695.314223][T16792] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 [ 1695.319819][T16816] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.381583][T16820] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.393188][T16817] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.404975][T16823] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:52 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1695.416877][T16824] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.433653][T16825] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.445700][T16828] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1695.457575][T16830] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1695.495662][T16838] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.506836][T16837] loop1: detected capacity change from 0 to 136 [ 1695.515127][T16837] FAULT_INJECTION: forcing a failure. [ 1695.515127][T16837] name failslab, interval 1, probability 0, space 0, times 0 [ 1695.527763][T16837] CPU: 1 PID: 16837 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1695.537951][T16837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1695.547842][T16840] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.548006][T16837] Call Trace: [ 1695.548015][T16837] dump_stack+0x137/0x19d [ 1695.565089][T16843] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1695.566589][T16837] should_fail+0x23c/0x250 [ 1695.582172][T16837] __should_failslab+0x81/0x90 [ 1695.586240][T16844] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.586967][T16837] ? call_usermodehelper_setup+0x81/0x160 [ 1695.603673][T16837] should_failslab+0x5/0x20 [ 1695.605616][T16846] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.608245][T16837] kmem_cache_alloc_trace+0x49/0x310 [ 1695.624539][T16837] ? add_uevent_var+0x16e/0x1c0 [ 1695.629404][T16837] ? __kfree_skb+0xfe/0x150 [ 1695.632925][T16848] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.633920][T16837] call_usermodehelper_setup+0x81/0x160 [ 1695.633950][T16837] ? add_uevent_var+0x1c0/0x1c0 [ 1695.654851][T16850] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1695.655599][T16837] kobject_uevent_env+0xb29/0xc40 [ 1695.655622][T16837] kobject_uevent+0x18/0x20 [ 1695.676219][T16837] loop_configure+0xb3c/0xcb0 [ 1695.676335][T16852] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.680939][T16837] lo_ioctl+0x555/0x11f0 [ 1695.680958][T16837] ? path_openat+0x19ab/0x20b0 [ 1695.700951][T16837] ? putname+0xa5/0xc0 [ 1695.705025][T16837] ? ___cache_free+0x3c/0x300 [ 1695.709705][T16837] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1695.715071][T16837] ? selinux_file_ioctl+0x8e0/0x970 [ 1695.720267][T16837] ? lo_release+0x120/0x120 [ 1695.722917][T16856] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1695.724854][T16837] blkdev_ioctl+0x1d0/0x3c0 [ 1695.724876][T16837] block_ioctl+0x6d/0x80 [ 1695.744661][T16837] ? blkdev_iopoll+0x70/0x70 [ 1695.747696][T16858] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.749250][T16837] __se_sys_ioctl+0xcb/0x140 [ 1695.749281][T16837] __x64_sys_ioctl+0x3f/0x50 [ 1695.760763][T16859] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1695.764948][T16837] do_syscall_64+0x4a/0x90 [ 1695.764970][T16837] entry_SYSCALL_64_after_hwframe+0x44/0xae 11:38:52 executing program 3: syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000300)=""/198, 0xc6}], 0x1, 0x2, 0x0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYRES16], 0x120}], 0x1}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800008, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_ROPEN(r1, &(0x7f0000000000)={0x18, 0x71, 0x1, {{0x8}, 0x4}}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0x78, 0xa, 0xa, 0x201, 0x0, 0x0, {0xc, 0x0, 0x8}, [@NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xe}]}}}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x2b}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x2f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x566b7c4090257c2a}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x35}, @NFTA_SET_EXPR={0x10, 0x11, 0x0, 0x1, @notrack={{0xc}, @void}}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x3}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x4b}]}, 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x4040080) 11:38:52 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/147, 0x93}, {&(0x7f00000000c0)=""/184, 0xb8}, {&(0x7f0000000180)=""/73, 0x49}, {&(0x7f0000000280)=""/76, 0x4c}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000000300)=""/239, 0xef}], 0x6, &(0x7f0000000480)=""/6, 0x6}, 0x2000) 11:38:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:52 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1695.778176][T16860] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.780665][T16837] RIP: 0033:0x466397 [ 1695.780681][T16837] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1695.820792][T16863] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1695.825617][T16837] RSP: 002b:00007f6a5b60cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1695.825639][T16837] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1695.853098][T16837] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1695.857410][T16867] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.861128][T16837] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1695.861142][T16837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1695.861153][T16837] R13: 0000000000000004 R14: 0000000020000158 R15: 0000000000000001 11:38:52 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1695.896934][T16868] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1695.908830][T16869] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1695.942578][T16875] loop1: detected capacity change from 0 to 136 [ 1695.949083][T16875] FAULT_INJECTION: forcing a failure. [ 1695.949083][T16875] name failslab, interval 1, probability 0, space 0, times 0 [ 1695.961845][T16875] CPU: 0 PID: 16875 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1695.972035][T16875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1695.974684][T16882] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1695.982075][T16875] Call Trace: [ 1695.982083][T16875] dump_stack+0x137/0x19d [ 1696.000881][T16875] should_fail+0x23c/0x250 [ 1696.001667][T16883] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.005304][T16875] ? getname_flags+0x84/0x3d0 [ 1696.005322][T16875] __should_failslab+0x81/0x90 [ 1696.017951][T16884] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.021097][T16875] should_failslab+0x5/0x20 11:38:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1696.021122][T16875] kmem_cache_alloc+0x46/0x2f0 [ 1696.028419][T16885] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.036867][T16875] getname_flags+0x84/0x3d0 [ 1696.036906][T16875] do_mkdirat+0x3b/0x200 [ 1696.043029][T16886] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1696.046123][T16875] __x64_sys_mkdir+0x32/0x40 [ 1696.046142][T16875] do_syscall_64+0x4a/0x90 [ 1696.046160][T16875] entry_SYSCALL_64_after_hwframe+0x44/0xae 11:38:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1696.067382][T16887] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.076964][T16875] RIP: 0033:0x4656e7 [ 1696.076980][T16875] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1696.076996][T16875] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1696.077015][T16875] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004656e7 11:38:52 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000100)=0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800, 0x2, 0x0, 0x4, 0x4, 0x4}, &(0x7f00000000c0)=0x20) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x800c0, 0x0) ioctl$MON_IOCT_RING_SIZE(r3, 0x9204, 0x28cce) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1696.094408][T16888] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.102961][T16875] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1696.102976][T16875] RBP: 00007f6a5b60d040 R08: 0000000000000000 R09: ffffffffffffffff [ 1696.170207][T16875] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200001c0 [ 1696.173010][T16896] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1696.178186][T16875] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1696.198965][T16898] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.210244][T16895] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.222509][T16893] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:52 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1696.234239][T16899] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.245479][T16901] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.256741][T16903] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.281444][T16904] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1696.296121][T16905] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.308913][T16910] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.327653][T16914] loop1: detected capacity change from 0 to 136 [ 1696.334340][T16914] FAULT_INJECTION: forcing a failure. 11:38:53 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1696.334340][T16914] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1696.337667][T16915] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1696.347467][T16914] CPU: 0 PID: 16914 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1696.368671][T16914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1696.378074][T16918] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.378822][T16914] Call Trace: 11:38:53 executing program 3: ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000280)={0x0, 0x9, 0x0, [0x14, 0x2, 0x0, 0x3, 0xff], [0xffffffff, 0x1, 0x7, 0x2, 0x4, 0x4, 0x100000001, 0x1000, 0xfffffffffffffffe, 0x7, 0x982, 0x10000, 0x9, 0x0, 0xfff, 0x40, 0x81, 0x4000000, 0x8, 0x7, 0x9, 0x81, 0x8000, 0x3, 0x10001, 0x4, 0x8, 0x81, 0x3ff, 0x1000, 0x7, 0x9, 0xffffffff, 0xc31e, 0x7ff, 0x2, 0x1000, 0x80000000, 0x7f, 0x8, 0x7, 0x60d9, 0x0, 0x3, 0x7fffffff, 0xfffffffffffffc00, 0x1, 0x3, 0x8000, 0x2, 0x7, 0x7fff, 0x6, 0x9, 0xffffffffffffffff, 0xfffffffffffffe00, 0x4, 0x5, 0x80, 0x28000, 0x5, 0x80, 0x1, 0x80000001, 0x0, 0x9df, 0x60b, 0x81, 0x2f, 0x8, 0x101, 0x966, 0x56, 0x4, 0x7, 0xfffffffffffffff8, 0x3, 0x9, 0x5, 0x9, 0x5, 0x3, 0x2, 0x96, 0x80000001, 0x200, 0x10001, 0xa4c, 0x1, 0x4, 0x100000001, 0x0, 0xaa8, 0x3, 0x0, 0x5, 0x7, 0x0, 0x5, 0x4, 0x9, 0x3, 0x3ff, 0x0, 0x2, 0x6, 0x1, 0xffffffff, 0x5, 0x4, 0x5, 0x3989, 0x8, 0x101, 0x0, 0x0, 0x7, 0x81, 0x101, 0x8, 0x4]}) r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1696.378829][T16914] dump_stack+0x137/0x19d [ 1696.397385][T16914] should_fail+0x23c/0x250 [ 1696.401825][T16914] should_fail_usercopy+0x16/0x20 [ 1696.407010][T16914] strncpy_from_user+0x21/0x250 [ 1696.410821][T16922] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.411977][T16914] getname_flags+0xb8/0x3d0 [ 1696.411996][T16914] do_mkdirat+0x3b/0x200 [ 1696.431913][T16914] __x64_sys_mkdir+0x32/0x40 [ 1696.436093][T16924] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1696.436501][T16914] do_syscall_64+0x4a/0x90 [ 1696.451983][T16914] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1696.455828][T16925] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.457874][T16914] RIP: 0033:0x4656e7 [ 1696.473031][T16914] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:38:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xd003}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1696.485228][T16926] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.492720][T16914] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1696.492740][T16914] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004656e7 [ 1696.492755][T16914] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1696.492777][T16914] RBP: 00007f6a5b60d040 R08: 0000000000000000 R09: ffffffffffffffff [ 1696.492786][T16914] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200001c0 11:38:53 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:53 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1696.492795][T16914] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1696.505939][T16928] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.563725][T16930] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.579600][T16932] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1696.593368][T16935] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.609647][T16937] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.623088][T16941] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1696.643518][T16943] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.643903][T16949] loop1: detected capacity change from 0 to 136 [ 1696.660892][T16949] FAULT_INJECTION: forcing a failure. [ 1696.660892][T16949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1696.662565][T16947] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.674155][T16949] CPU: 0 PID: 16949 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 11:38:53 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0xd37bc) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x120}], 0x1}, 0x0) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) close_range(r1, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) r4 = socket$inet_icmp(0x2, 0x2, 0x1) r5 = openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0xd00, 0x4) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x82000, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x40c01, 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x10000, 0x0) pwritev(r8, &(0x7f0000000a80)=[{&(0x7f00000005c0)="2aa9e2a20ded8fe57fc2a8805c3ed388db9589689e2beeb4fa215b2aca4bab06417380a187d8a37e95ba929791d6304cfc8e40dc9ab446fb18d3fbe3e516ac1f62d8aea847158f685caf516d82538f97cba54d6de9d43eb0b2", 0x59}, {&(0x7f00000008c0)="976d40f846690695366880aa0d49bcbdad3096c23416b00dd06366d9aa252347024be107c6ddc5f469915399cdc1ea33e2004251964167ae196eaed2648d96e4990bd52c89a65544132b8b565552b83b21369ef2b33f17af8be9115dd4e44bc800ffe37298b8e799bdc2c6b29bc64e6c64bec6e415cbfce5db6d10c602fffedbc1a12c9633bdceaf21891801907a2966dfb168", 0x93}, {&(0x7f0000000780)="c335ba335cb427457c0b6d962fc8bfd1a5f1de48908670b444aab2146e4e8c9900a393f2510fc91c71cf80e0567a20b004ab11e4ca5e969180ea7eccd7baba3a07ec230f1f2beeeb3f76ef1e4e87e522cc", 0x51}, {&(0x7f0000000140)="fc078c677232f8c86e880f2881c0", 0xe}, {&(0x7f0000000800)="0de48a9349d5b224d0d8f20af434ca7bcfcd621b6ee47cb84a99c8ae0012da3a6b89c77a6d7c9ae67413f5003e5b228c936e3c52eca698d78091cc528e2ddb908f4895b6e1825650994a9101a3523e5c0b69c67698c5cbc485a9cb1975342230e33d84a4b0c9e914d172392e7e84800813c87204eeb3656173330a6e8b03def1bcd666665fa0f7df6258de5adfd237cd671bb5c3c3916b3810badface4808f6f08a26951c288619e438a", 0xaa}, {&(0x7f0000000b40)="da0aead321d442cefe62bd0f5c8fb32afc4a0a000000000000d8dd557e71a3167ad96f32beb5341437feb0ce252a873c5d548affba8960ab159b2179faab949851e7d8cd01e9429a14942a7206268baf9126705d24831274637f51de69f05773435e4020e8a68a5e8bdca0eda3ce7a28c2ec886490713b073e11b2ce1105db260a85581b46f44d1bb6917c9bc0d5d30cb2d0000000000000006955c887eed55f", 0xa0}, {&(0x7f0000000980)="a0029e043f8d383f4dc53ba03b7aa9a54a57b0e2741b774ce891ed6c86974467346d442f92516c7aa11c2a12fa68ac543bd04b51f747830f70342849d3dadfa5aa749c4781513b15ed1a5059760444e540961bccc5a39b94f9bfa47bc483d4e27ce3cec18a95beb86c9c43cee1d555c7442970edc2925d5478a87fb151bdf2217a577e848aa07131bc90f6b66494e38cf4d9a8c576561a7ae4f0405d7db0cbcabde04eccae9c00137ef5af30095efdef75d8c3440d5985486f1cb83bf9fd1ebf7101b77564842c9bc2aee9d0aeed640f45cbf98a54bd226e20d8219b52e37d278f51b4815b332cfcf14400232aadefa8244b93034a2243f8efcdb8", 0xfb}], 0x7, 0x10, 0x3ff) io_submit(0x0, 0x5, &(0x7f0000000580)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x8005, r3, &(0x7f0000000000)="8ddeb8103a7fa14dd4342c806a8d37d8638967144c45205c91b671f9515021f13595e3ce974792033d36ae826ed4115cbb98634c229dfefdc3a092b57ebc969b1f0beb38a3bed16d30976702ff1a184d3d2cbe4ed7ad157e9770fa99367ffe12b2482b5c6aeb4379b20894", 0x6b, 0x9, 0x0, 0x1, r1}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x8001, r2, &(0x7f00000000c0), 0x0, 0xffffffff00000001, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x6, r4, &(0x7f0000000280)="ba31065ea1af02bb06991a77c3f239b2b6720bf404ea5ca585483c15d088d94f97d0a49b5e9663bdebc34f15cca25095d3eff29f8de2b770725bea46bb5b7c90682f376b78fbbe6e1d8b67253aab3bfae81e2ca99603722cedeec7a5cdf676de5114c1da066c243a6f34fed104e81e09d085ec7e15f56ec0389512228b8f1bf44521157ea9404fc37ef9948dfc5b613ec80a5f7761453365261ae892a3d14b5694ae6c7584a03012c10675e0d7b2e321f7349fd32319330f66335bcf78a2259fb9e46a58c75fe63a21", 0xc9, 0x5ba0, 0x0, 0x3, r5}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x6, 0x1000, 0xffffffffffffffff, &(0x7f0000000380)="67859e6e11114a7cf870cd8b3d9107862b228ad251c6e75bef51c82f370d34bfe9be525a2467e4061d27dc9ce4b9458d0adc397e51dd33f77f26efbf0f2616eed7d8853496e0eaa4c0634c8665a3b89ded9d2390e95f368593afd36584f10af0ee0908c731c837d2465e28fb15335280e013a421320c39d04cdc35599fe4cc57d4649ef5d7de8d6cd6a839dab23743ab041244a2637a6de8aba08bdc", 0x9c, 0x4d0, 0x0, 0x2, r6}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0xfffb, r2, &(0x7f00000004c0)="499e16dcc344d507dc0f0795279ef1b33bdb9ad4ec834d4d58100359f85a2fe78af45f4c12f189429bb1f72cb4c3f76f1a18eab0eb05c63842f1bfc0", 0x3c, 0x424, 0x0, 0x2, r7}]) [ 1696.695280][T16949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1696.705332][T16949] Call Trace: [ 1696.708608][T16949] dump_stack+0x137/0x19d [ 1696.712937][T16949] should_fail+0x23c/0x250 [ 1696.717356][T16949] should_fail_usercopy+0x16/0x20 [ 1696.722391][T16949] strncpy_from_user+0x21/0x250 [ 1696.727405][T16949] getname_flags+0xb8/0x3d0 [ 1696.731913][T16949] do_mkdirat+0x3b/0x200 [ 1696.736215][T16949] __x64_sys_mkdir+0x32/0x40 [ 1696.740806][T16949] do_syscall_64+0x4a/0x90 11:38:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1696.745217][T16949] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1696.747508][T16948] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.751129][T16949] RIP: 0033:0x4656e7 [ 1696.751145][T16949] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1696.785600][T16949] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 11:38:53 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1696.791248][T16955] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1696.794010][T16949] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004656e7 [ 1696.794025][T16949] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1696.794043][T16949] RBP: 00007f6a5b60d040 R08: 0000000000000000 R09: ffffffffffffffff [ 1696.819789][T16956] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.821201][T16949] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200001c0 11:38:53 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1696.821216][T16949] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1696.856770][T16959] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.868135][T16961] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.879814][T16962] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1696.893748][T16964] loop1: detected capacity change from 0 to 136 [ 1696.894869][T16965] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.900395][T16964] FAULT_INJECTION: forcing a failure. [ 1696.900395][T16964] name failslab, interval 1, probability 0, space 0, times 0 [ 1696.923241][T16969] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.923619][T16964] CPU: 0 PID: 16964 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 11:38:53 executing program 3: sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x3f}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8081}, 0x24000010) r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1696.944788][T16964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1696.953018][T16971] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.954838][T16964] Call Trace: [ 1696.954847][T16964] dump_stack+0x137/0x19d [ 1696.973673][T16964] should_fail+0x23c/0x250 [ 1696.978157][T16964] ? ext4_alloc_inode+0x27/0x300 [ 1696.983094][T16964] __should_failslab+0x81/0x90 [ 1696.987860][T16964] ? set_qf_name+0x230/0x230 11:38:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1696.988201][T16975] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1696.992490][T16964] should_failslab+0x5/0x20 [ 1696.992515][T16964] kmem_cache_alloc+0x46/0x2f0 [ 1697.012820][T16964] ? ebitmap_destroy+0x91/0xa0 [ 1697.017714][T16964] ? set_qf_name+0x230/0x230 [ 1697.022303][T16964] ext4_alloc_inode+0x27/0x300 [ 1697.028305][T16964] ? set_qf_name+0x230/0x230 [ 1697.032903][T16964] new_inode_pseudo+0x38/0x1c0 [ 1697.037667][T16964] new_inode+0x21/0x120 [ 1697.041827][T16964] __ext4_new_inode+0x126/0x2f70 11:38:53 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1697.045107][T16976] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1697.046770][T16964] ? __dquot_initialize+0x131/0x7e0 [ 1697.046795][T16964] ext4_mkdir+0x28a/0x760 [ 1697.067398][T16964] vfs_mkdir+0x2a4/0x370 [ 1697.068043][T16978] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.071640][T16964] do_mkdirat+0x11d/0x200 [ 1697.087042][T16964] __x64_sys_mkdir+0x32/0x40 [ 1697.091638][T16964] do_syscall_64+0x4a/0x90 11:38:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1697.096056][T16964] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1697.096108][T16985] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.101956][T16964] RIP: 0033:0x4656e7 [ 1697.101976][T16964] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1697.115644][T16983] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x18000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1697.116965][T16964] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1697.116990][T16964] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004656e7 [ 1697.164151][T16964] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1697.172114][T16964] RBP: 00007f6a5b60d040 R08: 0000000000000000 R09: ffffffffffffffff [ 1697.178856][T16991] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.180082][T16964] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200001c0 11:38:53 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:53 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap$usbmon(&(0x7f00003c3000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r3, 0x1) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="20010000323c9cffff7f00c5af286400000000b19aa3804213ec450008db353d667a0db5"], 0x120}], 0x1}, 0x0) preadv(r2, &(0x7f0000000280), 0x0, 0xd9f, 0x0) pipe2$9p(&(0x7f0000000080), 0x80c00) [ 1697.180095][T16964] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1697.207530][T16992] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1697.219028][T16988] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1697.240932][T16994] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.259990][T16995] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.287304][T16996] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1697.310654][T17000] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.326984][T17004] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.338332][T17006] loop1: detected capacity change from 0 to 136 [ 1697.348892][T17006] FAULT_INJECTION: forcing a failure. [ 1697.348892][T17006] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.361524][T17006] CPU: 1 PID: 17006 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1697.371871][T17006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1697.381969][T17006] Call Trace: [ 1697.385246][T17006] dump_stack+0x137/0x19d [ 1697.389652][T17006] should_fail+0x23c/0x250 [ 1697.394095][T17006] ? security_inode_alloc+0x30/0x180 [ 1697.399417][T17006] __should_failslab+0x81/0x90 [ 1697.404220][T17006] should_failslab+0x5/0x20 [ 1697.408805][T17006] kmem_cache_alloc+0x46/0x2f0 [ 1697.413683][T17006] security_inode_alloc+0x30/0x180 [ 1697.418799][T17006] inode_init_always+0x20b/0x420 [ 1697.423732][T17006] ? set_qf_name+0x230/0x230 [ 1697.428347][T17006] new_inode_pseudo+0x73/0x1c0 [ 1697.433252][T17006] new_inode+0x21/0x120 [ 1697.437408][T17006] __ext4_new_inode+0x126/0x2f70 [ 1697.442369][T17006] ? __dquot_initialize+0x131/0x7e0 [ 1697.447580][T17006] ext4_mkdir+0x28a/0x760 [ 1697.451994][T17006] vfs_mkdir+0x2a4/0x370 [ 1697.456231][T17006] do_mkdirat+0x11d/0x200 [ 1697.460602][T17006] __x64_sys_mkdir+0x32/0x40 [ 1697.465187][T17006] do_syscall_64+0x4a/0x90 [ 1697.469604][T17006] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1697.475529][T17006] RIP: 0033:0x4656e7 [ 1697.479420][T17006] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1697.480039][T17016] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15410 sclass=netlink_route_socket pid=17016 comm=syz-executor.3 [ 1697.499036][T17006] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1697.499056][T17006] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004656e7 [ 1697.499064][T17006] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1697.499073][T17006] RBP: 00007f6a5b60d040 R08: 0000000000000000 R09: ffffffffffffffff [ 1697.499083][T17006] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200001c0 [ 1697.499093][T17006] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 11:38:54 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:54 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1697.580270][T17011] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.592092][T17018] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.606803][T17015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15410 sclass=netlink_route_socket pid=17015 comm=syz-executor.3 [ 1697.621991][T17019] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:54 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(r1, &(0x7f0000000b00)='/proc/self/exe\x00', 0xf2082, 0x14) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x0, 0x4, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/106, 0x6a}, {&(0x7f0000000080)=""/57, 0x39}, {&(0x7f00000000c0)=""/180, 0xb4}], 0x3, 0x7, 0xff) [ 1697.663369][T17027] loop1: detected capacity change from 0 to 136 [ 1697.674669][T17027] FAULT_INJECTION: forcing a failure. [ 1697.674669][T17027] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.687477][T17027] CPU: 0 PID: 17027 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1697.697701][T17027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:38:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1697.702136][T17033] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1697.707793][T17027] Call Trace: [ 1697.707817][T17027] dump_stack+0x137/0x19d [ 1697.726490][T17027] should_fail+0x23c/0x250 [ 1697.731026][T17027] ? sidtab_sid2str_get+0x9c/0x130 [ 1697.736297][T17027] __should_failslab+0x81/0x90 [ 1697.741063][T17027] should_failslab+0x5/0x20 [ 1697.741391][T17021] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.745584][T17027] __kmalloc_track_caller+0x64/0x340 [ 1697.745609][T17027] kmemdup+0x21/0x50 [ 1697.765823][T17027] sidtab_sid2str_get+0x9c/0x130 [ 1697.770820][T17027] security_sid_to_context_core+0x1cb/0x2d0 [ 1697.773004][T17032] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.776784][T17027] security_sid_to_context_force+0x2f/0x40 [ 1697.793604][T17027] selinux_inode_init_security+0x49e/0x550 [ 1697.799466][T17027] security_inode_init_security+0xd7/0x260 11:38:54 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1697.803691][T17038] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1697.805322][T17027] ? ext4_init_security+0x40/0x40 [ 1697.805344][T17027] ext4_init_security+0x30/0x40 [ 1697.805360][T17027] __ext4_new_inode+0x29a1/0x2f70 [ 1697.805379][T17027] ext4_mkdir+0x28a/0x760 [ 1697.814874][T17038] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1697.819855][T17027] vfs_mkdir+0x2a4/0x370 [ 1697.824724][T17038] tc_dump_action: action bad kind [ 1697.829694][T17027] do_mkdirat+0x11d/0x200 11:38:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1697.836171][T17031] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.843267][T17027] __x64_sys_mkdir+0x32/0x40 [ 1697.843289][T17027] do_syscall_64+0x4a/0x90 [ 1697.848918][T17037] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.852698][T17027] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1697.877240][T17041] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1697.888000][T17027] RIP: 0033:0x4656e7 11:38:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1697.888015][T17027] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1697.888030][T17027] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000213 [ 1697.895665][T17041] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1697.904974][T17027] ORIG_RAX: 0000000000000053 [ 1697.904983][T17027] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004656e7 11:38:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:54 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x1010, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000140)={&(0x7f0000000000), &(0x7f0000000040)=""/223, 0xdf}) [ 1697.904995][T17027] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1697.905025][T17027] RBP: 00007f6a5b60d040 R08: 0000000000000000 R09: ffffffffffffffff [ 1697.927495][T17038] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1697.928497][T17027] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200001c0 [ 1697.928511][T17027] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1697.949418][T17047] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:54 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:54 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1697.950573][T17038] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1697.977229][T17051] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1697.984063][T17038] tc_dump_action: action bad kind [ 1698.037346][T17048] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1698.051327][T17050] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1698.083896][T17055] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.089360][T17065] loop1: detected capacity change from 0 to 136 [ 1698.095583][T17059] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1698.104841][T17065] FAULT_INJECTION: forcing a failure. [ 1698.104841][T17065] name failslab, interval 1, probability 0, space 0, times 0 11:38:54 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000000), &(0x7f0000000040)=@v1={0x2, "05cdb6325b332fea3b32c870abfe602133"}, 0x12, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1698.116799][T17064] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.125058][T17065] CPU: 0 PID: 17065 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1698.146272][T17065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1698.156412][T17065] Call Trace: [ 1698.159687][T17065] dump_stack+0x137/0x19d [ 1698.164079][T17065] should_fail+0x23c/0x250 [ 1698.168658][T17065] ? kcalloc+0x32/0x50 [ 1698.169969][T17067] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1698.172784][T17065] __should_failslab+0x81/0x90 [ 1698.188567][T17065] should_failslab+0x5/0x20 [ 1698.193068][T17065] __kmalloc+0x66/0x340 [ 1698.197263][T17065] ? chksum_update+0x39/0x50 [ 1698.197556][T17070] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.201864][T17065] kcalloc+0x32/0x50 [ 1698.201883][T17065] ext4_find_extent+0x21c/0x7f0 [ 1698.221662][T17065] ext4_ext_map_blocks+0xd9/0x1f00 [ 1698.226909][T17065] ? __down_read_common+0x16b/0x5a0 11:38:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x26000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:54 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1698.229888][T17073] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1698.232198][T17065] ? percpu_counter_add_batch+0x69/0xd0 [ 1698.248838][T17065] ? ext4_es_lookup_extent+0x206/0x490 [ 1698.254324][T17065] ext4_map_blocks+0x1be/0xef0 [ 1698.259086][T17065] ext4_getblk+0xb1/0x3d0 [ 1698.259621][T17075] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.263709][T17065] ? __ext4_new_inode+0x2aed/0x2f70 [ 1698.263735][T17065] ext4_bread+0x28/0x130 11:38:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1698.263751][T17065] ext4_append+0xd1/0x1c0 [ 1698.288559][T17065] ext4_init_new_dir+0x177/0x500 [ 1698.293497][T17065] ext4_mkdir+0x329/0x760 [ 1698.297907][T17065] vfs_mkdir+0x2a4/0x370 [ 1698.301949][T17082] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.302145][T17065] do_mkdirat+0x11d/0x200 [ 1698.317459][T17065] __x64_sys_mkdir+0x32/0x40 [ 1698.320494][T17079] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1698.322113][T17065] do_syscall_64+0x4a/0x90 [ 1698.337650][T17065] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1698.343588][T17065] RIP: 0033:0x4656e7 [ 1698.347486][T17065] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1698.360859][T17087] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:55 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x100}) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1698.367090][T17065] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1698.367110][T17065] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004656e7 [ 1698.367122][T17065] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1698.389119][T17084] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.394733][T17065] RBP: 00007f6a5b60d040 R08: 0000000000000000 R09: ffffffffffffffff [ 1698.394747][T17065] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200001c0 11:38:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1698.394758][T17065] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1698.438782][T17088] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1698.450323][T17089] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.463332][T17091] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1698.475409][T17094] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.496578][T17095] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.508855][T17100] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.531953][T17102] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1698.544946][T17108] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1698.556234][T17106] loop1: detected capacity change from 0 to 136 [ 1698.560222][T17107] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.568179][T17106] FAULT_INJECTION: forcing a failure. [ 1698.568179][T17106] name failslab, interval 1, probability 0, space 0, times 0 [ 1698.578273][T17111] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.586152][T17106] CPU: 1 PID: 17106 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1698.607317][T17106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1698.617365][T17106] Call Trace: [ 1698.620636][T17106] dump_stack+0x137/0x19d [ 1698.624976][T17106] should_fail+0x23c/0x250 [ 1698.629391][T17120] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1698.629432][T17106] ? __es_insert_extent+0x51f/0xe70 [ 1698.645740][T17106] __should_failslab+0x81/0x90 [ 1698.645758][T17115] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.650220][T17118] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.650553][T17106] should_failslab+0x5/0x20 [ 1698.677145][T17106] kmem_cache_alloc+0x46/0x2f0 [ 1698.681956][T17106] ? iput+0x1c2/0x590 11:38:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000000)='./file0\x00', 0x2, 0x1e4) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1800007, 0x12, r1, 0xffffc000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1698.685938][T17106] __es_insert_extent+0x51f/0xe70 [ 1698.690970][T17106] ? kcalloc+0x32/0x50 [ 1698.695035][T17106] ? __kmalloc+0x23d/0x340 [ 1698.699469][T17106] ? kcalloc+0x32/0x50 [ 1698.703533][T17106] ext4_es_insert_extent+0x1bb/0x19d0 [ 1698.708984][T17106] ? ext4_ext_convert_to_initialized+0xf50/0xf50 [ 1698.710120][T17126] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.715320][T17106] ext4_ext_map_blocks+0xf79/0x1f00 [ 1698.715344][T17106] ? __down_read_common+0x16b/0x5a0 11:38:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1698.727419][T17127] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.731548][T17106] ? percpu_counter_add_batch+0x69/0xd0 [ 1698.731570][T17106] ? ext4_es_lookup_extent+0x206/0x490 [ 1698.757058][T17129] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.758801][T17106] ext4_map_blocks+0x1be/0xef0 [ 1698.758822][T17106] ext4_getblk+0xb1/0x3d0 [ 1698.778895][T17106] ? __ext4_new_inode+0x2aed/0x2f70 11:38:55 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1698.784092][T17106] ext4_bread+0x28/0x130 [ 1698.788320][T17106] ext4_append+0xd1/0x1c0 [ 1698.792707][T17106] ext4_init_new_dir+0x177/0x500 [ 1698.796279][T17130] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.797646][T17106] ext4_mkdir+0x329/0x760 [ 1698.797746][T17106] vfs_mkdir+0x2a4/0x370 [ 1698.817379][T17106] do_mkdirat+0x11d/0x200 [ 1698.821719][T17106] __x64_sys_mkdir+0x32/0x40 [ 1698.826361][T17106] do_syscall_64+0x4a/0x90 [ 1698.830977][T17106] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1698.836935][T17106] RIP: 0033:0x4656e7 [ 1698.840841][T17106] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1698.842095][T17138] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.860597][T17106] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1698.860616][T17106] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004656e7 [ 1698.875394][T17139] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.880031][T17106] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1698.880044][T17106] RBP: 00007f6a5b60d040 R08: 0000000000000000 R09: ffffffffffffffff [ 1698.880057][T17106] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200001c0 [ 1698.880065][T17106] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1698.931449][T17140] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1698.949224][T17141] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.961817][T17131] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1698.973000][T17142] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:55 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x3, 0x0) poll(&(0x7f0000000240)=[{r0, 0x400}], 0x1, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/177, 0xb1}, {&(0x7f0000000140)=""/88, 0x58}, {&(0x7f00000001c0)=""/103, 0x67}], 0x3, 0xe22, 0x195cfedb) setsockopt$inet_int(r2, 0x0, 0x32, &(0x7f0000000000)=0xcf7, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) fchown(r2, r4, 0xee00) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x50, r1, 0x62070000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1698.989527][T17143] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.006747][T17135] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.052086][T17153] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.065589][T17157] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.067951][T17156] loop1: detected capacity change from 0 to 136 [ 1699.076959][T17158] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1699.091232][T17156] FAULT_INJECTION: forcing a failure. [ 1699.091232][T17156] name failslab, interval 1, probability 0, space 0, times 0 [ 1699.106761][T17156] CPU: 1 PID: 17156 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1699.107013][T17161] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.117006][T17156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1699.117018][T17156] Call Trace: [ 1699.117025][T17156] dump_stack+0x137/0x19d [ 1699.117048][T17156] should_fail+0x23c/0x250 11:38:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1699.130828][T17162] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.138076][T17156] ? kcalloc+0x32/0x50 [ 1699.138098][T17156] __should_failslab+0x81/0x90 [ 1699.144581][T17165] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1699.145685][T17156] should_failslab+0x5/0x20 [ 1699.185630][T17156] __kmalloc+0x66/0x340 [ 1699.188990][T17168] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:55 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0, 0x4048}], 0x1, 0x85) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) syz_open_pts(r1, 0x32040) r2 = syz_open_dev$vcsa(&(0x7f0000000000), 0x4, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000040)={0x80, 0x9, 0x8, 0x1000, 0xc, "35f779ebb11b58df"}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x18) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1699.189873][T17156] ? kcalloc+0x32/0x50 [ 1699.189930][T17156] kcalloc+0x32/0x50 [ 1699.208799][T17156] ext4_find_extent+0x21c/0x7f0 [ 1699.213648][T17156] ? kfree+0xf0/0x1d0 [ 1699.217630][T17156] ext4_ext_map_blocks+0xd9/0x1f00 [ 1699.222839][T17156] ? __down_write_common+0x45/0x890 [ 1699.228072][T17156] ? __down_read_common+0x16b/0x5a0 [ 1699.230115][T17175] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1699.233285][T17156] ? percpu_counter_add_batch+0x69/0xd0 11:38:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1699.233315][T17156] ? ext4_es_lookup_extent+0x206/0x490 [ 1699.255372][T17156] ext4_map_blocks+0x70d/0xef0 [ 1699.260136][T17156] ext4_getblk+0xb1/0x3d0 [ 1699.264486][T17156] ext4_bread+0x28/0x130 [ 1699.268722][T17156] ext4_append+0xd1/0x1c0 [ 1699.273045][T17156] ext4_init_new_dir+0x177/0x500 [ 1699.277299][T17177] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.277977][T17156] ext4_mkdir+0x329/0x760 [ 1699.278000][T17156] vfs_mkdir+0x2a4/0x370 [ 1699.295055][T17176] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1699.297661][T17156] do_mkdirat+0x11d/0x200 [ 1699.297682][T17156] __x64_sys_mkdir+0x32/0x40 [ 1699.317701][T17156] do_syscall_64+0x4a/0x90 [ 1699.322133][T17156] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1699.328211][T17156] RIP: 0033:0x4656e7 [ 1699.329296][T17180] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.332193][T17156] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1699.332211][T17156] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000213 [ 1699.344922][T17178] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.362905][T17156] ORIG_RAX: 0000000000000053 [ 1699.362916][T17156] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004656e7 [ 1699.362928][T17156] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 11:38:56 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1699.362938][T17156] RBP: 00007f6a5b60d040 R08: 0000000000000000 R09: ffffffffffffffff [ 1699.362949][T17156] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200001c0 [ 1699.362959][T17156] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1699.391058][T17182] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.435989][T17185] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1699.447548][T17186] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1699.473649][T17191] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1699.493375][T17197] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.515603][T17201] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.525338][T17202] loop1: detected capacity change from 0 to 136 [ 1699.526907][T17200] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.536481][T17202] FAULT_INJECTION: forcing a failure. 11:38:56 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000040)=""/45, 0x2d}) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/156, 0x9c}, {&(0x7f0000000280)=""/163, 0xa3}, {&(0x7f0000000180)=""/34, 0x22}, {&(0x7f0000000340)=""/103, 0x67}, {&(0x7f00000003c0)=""/118, 0x76}, {&(0x7f0000000440)=""/173, 0xad}, {&(0x7f0000000500)=""/65, 0x41}], 0x7, 0xc8f3, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1699.536481][T17202] name failslab, interval 1, probability 0, space 0, times 0 [ 1699.556518][T17202] CPU: 1 PID: 17202 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1699.556589][T17202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1699.556599][T17202] Call Trace: [ 1699.556605][T17202] dump_stack+0x137/0x19d [ 1699.556625][T17202] should_fail+0x23c/0x250 [ 1699.556640][T17202] ? ext4_mb_new_blocks+0x2e7/0x1f90 [ 1699.556660][T17202] __should_failslab+0x81/0x90 [ 1699.556683][T17202] should_failslab+0x5/0x20 11:38:56 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1699.556706][T17202] kmem_cache_alloc+0x46/0x2f0 [ 1699.556778][T17202] ext4_mb_new_blocks+0x2e7/0x1f90 [ 1699.556799][T17202] ? ext4_find_extent+0x6cf/0x7f0 [ 1699.556814][T17202] ? ext4_ext_search_right+0x300/0x540 [ 1699.556911][T17202] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 1699.556932][T17202] ext4_ext_map_blocks+0x1569/0x1f00 [ 1699.556952][T17202] ? __down_read_common+0x16b/0x5a0 [ 1699.556970][T17202] ? percpu_counter_add_batch+0x69/0xd0 [ 1699.556985][T17202] ? ext4_es_lookup_extent+0x206/0x490 [ 1699.557026][T17202] ext4_map_blocks+0x70d/0xef0 [ 1699.557044][T17202] ext4_getblk+0xb1/0x3d0 [ 1699.557061][T17202] ext4_bread+0x28/0x130 [ 1699.557077][T17202] ext4_append+0xd1/0x1c0 [ 1699.557121][T17202] ext4_init_new_dir+0x177/0x500 [ 1699.557139][T17202] ext4_mkdir+0x329/0x760 [ 1699.557207][T17202] vfs_mkdir+0x2a4/0x370 [ 1699.557232][T17202] do_mkdirat+0x11d/0x200 [ 1699.557294][T17202] __x64_sys_mkdir+0x32/0x40 [ 1699.557307][T17202] do_syscall_64+0x4a/0x90 [ 1699.557322][T17202] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1699.557341][T17202] RIP: 0033:0x4656e7 [ 1699.557356][T17202] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1699.568629][T17199] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.577563][T17202] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1699.604143][T17205] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1699.608797][T17202] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004656e7 [ 1699.608810][T17202] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1699.608822][T17202] RBP: 00007f6a5b60d040 R08: 0000000000000000 R09: ffffffffffffffff [ 1699.618987][T17210] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.624346][T17202] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200001c0 11:38:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1699.633442][T17212] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.635316][T17202] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1699.818744][T17211] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.835149][T17217] loop1: detected capacity change from 0 to 136 [ 1699.840024][T17213] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1699.848894][T17217] FAULT_INJECTION: forcing a failure. [ 1699.848894][T17217] name failslab, interval 1, probability 0, space 0, times 0 [ 1699.860960][T17216] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.865172][T17217] CPU: 1 PID: 17217 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1699.886382][T17217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1699.886622][T17226] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.896423][T17217] Call Trace: [ 1699.896432][T17217] dump_stack+0x137/0x19d [ 1699.908985][T17227] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.910847][T17217] should_fail+0x23c/0x250 [ 1699.928159][T17228] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.930543][T17217] ? __es_insert_extent+0x51f/0xe70 [ 1699.946935][T17217] __should_failslab+0x81/0x90 [ 1699.951708][T17217] should_failslab+0x5/0x20 [ 1699.956244][T17217] kmem_cache_alloc+0x46/0x2f0 [ 1699.961041][T17217] __es_insert_extent+0x51f/0xe70 [ 1699.964069][T17230] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.966160][T17217] ? ext4_ext_map_blocks+0x10a8/0x1f00 [ 1699.982626][T17217] ext4_es_insert_extent+0x1bb/0x19d0 [ 1699.988003][T17217] ? percpu_counter_add_batch+0x69/0xd0 [ 1699.988019][T17232] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1699.988101][T17233] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1699.993646][T17217] ? ext4_es_lookup_extent+0x206/0x490 [ 1699.993670][T17217] ext4_map_blocks+0xa4c/0xef0 [ 1699.993687][T17217] ext4_getblk+0xb1/0x3d0 [ 1700.030219][T17217] ext4_bread+0x28/0x130 [ 1700.031394][T17234] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1700.034459][T17217] ext4_append+0xd1/0x1c0 [ 1700.034483][T17217] ext4_init_new_dir+0x177/0x500 [ 1700.051905][T17236] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.055249][T17217] ext4_mkdir+0x329/0x760 [ 1700.055275][T17217] vfs_mkdir+0x2a4/0x370 [ 1700.074828][T17217] do_mkdirat+0x11d/0x200 [ 1700.079182][T17217] __x64_sys_mkdir+0x32/0x40 [ 1700.083840][T17217] do_syscall_64+0x4a/0x90 [ 1700.083992][T17238] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.088270][T17217] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1700.088290][T17217] RIP: 0033:0x4656e7 [ 1700.088302][T17217] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1700.088317][T17217] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000213 [ 1700.107556][T17239] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.109034][T17217] ORIG_RAX: 0000000000000053 11:38:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x86000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:56 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1700.109041][T17217] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004656e7 [ 1700.109052][T17217] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1700.109063][T17217] RBP: 00007f6a5b60d040 R08: 0000000000000000 R09: ffffffffffffffff [ 1700.139431][T17241] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.145744][T17217] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200001c0 [ 1700.145757][T17217] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1700.162617][T17242] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1700.214852][T17244] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.226694][T17245] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.238448][T17247] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.250624][T17250] loop1: detected capacity change from 0 to 136 [ 1700.250690][T17248] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1700.259288][T17250] FAULT_INJECTION: forcing a failure. [ 1700.259288][T17250] name failslab, interval 1, probability 0, space 0, times 0 [ 1700.276076][T17252] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.280779][T17250] CPU: 1 PID: 17250 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1700.301641][T17255] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.302073][T17250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1700.323097][T17250] Call Trace: [ 1700.326366][T17250] dump_stack+0x137/0x19d [ 1700.330691][T17250] should_fail+0x23c/0x250 [ 1700.335107][T17250] ? __es_insert_extent+0x51f/0xe70 [ 1700.340355][T17250] __should_failslab+0x81/0x90 [ 1700.345180][T17250] should_failslab+0x5/0x20 [ 1700.349731][T17250] kmem_cache_alloc+0x46/0x2f0 [ 1700.354657][T17250] __es_insert_extent+0x51f/0xe70 [ 1700.359790][T17250] ? ext4_ext_map_blocks+0x10a8/0x1f00 [ 1700.365317][T17250] ext4_es_insert_extent+0x1bb/0x19d0 [ 1700.370686][T17250] ? percpu_counter_add_batch+0x69/0xd0 [ 1700.376213][T17250] ? ext4_es_lookup_extent+0x206/0x490 [ 1700.381742][T17250] ext4_map_blocks+0xa4c/0xef0 [ 1700.386612][T17250] ext4_getblk+0xb1/0x3d0 [ 1700.390973][T17250] ext4_bread+0x28/0x130 [ 1700.395195][T17250] ext4_append+0xd1/0x1c0 [ 1700.399507][T17250] ext4_init_new_dir+0x177/0x500 [ 1700.404458][T17250] ext4_mkdir+0x329/0x760 [ 1700.408802][T17250] vfs_mkdir+0x2a4/0x370 [ 1700.413027][T17250] do_mkdirat+0x11d/0x200 [ 1700.417379][T17250] __x64_sys_mkdir+0x32/0x40 [ 1700.422001][T17250] do_syscall_64+0x4a/0x90 [ 1700.426444][T17250] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1700.432405][T17250] RIP: 0033:0x4656e7 [ 1700.436294][T17250] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1700.455976][T17250] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1700.464488][T17250] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 00000000004656e7 [ 1700.472448][T17250] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1700.480425][T17250] RBP: 00007f6a5b60d040 R08: 0000000000000000 R09: ffffffffffffffff [ 1700.488463][T17250] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200001c0 [ 1700.496410][T17250] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 11:38:57 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$sock_netdev_private(r1, 0x89f3, &(0x7f0000000000)="6ec2a503c3460a4e1668935a58aa723a74a784286472a598d67cc21852741861c6cb5752801065b1206bf9ac7909e019c66a2f812caa3ec1091de3e0f9a284bb25aac13db6991e9b14d2833f89ac5afa6d75e94cb88f3354c595a01c279a2b369aba9c9b7660c23a4adcfdbb7528e1c28390a093be7b48011607509a87248a38999e4b105bc68a764fcead2f1275f45a9f6cc06d6ebed1939077695349ce2a9b0f") preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0x57, 0x2, 0x0, "4e113e246ffa87a3a44a81cb2e854708", "5ee7eb94b0e80d6bb5418d499e2256143ecba40bca8451e4747fa32b51a312dd1b6c1d564ecb1fb7b9a54d36a47d586e4581b5d06ba8c7fe549c15fad71a1486150b"}, 0x57, 0x2) 11:38:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:57 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1700.613322][T17271] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.622472][T17270] loop1: detected capacity change from 0 to 136 [ 1700.625372][T17276] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.635165][T17270] FAULT_INJECTION: forcing a failure. [ 1700.635165][T17270] name failslab, interval 1, probability 0, space 0, times 0 [ 1700.647529][T17272] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1700.654548][T17270] CPU: 0 PID: 17270 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1700.654569][T17270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1700.654578][T17270] Call Trace: [ 1700.654583][T17270] dump_stack+0x137/0x19d [ 1700.654612][T17270] should_fail+0x23c/0x250 [ 1700.667614][T17274] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.675905][T17270] ? __se_sys_mount+0x4e/0x2e0 [ 1700.675927][T17270] __should_failslab+0x81/0x90 [ 1700.675949][T17270] should_failslab+0x5/0x20 [ 1700.690466][T17279] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.693584][T17270] __kmalloc_track_caller+0x64/0x340 [ 1700.693610][T17270] ? strnlen_user+0x137/0x1c0 [ 1700.693626][T17270] strndup_user+0x73/0x120 [ 1700.699416][T17280] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.709055][T17270] __se_sys_mount+0x4e/0x2e0 11:38:57 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x86c0, 0x21) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000180)={&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000080)=""/231, 0xe7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd8030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1700.709075][T17270] ? mntput+0x45/0x70 [ 1700.732289][T17282] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1700.734187][T17270] ? __fpregs_load_activate+0x103/0x1b0 [ 1700.734270][T17270] __x64_sys_mount+0x63/0x70 [ 1700.740396][T17283] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.744139][T17270] do_syscall_64+0x4a/0x90 [ 1700.744162][T17270] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1700.744185][T17270] RIP: 0033:0x467afa [ 1700.744195][T17270] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1700.744208][T17270] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1700.825242][T17290] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.834343][T17270] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa 11:38:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1700.834358][T17270] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1700.834370][T17270] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1700.834381][T17270] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1700.864064][T17291] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.869679][T17270] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 11:38:57 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1700.905365][T17289] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1700.917605][T17292] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.929335][T17293] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.942794][T17297] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1700.954551][T17298] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.967037][T17302] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.980612][T17303] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1700.988405][T17305] loop1: detected capacity change from 0 to 136 [ 1700.999612][T17305] FAULT_INJECTION: forcing a failure. [ 1700.999612][T17305] name fail_usercopy, interval 1, probability 0, space 0, times 0 11:38:57 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$MON_IOCQ_RING_SIZE(r4, 0x9205) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0xce, 0x7, 0x5ea2}, {0x3, 0x7, 0x43, 0x4}, {0x0, 0x1, 0x3f, 0x9}, {0x1fa, 0x3, 0x0, 0x3}]}, 0x10) sendmsg$netlink(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="2001000000008000080000000a01080001"], 0x120}], 0x1}, 0x0) dup2(r2, r3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x18}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1701.012667][T17305] CPU: 0 PID: 17305 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1701.022308][T17307] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.022806][T17305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1701.043873][T17305] Call Trace: [ 1701.047147][T17305] dump_stack+0x137/0x19d [ 1701.048016][T17313] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1701.051468][T17305] should_fail+0x23c/0x250 [ 1701.051487][T17305] should_fail_usercopy+0x16/0x20 [ 1701.071887][T17305] _copy_from_user+0x1c/0xd0 [ 1701.076491][T17305] strndup_user+0xb0/0x120 [ 1701.080907][T17305] __se_sys_mount+0x4e/0x2e0 [ 1701.085501][T17305] ? mntput+0x45/0x70 [ 1701.089509][T17305] ? do_mkdirat+0x1c7/0x200 [ 1701.094050][T17305] __x64_sys_mount+0x63/0x70 [ 1701.098662][T17305] do_syscall_64+0x4a/0x90 [ 1701.103082][T17305] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1701.109054][T17305] RIP: 0033:0x467afa 11:38:57 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1701.112943][T17305] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1701.116919][T17314] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1701.132776][T17305] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1701.132792][T17305] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1701.132800][T17305] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1701.132810][T17305] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1701.132819][T17305] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1701.132829][T17305] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1701.192557][T17322] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1701.201968][T17322] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1701.207230][T17319] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.211181][T17322] tc_dump_action: action bad kind [ 1701.212449][T17322] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17322 comm=syz-executor.3 [ 1701.222669][T17320] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.241193][T17325] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1701.260155][T17327] loop1: detected capacity change from 0 to 136 [ 1701.260555][T17325] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1701.269131][T17327] FAULT_INJECTION: forcing a failure. [ 1701.269131][T17327] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1701.276337][T17325] tc_dump_action: action bad kind [ 1701.287261][T17321] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.289353][T17327] CPU: 0 PID: 17327 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1701.296779][T17323] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1701.305352][T17327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1701.305363][T17327] Call Trace: [ 1701.305370][T17327] dump_stack+0x137/0x19d [ 1701.318848][T17322] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17322 comm=syz-executor.3 [ 1701.326635][T17327] should_fail+0x23c/0x250 [ 1701.326655][T17327] should_fail_usercopy+0x16/0x20 [ 1701.326672][T17327] _copy_from_user+0x1c/0xd0 [ 1701.350570][T17324] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.357034][T17327] strndup_user+0xb0/0x120 [ 1701.357056][T17327] __se_sys_mount+0x91/0x2e0 [ 1701.357072][T17327] ? mntput+0x45/0x70 [ 1701.374408][T17333] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.382046][T17327] ? do_mkdirat+0x1c7/0x200 [ 1701.382069][T17327] __x64_sys_mount+0x63/0x70 11:38:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x18000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:58 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x82) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1701.415367][T17327] do_syscall_64+0x4a/0x90 [ 1701.419864][T17327] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1701.425872][T17327] RIP: 0033:0x467afa [ 1701.429763][T17327] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1701.449393][T17327] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1701.455761][T17341] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.457813][T17327] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1701.457832][T17327] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1701.482923][T17344] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1701.484955][T17327] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1701.484970][T17327] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 11:38:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1701.497260][T17336] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.504318][T17327] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1701.531542][T17343] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.543020][T17345] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1701.556272][T17346] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:58 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1701.567891][T17342] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.597366][T17354] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.615049][T17356] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.626282][T17360] loop1: detected capacity change from 0 to 136 [ 1701.636968][T17360] FAULT_INJECTION: forcing a failure. [ 1701.636968][T17360] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1701.650129][T17360] CPU: 1 PID: 17360 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 11:38:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) getsockname(r0, &(0x7f0000000040)=@in={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x80) r1 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r1}], 0x1, 0x81) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:38:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1701.650716][T17355] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1701.660380][T17360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1701.660393][T17360] Call Trace: [ 1701.660400][T17360] dump_stack+0x137/0x19d [ 1701.687770][T17364] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.689174][T17360] should_fail+0x23c/0x250 [ 1701.704774][T17360] should_fail_usercopy+0x16/0x20 11:38:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1701.708918][T17367] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.709811][T17360] _copy_from_user+0x1c/0xd0 [ 1701.725425][T17360] strndup_user+0xb0/0x120 [ 1701.729838][T17360] __se_sys_mount+0x91/0x2e0 [ 1701.734448][T17360] ? mntput+0x45/0x70 [ 1701.738139][T17369] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1701.738447][T17360] ? __fpregs_load_activate+0x103/0x1b0 [ 1701.755133][T17360] __x64_sys_mount+0x63/0x70 [ 1701.759732][T17360] do_syscall_64+0x4a/0x90 11:38:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1701.764217][T17360] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1701.770126][T17360] RIP: 0033:0x467afa [ 1701.774021][T17360] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1701.781665][T17368] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.793796][T17360] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 11:38:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x30}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1701.793817][T17360] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1701.821183][T17360] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1701.826283][T17372] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.829199][T17360] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1701.848233][T17360] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1701.856197][T17360] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 11:38:58 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1701.859070][T17377] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.876398][T17381] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.887935][T17378] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1701.899640][T17382] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1701.927511][T17383] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.938727][T17389] loop1: detected capacity change from 0 to 136 [ 1701.938748][T17384] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1701.956511][T17385] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1701.968271][T17389] FAULT_INJECTION: forcing a failure. 11:38:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x26000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1701.968271][T17389] name failslab, interval 1, probability 0, space 0, times 0 [ 1701.981013][T17389] CPU: 1 PID: 17389 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1701.991256][T17389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1702.001340][T17389] Call Trace: [ 1702.004213][T17392] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.004797][T17389] dump_stack+0x137/0x19d [ 1702.004819][T17389] should_fail+0x23c/0x250 11:38:58 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xc0002, 0x0) poll(&(0x7f0000000240)=[{r1}], 0x1, 0x81) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0x8000da1, 0x0) 11:38:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1702.004833][T17389] __should_failslab+0x81/0x90 [ 1702.029454][T17389] ? __se_sys_mount+0xf2/0x2e0 [ 1702.031812][T17399] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.034233][T17389] should_failslab+0x5/0x20 [ 1702.034259][T17389] kmem_cache_alloc_trace+0x49/0x310 [ 1702.055228][T17389] ? _copy_from_user+0x94/0xd0 [ 1702.059990][T17389] __se_sys_mount+0xf2/0x2e0 [ 1702.064578][T17389] ? mntput+0x45/0x70 [ 1702.068558][T17389] ? do_mkdirat+0x1c7/0x200 [ 1702.073156][T17389] __x64_sys_mount+0x63/0x70 [ 1702.077795][T17389] do_syscall_64+0x4a/0x90 [ 1702.082222][T17389] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1702.088217][T17389] RIP: 0033:0x467afa [ 1702.092209][T17389] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1702.096905][T17398] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.111809][T17389] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1702.111848][T17389] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1702.111859][T17389] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1702.127783][T17403] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1702.131347][T17389] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1702.131361][T17389] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 11:38:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:58 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1702.142607][T17405] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.147375][T17389] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1702.193746][T17406] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.205344][T17407] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:58 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3, 0x635}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1702.226426][T17408] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.255675][T17414] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1702.272598][T17418] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.284865][T17419] loop1: detected capacity change from 0 to 136 [ 1702.296746][T17419] FAULT_INJECTION: forcing a failure. [ 1702.296746][T17419] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1702.297033][T17424] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.309966][T17419] CPU: 0 PID: 17419 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1702.331078][T17419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1702.341173][T17419] Call Trace: [ 1702.344489][T17419] dump_stack+0x137/0x19d [ 1702.348819][T17419] should_fail+0x23c/0x250 [ 1702.350402][T17425] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.353258][T17419] should_fail_usercopy+0x16/0x20 [ 1702.353279][T17419] _copy_from_user+0x1c/0xd0 11:38:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:59 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1702.364663][T17430] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1702.369404][T17419] __se_sys_mount+0x115/0x2e0 [ 1702.369423][T17419] ? mntput+0x45/0x70 [ 1702.383044][T17432] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.385065][T17419] ? __fpregs_load_activate+0x103/0x1b0 [ 1702.390478][T17433] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.393693][T17419] __x64_sys_mount+0x63/0x70 11:38:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1702.393714][T17419] do_syscall_64+0x4a/0x90 [ 1702.393734][T17419] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1702.412802][T17434] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.421905][T17419] RIP: 0033:0x467afa [ 1702.421925][T17419] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1702.421937][T17419] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 11:38:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1702.421951][T17419] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1702.421961][T17419] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1702.454144][T17435] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1702.471544][T17419] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1702.471561][T17419] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 11:38:59 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1702.471572][T17419] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1702.531735][T17439] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.550348][T17441] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.561614][T17443] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.585351][T17446] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1702.603766][T17439] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.607693][T17453] loop1: detected capacity change from 0 to 136 [ 1702.615339][T17445] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:38:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:59 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1702.623748][T17453] FAULT_INJECTION: forcing a failure. [ 1702.623748][T17453] name failslab, interval 1, probability 0, space 0, times 0 [ 1702.637912][T17452] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.644827][T17453] CPU: 0 PID: 17453 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1702.644848][T17453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1702.676003][T17453] Call Trace: [ 1702.679295][T17453] dump_stack+0x137/0x19d 11:38:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1702.683637][T17453] should_fail+0x23c/0x250 [ 1702.688046][T17453] ? getname_flags+0x84/0x3d0 [ 1702.692736][T17453] __should_failslab+0x81/0x90 [ 1702.693477][T17455] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1702.697507][T17453] should_failslab+0x5/0x20 [ 1702.697533][T17453] kmem_cache_alloc+0x46/0x2f0 [ 1702.717882][T17453] getname_flags+0x84/0x3d0 [ 1702.722387][T17453] ? should_fail+0xd6/0x250 11:38:59 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1702.724645][T17460] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.726883][T17453] user_path_at_empty+0x28/0x50 [ 1702.726904][T17453] __se_sys_mount+0x209/0x2e0 [ 1702.726919][T17453] ? mntput+0x45/0x70 [ 1702.726940][T17453] ? __fpregs_load_activate+0x103/0x1b0 [ 1702.749075][T17461] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.751428][T17453] __x64_sys_mount+0x63/0x70 [ 1702.751448][T17453] do_syscall_64+0x4a/0x90 11:38:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1702.767803][T17465] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.768091][T17453] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1702.768114][T17453] RIP: 0033:0x467afa [ 1702.768125][T17453] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1702.768139][T17453] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1702.768153][T17453] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1702.768162][T17453] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1702.775262][T17463] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.777151][T17453] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1702.777166][T17453] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1702.804868][T17464] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.817711][T17453] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1702.888913][T17466] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.903679][T17469] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.916969][T17470] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1702.932397][T17473] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1702.945103][T17474] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:38:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:59 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:38:59 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:38:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1703.221689][T17484] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1703.233612][T17485] loop1: detected capacity change from 0 to 136 [ 1703.233973][T17487] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1703.244878][T17485] FAULT_INJECTION: forcing a failure. [ 1703.244878][T17485] name fail_usercopy, interval 1, probability 0, space 0, times 0 11:38:59 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1703.255043][T17489] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1703.264212][T17485] CPU: 0 PID: 17485 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1703.264284][T17485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1703.295478][T17485] Call Trace: [ 1703.298886][T17485] dump_stack+0x137/0x19d [ 1703.303218][T17485] should_fail+0x23c/0x250 [ 1703.307702][T17485] should_fail_usercopy+0x16/0x20 [ 1703.312734][T17485] strncpy_from_user+0x21/0x250 [ 1703.317621][T17485] getname_flags+0xb8/0x3d0 [ 1703.322123][T17485] ? should_fail+0xd6/0x250 [ 1703.326697][T17485] user_path_at_empty+0x28/0x50 [ 1703.331689][T17485] __se_sys_mount+0x209/0x2e0 [ 1703.336380][T17485] ? mntput+0x45/0x70 [ 1703.340386][T17485] ? __fpregs_load_activate+0x103/0x1b0 [ 1703.345935][T17485] __x64_sys_mount+0x63/0x70 [ 1703.350524][T17485] do_syscall_64+0x4a/0x90 [ 1703.355034][T17485] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1703.361080][T17485] RIP: 0033:0x467afa [ 1703.364968][T17485] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.384569][T17485] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1703.386632][T17486] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1703.392999][T17485] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1703.393012][T17485] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 11:39:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1703.393022][T17485] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1703.393032][T17485] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1703.420516][T17483] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1703.428004][T17485] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1703.455669][T17493] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1703.467583][T17494] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1703.485427][T17496] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1703.499878][T17495] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:00 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1703.521310][T17497] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1703.548057][T17502] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:00 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1703.574564][T17499] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1703.589492][T17503] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1703.625932][T17505] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1703.641185][T17509] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1703.671222][T17510] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1703.682397][T17513] loop1: detected capacity change from 0 to 136 [ 1703.702849][T17511] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1703.720798][T17513] FAULT_INJECTION: forcing a failure. [ 1703.720798][T17513] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1703.733892][T17513] CPU: 1 PID: 17513 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1703.744116][T17513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1703.754166][T17513] Call Trace: [ 1703.757442][T17513] dump_stack+0x137/0x19d [ 1703.761771][T17513] should_fail+0x23c/0x250 [ 1703.766208][T17513] should_fail_usercopy+0x16/0x20 [ 1703.771228][T17513] strncpy_from_user+0x21/0x250 [ 1703.776157][T17513] getname_flags+0xb8/0x3d0 [ 1703.780656][T17513] ? should_fail+0xd6/0x250 [ 1703.785158][T17513] user_path_at_empty+0x28/0x50 [ 1703.790023][T17513] __se_sys_mount+0x209/0x2e0 [ 1703.794761][T17513] ? mntput+0x45/0x70 [ 1703.798746][T17513] ? __fpregs_load_activate+0x103/0x1b0 [ 1703.804299][T17513] __x64_sys_mount+0x63/0x70 [ 1703.808900][T17513] do_syscall_64+0x4a/0x90 [ 1703.813381][T17513] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1703.819314][T17513] RIP: 0033:0x467afa [ 1703.823198][T17513] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.842803][T17513] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1703.851213][T17513] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1703.859178][T17513] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1703.867138][T17513] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 11:39:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1703.875103][T17513] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1703.883172][T17513] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1703.908247][T17519] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:00 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1703.939764][T17520] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:00 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/xfrm_stat\x00') r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r3, 0x8, 0x70bd25, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$SMC_PNETID_DEL(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'gretap0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'gre0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x40}, 0x20040844) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/73, 0x49}], 0x1, 0xd9f, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000a, 0x4000010, r1, 0xe7ea8000) [ 1703.982702][T17523] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.010070][T17526] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.021492][T17527] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:00 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1704.033543][T17528] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1704.050879][T17529] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.077231][T17539] loop1: detected capacity change from 0 to 136 11:39:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1704.077233][T17530] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.077395][T17531] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.086129][T17539] FAULT_INJECTION: forcing a failure. [ 1704.086129][T17539] name failslab, interval 1, probability 0, space 0, times 0 [ 1704.118128][T17539] CPU: 0 PID: 17539 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 11:39:00 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1704.122338][T17534] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1704.128285][T17539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1704.128296][T17539] Call Trace: [ 1704.128303][T17539] dump_stack+0x137/0x19d [ 1704.128325][T17539] should_fail+0x23c/0x250 [ 1704.161399][T17539] __should_failslab+0x81/0x90 [ 1704.166165][T17539] ? legacy_init_fs_context+0x2d/0x70 [ 1704.171528][T17539] should_failslab+0x5/0x20 [ 1704.176086][T17539] kmem_cache_alloc_trace+0x49/0x310 [ 1704.179248][T17546] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.181418][T17539] ? kmem_cache_alloc_trace+0x215/0x310 [ 1704.181442][T17539] ? alloc_fs_context+0x46/0x500 [ 1704.202863][T17539] legacy_init_fs_context+0x2d/0x70 [ 1704.208136][T17539] alloc_fs_context+0x419/0x500 [ 1704.213005][T17539] fs_context_for_mount+0x1d/0x20 [ 1704.218021][T17539] path_mount+0xdf5/0x1ce0 [ 1704.222423][T17539] __se_sys_mount+0x23d/0x2e0 [ 1704.227181][T17539] ? mntput+0x45/0x70 11:39:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1704.228478][T17547] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.231164][T17539] ? __fpregs_load_activate+0x103/0x1b0 [ 1704.231189][T17539] __x64_sys_mount+0x63/0x70 [ 1704.242474][T17550] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.247694][T17539] do_syscall_64+0x4a/0x90 [ 1704.247714][T17539] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1704.247734][T17539] RIP: 0033:0x467afa 11:39:00 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1704.258560][T17552] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.263283][T17539] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1704.263302][T17539] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1704.263320][T17539] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa 11:39:01 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000140)={&(0x7f0000000000), &(0x7f0000000040)=""/222, 0xde}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1704.285620][T17556] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.288439][T17539] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1704.288452][T17539] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1704.351355][T17539] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1704.359319][T17539] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1704.362488][T17557] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x70020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1704.380772][T17564] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.391959][T17565] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.403546][T17563] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.414986][T17560] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:01 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1704.426339][T17568] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.437608][T17569] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.454095][T17570] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1704.478834][T17576] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1704.498947][T17580] loop1: detected capacity change from 0 to 136 [ 1704.508607][T17580] FAULT_INJECTION: forcing a failure. [ 1704.508607][T17580] name failslab, interval 1, probability 0, space 0, times 0 [ 1704.512418][T17584] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:01 executing program 3: prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) 11:39:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1704.521207][T17580] CPU: 0 PID: 17580 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1704.542527][T17580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1704.552574][T17580] Call Trace: [ 1704.554512][T17583] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.555839][T17580] dump_stack+0x137/0x19d [ 1704.571151][T17580] should_fail+0x23c/0x250 [ 1704.575643][T17580] ? vfs_parse_fs_string+0x5e/0xc0 [ 1704.580794][T17580] __should_failslab+0x81/0x90 [ 1704.581459][T17588] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.585550][T17580] should_failslab+0x5/0x20 [ 1704.601092][T17580] __kmalloc_track_caller+0x64/0x340 [ 1704.606368][T17580] kmemdup_nul+0x27/0x70 [ 1704.610711][T17580] vfs_parse_fs_string+0x5e/0xc0 [ 1704.610821][T17591] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.615634][T17580] path_mount+0xf99/0x1ce0 [ 1704.615650][T17580] __se_sys_mount+0x23d/0x2e0 11:39:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1704.615665][T17580] ? mntput+0x45/0x70 [ 1704.627172][T17593] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1704.631069][T17580] ? __fpregs_load_activate+0x103/0x1b0 [ 1704.631093][T17580] __x64_sys_mount+0x63/0x70 [ 1704.646533][T17594] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.650773][T17580] do_syscall_64+0x4a/0x90 [ 1704.676251][T17580] entry_SYSCALL_64_after_hwframe+0x44/0xae 11:39:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1704.681611][T17595] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1704.682138][T17580] RIP: 0033:0x467afa [ 1704.697088][T17580] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1704.712105][T17596] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.716685][T17580] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1704.716706][T17580] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1704.716718][T17580] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1704.752093][T17580] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1704.754108][T17599] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.760056][T17580] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1704.760070][T17580] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 11:39:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:01 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1704.787283][T17603] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.798730][T17605] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1704.812851][T17604] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:01 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10be7c) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x7b003) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/174, 0xae}, {&(0x7f0000000280)=""/135, 0x87}, {&(0x7f0000000140)=""/103, 0x67}], 0x3, 0xd9f, 0x6) r3 = openat2(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)={0x781300, 0x180, 0x12}, 0x18) ioctl$TIOCNOTTY(r3, 0x5422) 11:39:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1704.834463][T17606] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.851898][T17611] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1704.877444][T17619] loop1: detected capacity change from 0 to 136 [ 1704.883516][T17613] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.887724][T17619] FAULT_INJECTION: forcing a failure. [ 1704.887724][T17619] name failslab, interval 1, probability 0, space 0, times 0 [ 1704.907410][T17619] CPU: 0 PID: 17619 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1704.917556][T17619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:39:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1704.919560][T17617] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.927620][T17619] Call Trace: [ 1704.927629][T17619] dump_stack+0x137/0x19d [ 1704.927665][T17619] should_fail+0x23c/0x250 [ 1704.945586][T17625] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.946237][T17619] ? isofs_mount+0x40/0x40 [ 1704.950728][T17626] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1704.961767][T17619] ? getname_kernel+0x37/0x1d0 [ 1704.961793][T17619] __should_failslab+0x81/0x90 [ 1704.986683][T17619] should_failslab+0x5/0x20 [ 1704.991289][T17619] kmem_cache_alloc+0x46/0x2f0 [ 1704.996048][T17619] ? avc_has_perm_noaudit+0x19a/0x240 [ 1705.001499][T17619] ? isofs_mount+0x40/0x40 [ 1705.005916][T17619] getname_kernel+0x37/0x1d0 [ 1705.010504][T17619] ? isofs_mount+0x40/0x40 [ 1705.014918][T17619] kern_path+0x19/0x40 [ 1705.018980][T17619] blkdev_get_by_path+0x54/0x1b0 [ 1705.019906][T17630] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.023992][T17619] mount_bdev+0x47/0x290 [ 1705.039315][T17619] ? _isofs_bmap+0x30/0x30 [ 1705.040043][T17632] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.043746][T17619] isofs_mount+0x2d/0x40 [ 1705.043773][T17619] legacy_get_tree+0x70/0xc0 [ 1705.043793][T17619] vfs_get_tree+0x4a/0x1a0 [ 1705.064542][T17633] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.067927][T17619] path_mount+0x11d4/0x1ce0 [ 1705.067943][T17619] __se_sys_mount+0x23d/0x2e0 11:39:01 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x12, r1, 0x100000001) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xd0030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.067958][T17619] ? mntput+0x45/0x70 [ 1705.067973][T17619] __x64_sys_mount+0x63/0x70 [ 1705.096597][T17619] do_syscall_64+0x4a/0x90 [ 1705.101020][T17619] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1705.101834][T17636] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.106908][T17619] RIP: 0033:0x467afa 11:39:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.121850][T17619] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1705.141444][T17619] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1705.149849][T17619] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1705.157804][T17619] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1705.165770][T17619] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1705.173901][T17619] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 11:39:01 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1705.177483][T17641] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.181860][T17619] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1705.201338][T17645] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1705.213458][T17643] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.231504][T17646] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.244198][T17650] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1705.255759][T17652] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.267769][T17654] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:02 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x8200, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x1ff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='./file0\x00', 0x0, 0x47) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1705.282818][T17655] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.294218][T17660] loop1: detected capacity change from 0 to 136 [ 1705.302053][T17660] FAULT_INJECTION: forcing a failure. [ 1705.302053][T17660] name failslab, interval 1, probability 0, space 0, times 0 [ 1705.314672][T17660] CPU: 0 PID: 17660 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1705.324814][T17660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:39:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.326386][T17659] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.334884][T17660] Call Trace: [ 1705.334892][T17660] dump_stack+0x137/0x19d [ 1705.334915][T17660] should_fail+0x23c/0x250 [ 1705.357944][T17660] __should_failslab+0x81/0x90 [ 1705.362705][T17660] ? alloc_super+0x3a/0x520 [ 1705.367220][T17660] should_failslab+0x5/0x20 [ 1705.371732][T17660] kmem_cache_alloc_trace+0x49/0x310 [ 1705.377043][T17660] ? __blkdev_get+0x8c/0x6c0 [ 1705.381629][T17660] ? disk_block_events+0x94/0xd0 11:39:02 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.384179][T17667] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1705.386583][T17660] ? mount_bdev+0x290/0x290 [ 1705.386604][T17660] alloc_super+0x3a/0x520 [ 1705.386622][T17660] ? mount_bdev+0x290/0x290 [ 1705.410972][T17660] sget+0x1a5/0x400 [ 1705.414780][T17660] ? test_bdev_super+0x30/0x30 [ 1705.419575][T17660] mount_bdev+0xd3/0x290 [ 1705.423817][T17660] ? isofs_mount+0x40/0x40 [ 1705.425585][T17668] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.428225][T17660] ? _isofs_bmap+0x30/0x30 [ 1705.428249][T17660] isofs_mount+0x2d/0x40 [ 1705.439814][T17672] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.443756][T17660] legacy_get_tree+0x70/0xc0 [ 1705.443782][T17660] vfs_get_tree+0x4a/0x1a0 [ 1705.452243][T17674] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1705.459028][T17660] path_mount+0x11d4/0x1ce0 [ 1705.459128][T17660] __se_sys_mount+0x23d/0x2e0 11:39:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.488254][T17660] ? mntput+0x45/0x70 [ 1705.492273][T17660] __x64_sys_mount+0x63/0x70 [ 1705.492560][T17680] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1705.496851][T17660] do_syscall_64+0x4a/0x90 [ 1705.496875][T17660] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1705.518236][T17660] RIP: 0033:0x467afa 11:39:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:02 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x5, 0x12, r0, 0x4b8f9000) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) r3 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x3938700}, {r4, r5+60000000}}, &(0x7f00000000c0)) mmap$usbmon(&(0x7f00006cd000/0x2000)=nil, 0x2000, 0x2000001, 0x13, r3, 0x5) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="400100f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000000)={0x31, 0x1f, 0x20}) [ 1705.522120][T17660] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1705.530662][T17681] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1705.541863][T17660] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1705.541884][T17660] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1705.541896][T17660] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1705.541963][T17660] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 11:39:02 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1705.541972][T17660] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1705.572958][T17678] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.577341][T17660] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1705.612589][T17686] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.625282][T17687] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:02 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.640815][T17689] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1705.655014][T17682] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.668761][T17694] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.677759][T17701] loop1: detected capacity change from 0 to 136 11:39:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.686740][T17696] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.690169][T17701] FAULT_INJECTION: forcing a failure. [ 1705.690169][T17701] name failslab, interval 1, probability 0, space 0, times 0 [ 1705.710367][T17701] CPU: 0 PID: 17701 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1705.718517][T17697] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1705.720502][T17701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:39:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.720513][T17701] Call Trace: [ 1705.720520][T17701] dump_stack+0x137/0x19d [ 1705.720540][T17701] should_fail+0x23c/0x250 [ 1705.720554][T17701] ? kzalloc+0x1d/0x30 [ 1705.720569][T17701] __should_failslab+0x81/0x90 [ 1705.762595][T17701] should_failslab+0x5/0x20 [ 1705.764072][T17708] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.767101][T17701] __kmalloc+0x66/0x340 [ 1705.767164][T17701] kzalloc+0x1d/0x30 [ 1705.786159][T17701] security_sb_alloc+0x3c/0x180 [ 1705.791040][T17701] alloc_super+0x10b/0x520 [ 1705.795488][T17701] ? mount_bdev+0x290/0x290 [ 1705.799986][T17701] sget+0x1a5/0x400 [ 1705.803780][T17701] ? test_bdev_super+0x30/0x30 [ 1705.803965][T17710] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.808546][T17701] mount_bdev+0xd3/0x290 [ 1705.808566][T17701] ? isofs_mount+0x40/0x40 [ 1705.828224][T17701] ? _isofs_bmap+0x30/0x30 [ 1705.832766][T17701] isofs_mount+0x2d/0x40 [ 1705.837008][T17701] legacy_get_tree+0x70/0xc0 11:39:02 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) vmsplice(r2, &(0x7f0000000340)=[{&(0x7f0000000000)="3bdafba01c9a7999437e1e21bceb997d", 0x10}, {&(0x7f0000000040)="1c70e35a5c16d59e6e305b572a4a7d87ecda95109077bcc52b4278", 0x1b}, {&(0x7f0000000080)="fa8455241a65ed5f03d71a26c44171170a12c567f824700085a6667898f219802490bd97019b2f3796b78a3ccdcb0fcecadb33c272d3534f714eca16141e9594a88546bedde11a53cbf83d02711801d5bba087cee827a602bfa310de56c4cb055822c9d0eaf9e11f83273307d43f0da3e97454d1259e2212957e355231398f2198f401b66d35b597dc9c4d7405f6396701b8a455ab9e401fb7daf6c41afed9c112c72d73ae004a8a16b759c3a71cd44b4126473625ed760b139969d1d36112e6653f64837de33519b6bcb5632238fcca17a09a219484a39136547054f7d88646d9563d7260abc5", 0xe7}, {&(0x7f0000000180)="f3123f1cd1f6672dbb2f", 0xa}, {&(0x7f0000000280)="a8dc3873b7249076914ec3d84050db6d9a94f39150f3826ba1bd7c76763546e875bcd0fe20a9baafcf403a9c4b01e361634d450710238b58a74bf595904792cd6c3f5aa7911daacaed93e7e77f19c1b61111b526bed5f8dfe8c940acf48e105bc7c767a465b3df64434cfa0806969d6f1fc3c4a4db34f5bc068c1a2702de890c3fb455be86628fa7ce2e3918dcbb8c9fcce0bd4fe879e47a671feaa825f6f2ef73bd336648eb83f1", 0xa8}], 0x5, 0x4) fcntl$setown(r0, 0x8, 0xffffffffffffffff) 11:39:02 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.841674][T17701] vfs_get_tree+0x4a/0x1a0 [ 1705.845348][T17711] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.846080][T17701] path_mount+0x11d4/0x1ce0 [ 1705.846097][T17701] __se_sys_mount+0x23d/0x2e0 [ 1705.866062][T17714] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.866449][T17701] ? mntput+0x45/0x70 [ 1705.866472][T17701] ? __fpregs_load_activate+0x103/0x1b0 [ 1705.886936][T17701] __x64_sys_mount+0x63/0x70 11:39:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.891524][T17701] do_syscall_64+0x4a/0x90 [ 1705.895953][T17701] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1705.901892][T17701] RIP: 0033:0x467afa [ 1705.904578][T17716] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1705.905773][T17701] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:39:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1705.905789][T17701] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1705.944765][T17701] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1705.944952][T17715] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1705.952736][T17701] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1705.971816][T17701] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1705.979783][T17701] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 11:39:02 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1705.980960][T17719] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1705.987748][T17701] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1706.006937][T17726] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.018803][T17727] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.033422][T17721] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1706.042871][T17721] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1706.052044][T17721] tc_dump_action: action bad kind [ 1706.066106][T17734] loop1: detected capacity change from 0 to 136 [ 1706.068760][T17723] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.075596][T17734] FAULT_INJECTION: forcing a failure. 11:39:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1706.075596][T17734] name failslab, interval 1, probability 0, space 0, times 0 [ 1706.085095][T17731] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.096012][T17734] CPU: 0 PID: 17734 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1706.107620][T17737] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1706.117131][T17734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1706.117143][T17734] Call Trace: 11:39:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1706.117150][T17734] dump_stack+0x137/0x19d [ 1706.144027][T17739] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.145902][T17734] should_fail+0x23c/0x250 [ 1706.145923][T17734] __should_failslab+0x81/0x90 [ 1706.166063][T17734] should_failslab+0x5/0x20 [ 1706.170575][T17734] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1706.170871][T17740] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.176294][T17734] ? __list_lru_init+0x70/0x680 11:39:02 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1706.176316][T17734] ? __kmalloc_node+0x30/0x40 [ 1706.196823][T17734] __kmalloc_node+0x30/0x40 [ 1706.201322][T17734] kvmalloc_node+0x81/0xf0 [ 1706.204099][T17742] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1706.205730][T17734] __list_lru_init+0x2d7/0x680 [ 1706.221680][T17734] alloc_super+0x490/0x520 [ 1706.226264][T17734] ? mount_bdev+0x290/0x290 [ 1706.230815][T17734] sget+0x1a5/0x400 [ 1706.234611][T17734] ? test_bdev_super+0x30/0x30 [ 1706.239377][T17734] mount_bdev+0xd3/0x290 11:39:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1706.243130][T17743] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.243607][T17734] ? isofs_mount+0x40/0x40 [ 1706.243631][T17734] ? _isofs_bmap+0x30/0x30 [ 1706.263407][T17734] isofs_mount+0x2d/0x40 [ 1706.267669][T17734] legacy_get_tree+0x70/0xc0 [ 1706.272260][T17734] vfs_get_tree+0x4a/0x1a0 [ 1706.276742][T17734] path_mount+0x11d4/0x1ce0 [ 1706.281232][T17734] __se_sys_mount+0x23d/0x2e0 11:39:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1706.281942][T17745] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.285914][T17734] ? mntput+0x45/0x70 [ 1706.285936][T17734] ? __fpregs_load_activate+0x103/0x1b0 [ 1706.285960][T17734] __x64_sys_mount+0x63/0x70 [ 1706.305283][T17747] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.306436][T17734] do_syscall_64+0x4a/0x90 [ 1706.306465][T17734] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1706.314939][T17749] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x18}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1706.322015][T17734] RIP: 0033:0x467afa [ 1706.322032][T17734] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1706.346762][T17751] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1706.347166][T17734] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1706.386049][T17754] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.386313][T17734] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1706.386327][T17734] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1706.413325][T17734] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1706.414887][T17755] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1706.421287][T17734] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 11:39:03 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x40) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x3f7, 0x0, 0x70bd2a, 0x25dfdbfd, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x84) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:03 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:03 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1706.421301][T17734] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1706.426428][T17759] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1706.442744][T17757] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.448377][T17759] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1706.472361][T17758] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.478393][T17759] tc_dump_action: action bad kind 11:39:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1706.508127][T17768] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.535760][T17771] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1706.539287][T17774] loop1: detected capacity change from 0 to 136 [ 1706.555595][T17774] FAULT_INJECTION: forcing a failure. [ 1706.555595][T17774] name failslab, interval 1, probability 0, space 0, times 0 [ 1706.559283][T17770] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.568200][T17774] CPU: 0 PID: 17774 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1706.589392][T17774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1706.589402][T17774] Call Trace: [ 1706.589408][T17774] dump_stack+0x137/0x19d 11:39:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1706.589427][T17774] should_fail+0x23c/0x250 [ 1706.589451][T17774] __should_failslab+0x81/0x90 [ 1706.589468][T17774] should_failslab+0x5/0x20 [ 1706.589488][T17774] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1706.589508][T17774] ? __list_lru_init+0x70/0x680 [ 1706.589525][T17774] ? __kmalloc_node+0x30/0x40 [ 1706.604983][T17772] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.607129][T17774] __kmalloc_node+0x30/0x40 [ 1706.607155][T17774] kvmalloc_node+0x81/0xf0 11:39:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x26}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1706.607169][T17774] __list_lru_init+0x2d7/0x680 [ 1706.611868][T17780] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1706.616304][T17774] alloc_super+0x490/0x520 [ 1706.616352][T17774] ? mount_bdev+0x290/0x290 [ 1706.616365][T17774] sget+0x1a5/0x400 [ 1706.624710][T17781] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.626692][T17774] ? test_bdev_super+0x30/0x30 [ 1706.626768][T17774] mount_bdev+0xd3/0x290 11:39:03 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1706.640636][T17783] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.647252][T17774] ? isofs_mount+0x40/0x40 [ 1706.647277][T17774] ? _isofs_bmap+0x30/0x30 [ 1706.647297][T17774] isofs_mount+0x2d/0x40 [ 1706.664866][T17782] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.671983][T17774] legacy_get_tree+0x70/0xc0 [ 1706.672010][T17774] vfs_get_tree+0x4a/0x1a0 [ 1706.689527][T17784] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.695635][T17774] path_mount+0x11d4/0x1ce0 [ 1706.695656][T17774] __se_sys_mount+0x23d/0x2e0 [ 1706.695671][T17774] ? mntput+0x45/0x70 [ 1706.695688][T17774] __x64_sys_mount+0x63/0x70 [ 1706.695701][T17774] do_syscall_64+0x4a/0x90 [ 1706.750063][T17786] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1706.759562][T17774] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1706.783174][T17793] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1706.792720][T17774] RIP: 0033:0x467afa [ 1706.792736][T17774] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1706.792751][T17774] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 [ 1706.800273][T17791] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1706.809677][T17774] ORIG_RAX: 00000000000000a5 11:39:03 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) sendmsg$netlink(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) r2 = getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r2) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1706.815498][T17790] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.833163][T17774] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1706.833177][T17774] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1706.833188][T17774] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1706.833236][T17774] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1706.859523][T17795] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:03 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1706.865982][T17774] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1706.917433][T17797] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.937389][T17798] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1706.949060][T17801] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.961068][T17795] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1706.963724][T17809] loop1: detected capacity change from 0 to 136 [ 1706.978429][T17808] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1706.981576][T17809] FAULT_INJECTION: forcing a failure. [ 1706.981576][T17809] name failslab, interval 1, probability 0, space 0, times 0 11:39:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1707.002130][T17809] CPU: 1 PID: 17809 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1707.004702][T17812] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.012298][T17809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1707.033346][T17809] Call Trace: [ 1707.036637][T17809] dump_stack+0x137/0x19d [ 1707.039454][T17816] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.040988][T17809] should_fail+0x23c/0x250 [ 1707.056406][T17809] ? __list_lru_init+0x70/0x680 [ 1707.061255][T17809] __should_failslab+0x81/0x90 [ 1707.066088][T17809] should_failslab+0x5/0x20 [ 1707.070619][T17809] __kmalloc+0x66/0x340 [ 1707.074791][T17809] __list_lru_init+0x70/0x680 [ 1707.079506][T17809] alloc_super+0x4bf/0x520 [ 1707.083919][T17809] ? mount_bdev+0x290/0x290 [ 1707.088486][T17809] sget+0x1a5/0x400 [ 1707.088762][T17820] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.092277][T17809] ? test_bdev_super+0x30/0x30 11:39:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1707.092297][T17809] mount_bdev+0xd3/0x290 [ 1707.111130][T17819] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1707.112382][T17809] ? isofs_mount+0x40/0x40 [ 1707.127862][T17809] ? _isofs_bmap+0x30/0x30 [ 1707.132340][T17809] isofs_mount+0x2d/0x40 [ 1707.134303][T17822] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.136631][T17809] legacy_get_tree+0x70/0xc0 [ 1707.152199][T17809] vfs_get_tree+0x4a/0x1a0 11:39:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1707.155622][T17825] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.156639][T17809] path_mount+0x11d4/0x1ce0 [ 1707.172133][T17809] __se_sys_mount+0x23d/0x2e0 [ 1707.175105][T17823] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1707.176801][T17809] ? mntput+0x45/0x70 [ 1707.191933][T17809] ? __fpregs_load_activate+0x103/0x1b0 [ 1707.197421][T17826] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.197478][T17809] __x64_sys_mount+0x63/0x70 [ 1707.213031][T17809] do_syscall_64+0x4a/0x90 [ 1707.217447][T17809] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1707.223381][T17809] RIP: 0033:0x467afa [ 1707.227264][T17809] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1707.234480][T17828] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:03 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:03 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:03 executing program 1 (fault-call:0 fault-nth:58): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1707.246932][T17809] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1707.246957][T17809] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1707.266038][T17829] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.266431][T17809] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1707.266445][T17809] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1707.266456][T17809] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 11:39:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1707.277856][T17831] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1707.285416][T17809] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1707.332824][T17834] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.348021][T17836] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1707.362167][T17839] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.362907][T17843] loop1: detected capacity change from 0 to 136 [ 1707.373689][T17838] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1707.393869][T17845] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.405840][T17843] FAULT_INJECTION: forcing a failure. 11:39:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1707.405840][T17843] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.418459][T17843] CPU: 0 PID: 17843 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1707.421343][T17849] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.428597][T17843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1707.428609][T17843] Call Trace: [ 1707.428616][T17843] dump_stack+0x137/0x19d [ 1707.428640][T17843] should_fail+0x23c/0x250 11:39:04 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) mmap(&(0x7f000032d000/0x2000)=nil, 0x2000, 0x2000000, 0x12, r0, 0x663b7000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='./file0\x00', 0x980c0, 0x88) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1707.446973][T17851] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.449730][T17843] __should_failslab+0x81/0x90 [ 1707.477618][T17843] should_failslab+0x5/0x20 [ 1707.480439][T17857] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.482140][T17843] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1707.495769][T17854] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1707.498826][T17843] ? __list_lru_init+0x70/0x680 [ 1707.498848][T17843] ? __kmalloc_node+0x30/0x40 [ 1707.519315][T17843] __kmalloc_node+0x30/0x40 [ 1707.523869][T17843] kvmalloc_node+0x81/0xf0 [ 1707.528378][T17843] __list_lru_init+0x2d7/0x680 [ 1707.533198][T17843] alloc_super+0x4bf/0x520 [ 1707.537609][T17843] ? mount_bdev+0x290/0x290 [ 1707.542120][T17843] sget+0x1a5/0x400 [ 1707.545980][T17843] ? test_bdev_super+0x30/0x30 [ 1707.550759][T17843] mount_bdev+0xd3/0x290 11:39:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1707.553051][T17853] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1707.555001][T17843] ? isofs_mount+0x40/0x40 [ 1707.570487][T17843] ? _isofs_bmap+0x30/0x30 [ 1707.575050][T17843] isofs_mount+0x2d/0x40 [ 1707.579287][T17843] legacy_get_tree+0x70/0xc0 [ 1707.579667][T17859] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1707.583909][T17843] vfs_get_tree+0x4a/0x1a0 [ 1707.583929][T17843] path_mount+0x11d4/0x1ce0 [ 1707.583943][T17843] __se_sys_mount+0x23d/0x2e0 [ 1707.608635][T17843] ? mntput+0x45/0x70 [ 1707.612615][T17843] ? __fpregs_load_activate+0x103/0x1b0 [ 1707.618167][T17843] __x64_sys_mount+0x63/0x70 [ 1707.622742][T17843] do_syscall_64+0x4a/0x90 [ 1707.627155][T17843] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1707.633044][T17843] RIP: 0033:0x467afa [ 1707.636923][T17843] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:39:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1707.641458][T17868] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.656522][T17843] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1707.671699][T17865] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.675955][T17843] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1707.675982][T17843] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1707.675993][T17843] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1707.694867][T17869] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.694933][T17843] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1707.715463][T17867] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.721818][T17843] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1707.749424][T17873] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:04 executing program 1 (fault-call:0 fault-nth:59): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1707.761467][T17872] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1707.779409][T17875] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:04 executing program 3: ioctl$SNAPSHOT_FREE(0xffffffffffffffff, 0x3305) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000280)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) r1 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000040)={&(0x7f0000000000), &(0x7f0000000b40)=""/4096, 0x1000}) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0xd7a) r2 = dup(r1) read$usbmon(r2, &(0x7f0000001b40)=""/4096, 0x1000) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000001700)=ANY=[@ANYRESHEX, @ANYRES16=r3, @ANYRESDEC, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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", @ANYRES16=r3, @ANYRESDEC], 0x1d4}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000001c0)={0x0, 0x1, 0x20}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000200)={{}, 0x0, 0xe, @unused=[0x0, 0xfffffffffffeffff, 0xffffffffffff8af2, 0x4], @devid}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000440)={{}, 0x0, 0x10, @unused=[0x6, 0xfffffffffffffe00, 0x6], @devid}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000021c0)={0xc, 0x1, {0x9, @struct={0x6, 0x3}, 0x0, 0x8, 0x8, 0x1000, 0x1, 0x5, 0x20, @usage=0x200, 0x80000000, 0x8, [0x5, 0x9, 0x8, 0x1, 0x7, 0x100000001]}, {0x71a, @usage=0x80, 0x0, 0x4, 0x8000, 0x800, 0x5, 0x80000001, 0x1, @usage=0x7ff, 0xa98, 0x8, [0x0, 0xffffffffffffdafc, 0x9a4, 0x1000000000, 0x7, 0x5]}, {0xc496, @struct={0x8001, 0xfff}, 0x0, 0x7, 0x1, 0xff, 0x7, 0x1a40, 0x84, @struct={0x9, 0x1a}, 0xff, 0xfff, [0x7f, 0x3, 0x2, 0x0, 0x8000, 0x1]}, {0x8000, 0x8, 0x6c5d}}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000002b40)={r0, "78a6be8a4bdb5c7b39b1fd6fa960e17c"}) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000000680)={0x0, 0x7, {0xfffffffffffffffd, @usage=0x6, r0, 0x2, 0x7ff, 0x101, 0x2, 0x1000, 0x4d3, @usage=0x3, 0x1, 0x14, [0x317f, 0x3ff, 0x100000000, 0x7fffffff, 0x8, 0x3]}, {0xffff, @usage=0x100000000, 0x0, 0xfffffffffffffff8, 0x1, 0x7f, 0x9613, 0x0, 0x420, @struct={0x6}, 0x6, 0x9, [0x4, 0x3f, 0x3, 0x2, 0xf5, 0x3f]}, {0x80000000, @usage=0x7, r4, 0x4, 0x1, 0x0, 0x4, 0x7ff, 0x80, @usage=0x200, 0x6, 0x4aa, [0x20, 0x101, 0x0, 0x81, 0x4, 0x800]}, {0x9, 0xff, 0xfffffffffffffff8}}) poll(&(0x7f0000000240)=[{r1}], 0x1, 0x81) r5 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r5, 0x40189206, &(0x7f0000000140)={&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000000c0)=""/114, 0x72}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) [ 1707.818751][T17871] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.837849][T17879] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1707.851208][T17886] loop1: detected capacity change from 0 to 136 [ 1707.862866][T17886] FAULT_INJECTION: forcing a failure. 11:39:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1707.862866][T17886] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.867906][T17882] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.875511][T17886] CPU: 0 PID: 17886 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1707.896622][T17886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1707.906670][T17886] Call Trace: [ 1707.909940][T17886] dump_stack+0x137/0x19d [ 1707.914263][T17886] should_fail+0x23c/0x250 11:39:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1707.918677][T17886] __should_failslab+0x81/0x90 [ 1707.919238][T17888] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.923434][T17886] ? isofs_fill_super+0x59/0x1940 [ 1707.923460][T17886] should_failslab+0x5/0x20 [ 1707.943939][T17886] kmem_cache_alloc_trace+0x49/0x310 [ 1707.949230][T17886] ? format_decode+0x60b/0x8a0 [ 1707.949542][T17893] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.954008][T17886] isofs_fill_super+0x59/0x1940 [ 1707.954034][T17886] ? vsnprintf+0xe8f/0xed0 [ 1707.974265][T17886] ? snprintf+0x6f/0x90 [ 1707.977072][T17895] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1707.978429][T17886] ? register_shrinker_prepared+0xc2/0xd0 [ 1707.978452][T17886] ? set_blocksize+0x197/0x270 [ 1707.999871][T17886] mount_bdev+0x1e8/0x290 [ 1708.004011][T17896] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1708.004201][T17886] ? isofs_mount+0x40/0x40 11:39:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1708.019666][T17886] ? _isofs_bmap+0x30/0x30 [ 1708.022045][T17899] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.024072][T17886] isofs_mount+0x2d/0x40 [ 1708.039310][T17886] legacy_get_tree+0x70/0xc0 [ 1708.041149][T17900] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.043981][T17886] vfs_get_tree+0x4a/0x1a0 [ 1708.044003][T17886] path_mount+0x11d4/0x1ce0 [ 1708.063860][T17886] __se_sys_mount+0x23d/0x2e0 11:39:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1708.068522][T17886] ? mntput+0x45/0x70 [ 1708.072486][T17886] ? __fpregs_load_activate+0x103/0x1b0 [ 1708.078041][T17886] __x64_sys_mount+0x63/0x70 [ 1708.078876][T17902] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1708.082624][T17886] do_syscall_64+0x4a/0x90 [ 1708.082645][T17886] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1708.101767][T17904] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.104041][T17886] RIP: 0033:0x467afa 11:39:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1708.104056][T17886] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1708.104071][T17886] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1708.126627][T17907] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.138504][T17886] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1708.138517][T17886] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1708.161831][T17908] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.165846][T17886] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1708.165861][T17886] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1708.165877][T17886] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1708.209302][T17911] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:04 executing program 1 (fault-call:0 fault-nth:60): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1708.223837][T17912] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1708.250518][T17914] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.269618][T17916] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.281506][T17919] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1708.291650][T17926] loop1: detected capacity change from 0 to 136 [ 1708.298817][T17924] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.302695][T17926] FAULT_INJECTION: forcing a failure. [ 1708.302695][T17926] name failslab, interval 1, probability 0, space 0, times 0 [ 1708.322516][T17926] CPU: 0 PID: 17926 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1708.332638][T17926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1708.343045][T17926] Call Trace: [ 1708.346331][T17926] dump_stack+0x137/0x19d [ 1708.350646][T17926] should_fail+0x23c/0x250 [ 1708.355076][T17926] ? xas_create+0x96b/0xb30 [ 1708.359600][T17926] __should_failslab+0x81/0x90 [ 1708.364422][T17926] should_failslab+0x5/0x20 [ 1708.368903][T17926] kmem_cache_alloc+0x46/0x2f0 [ 1708.373715][T17926] xas_create+0x96b/0xb30 [ 1708.378083][T17926] xas_store+0x70/0xca0 [ 1708.382251][T17926] ? xas_find_conflict+0x422/0x4c0 [ 1708.387418][T17926] __add_to_page_cache_locked+0x1eb/0x4e0 [ 1708.393110][T17926] ? workingset_activation+0x270/0x270 [ 1708.398555][T17926] add_to_page_cache_lru+0xa0/0x1b0 [ 1708.403726][T17926] pagecache_get_page+0x6a3/0x900 [ 1708.408720][T17926] __getblk_gfp+0x199/0x590 [ 1708.413196][T17926] ? set_blocksize+0x255/0x270 [ 1708.418040][T17926] __bread_gfp+0x28/0x220 [ 1708.422348][T17926] isofs_fill_super+0x9c5/0x1940 [ 1708.427309][T17926] ? register_shrinker_prepared+0xc2/0xd0 [ 1708.433005][T17926] ? set_blocksize+0x197/0x270 [ 1708.437755][T17926] mount_bdev+0x1e8/0x290 [ 1708.442233][T17926] ? isofs_mount+0x40/0x40 [ 1708.446629][T17926] ? _isofs_bmap+0x30/0x30 [ 1708.451023][T17926] isofs_mount+0x2d/0x40 [ 1708.455243][T17926] legacy_get_tree+0x70/0xc0 [ 1708.459879][T17926] vfs_get_tree+0x4a/0x1a0 [ 1708.464269][T17926] path_mount+0x11d4/0x1ce0 [ 1708.468819][T17926] __se_sys_mount+0x23d/0x2e0 [ 1708.473523][T17926] ? mntput+0x45/0x70 [ 1708.477530][T17926] ? __fpregs_load_activate+0x103/0x1b0 [ 1708.483093][T17926] __x64_sys_mount+0x63/0x70 [ 1708.487656][T17926] do_syscall_64+0x4a/0x90 [ 1708.492082][T17926] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1708.497953][T17926] RIP: 0033:0x467afa [ 1708.501821][T17926] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:39:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1708.521405][T17926] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1708.529791][T17926] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1708.537743][T17926] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1708.545690][T17926] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1708.553645][T17926] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1708.561599][T17926] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1708.572492][T17925] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.588762][T17931] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.604736][T17932] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.616137][T17934] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1708.628467][T17935] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.647126][T17936] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x86}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:05 executing program 1 (fault-call:0 fault-nth:61): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:05 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:05 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x12c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x800000, 0xf}}}}, [@NL80211_ATTR_TX_RATES={0x10c, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xa8, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x6c98, 0x1, 0xdd53, 0x1, 0x101, 0x7, 0x8e, 0x8000]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x100, 0x3, 0x9b5e, 0x400, 0x2, 0xfff8, 0x9, 0x89]}}, @NL80211_TXRATE_HT={0x3d, 0x2, [{0x2, 0x1}, {0x6, 0x9}, {0x3, 0x7}, {0x7}, {0x1, 0x1}, {0x4, 0x9}, {0x4, 0x9}, {0x4, 0x8}, {0x7, 0xa}, {0x6, 0x2}, {0x4, 0x7}, {0x0, 0xa}, {0x3, 0x8}, {0x3, 0x8}, {0x0, 0x3}, {0x4, 0x5}, {0x0, 0x2}, {0x7, 0x9}, {0x6, 0x9}, {0x4, 0x8}, {0x7, 0x1}, {0x0, 0x5}, {0x0, 0x4}, {0x6, 0x9}, {0x2, 0x9}, {0x1, 0x5}, {0x0, 0x5}, {0x3, 0x5}, {0x6, 0x2}, {0x7, 0x6}, {0x4, 0x5}, {0x1, 0x3}, {0x2, 0x9}, {0x3, 0x3}, {0x2, 0x8}, {0x3}, {0x0, 0x5}, {0x3, 0xa}, {0x6, 0x3}, {0x5, 0x8}, {0x7, 0x1}, {0x3, 0x8}, {0x3, 0x6}, {0x7, 0x5}, {0x1, 0x3}, {0x6, 0xa}, {0x4, 0x9}, {0x5, 0x6}, {}, {0x3, 0x3}, {0x3, 0xa}, {0x6, 0x7}, {0x3, 0x5}, {0x5, 0xa}, {0x1, 0x6}, {0x4, 0x4}, {0x1, 0x5}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x10, 0x9, 0x2, 0x8, 0x9, 0x6ec1, 0x8000, 0x8]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x17, 0x1, [0x18, 0x22, 0x2, 0x3, 0x18, 0x9, 0x3, 0x2, 0xc, 0xc, 0xc, 0x2, 0x6, 0x48, 0xb, 0x48, 0xc, 0x9, 0x48]}]}, @NL80211_BAND_2GHZ={0x60, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x48, 0x2, [{0x0, 0x1}, {0x4, 0x2}, {0x1, 0x8}, {0x5, 0x5}, {0x1, 0x5}, {0x5, 0x3}, {0x4, 0x3}, {0x2, 0x1}, {0x7}, {0x1, 0x5}, {0x0, 0x5}, {0x6, 0x4}, {0x5, 0x4}, {0x3, 0x4}, {0x2, 0xa}, {0x2, 0x6}, {0x3, 0x7}, {0x6, 0x1}, {0x0, 0x6}, {0x6, 0x4}, {0x0, 0x5}, {0x1, 0x6}, {0x4, 0x5}, {0x0, 0x8}, {0x7, 0x4}, {0x6, 0x8}, {0x1, 0x4}, {0x2, 0x3}, {0x3, 0x9}, {0x7, 0x8}, {0x3, 0x1}, {0x5, 0x5}, {0x7, 0x6}, {0x6, 0x2}, {0x3, 0xa}, {0x0, 0x1}, {0x6, 0xa}, {0x6, 0x2}, {0x0, 0x3}, {0x5}, {0x2, 0x17}, {0x1, 0x7}, {0x0, 0x7}, {0x1, 0xa}, {0x6, 0x1}, {0x0, 0x6}, {0x6, 0x9}, {0x5, 0x4}, {0x1, 0xa}, {0x4, 0x3}, {0x0, 0x2}, {0x2, 0x1}, {0x3, 0x1}, {0x3, 0x5}, {0x7}, {0x3, 0x1}, {0x7, 0x4}, {0x6, 0x4}, {0x2, 0x7}, {0x4, 0x2}, {0x3, 0xa}, {0x0, 0x7}, {0x3}, {0x5, 0xa}, {0x1, 0x7}, {0x0, 0x2}, {0x3, 0x5}, {0x0, 0x8}]}, @NL80211_TXRATE_LEGACY={0xc, 0x1, [0x6c, 0x24, 0x1b, 0x1, 0x30, 0x30, 0x18, 0x60]}, @NL80211_TXRATE_GI={0x5}]}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0xb1}, 0x8014) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x8bfb6295aaa59280, &(0x7f0000000000)=""/107, &(0x7f0000000080)=0x6b) r1 = socket(0x1e, 0x800, 0x5) sendto$inet6(r1, &(0x7f00000000c0)="f0102f89b0ee6b0c0811a3a49ccc85ea2e265d9e40251874627c45fc28de3bdd49628af8d0641bcc558e705b2711a4661cd466d463a999c785299122d8d14d755e872e1e1e2670c7ace17f43596359cbf2d11d985f8910b7bf92c42274fd8c71efa24cf1aaf882c4e1f511d980ff70a8412a63078956d73aa0a41a51920159984e2dc37dc16a555972124f5478b4f0665887", 0x92, 0x20040080, &(0x7f0000000180)={0xa, 0x4e20, 0x391, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}, 0x1c) poll(&(0x7f0000000240)=[{r1, 0xe206}], 0x1, 0x81) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e21, 0xfffff97a, @rand_addr=' \x01\x00', 0x3fe}, {0xa, 0x4e21, 0x8, @rand_addr=' \x01\x00'}, 0x1000, [0x3, 0x0, 0x4, 0x3, 0x0, 0x1ff, 0x5, 0x8]}, 0x5c) mmap(&(0x7f0000683000/0x1000)=nil, 0x1000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1708.880036][T17950] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.888948][T17947] loop1: detected capacity change from 0 to 136 [ 1708.891689][T17952] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1708.901164][T17947] FAULT_INJECTION: forcing a failure. [ 1708.901164][T17947] name failslab, interval 1, probability 0, space 0, times 0 [ 1708.916653][T17954] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.921461][T17947] CPU: 0 PID: 17947 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1708.933533][T17953] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.942664][T17947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1708.942676][T17947] Call Trace: [ 1708.942683][T17947] dump_stack+0x137/0x19d 11:39:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:05 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1708.955922][T17958] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1708.963798][T17947] should_fail+0x23c/0x250 [ 1708.963817][T17947] ? mempool_alloc_slab+0x16/0x20 [ 1708.969491][T17959] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1708.971421][T17947] __should_failslab+0x81/0x90 [ 1708.992279][T17961] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.002876][T17947] should_failslab+0x5/0x20 [ 1709.002900][T17947] kmem_cache_alloc+0x46/0x2f0 [ 1709.018157][T17962] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.018627][T17947] ? PageHuge+0x59/0xc0 [ 1709.042945][T17947] mempool_alloc_slab+0x16/0x20 [ 1709.047793][T17947] ? mempool_free+0x130/0x130 [ 1709.052510][T17947] mempool_alloc+0x8c/0x300 [ 1709.057022][T17947] ? __find_get_block+0x641/0x900 [ 1709.062065][T17947] bio_alloc_bioset+0xcc/0x480 [ 1709.066818][T17947] submit_bh_wbc+0x130/0x330 11:39:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1709.068784][T17968] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1709.071404][T17947] __bread_gfp+0x110/0x220 [ 1709.071423][T17947] isofs_fill_super+0x9c5/0x1940 [ 1709.091888][T17947] ? register_shrinker_prepared+0xc2/0xd0 [ 1709.097601][T17947] ? set_blocksize+0x197/0x270 [ 1709.098156][T17973] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.102365][T17947] mount_bdev+0x1e8/0x290 [ 1709.116518][T17969] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:05 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x450800) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) poll(&(0x7f0000000240)=[{r0, 0x4200}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x270}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1709.117735][T17947] ? isofs_mount+0x40/0x40 [ 1709.117757][T17947] ? _isofs_bmap+0x30/0x30 [ 1709.137605][T17947] isofs_mount+0x2d/0x40 [ 1709.141861][T17947] legacy_get_tree+0x70/0xc0 [ 1709.146465][T17947] vfs_get_tree+0x4a/0x1a0 [ 1709.150905][T17947] path_mount+0x11d4/0x1ce0 [ 1709.152211][T17974] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.155397][T17947] __se_sys_mount+0x23d/0x2e0 [ 1709.155414][T17947] ? mntput+0x45/0x70 [ 1709.175013][T17947] ? __fpregs_load_activate+0x103/0x1b0 [ 1709.180584][T17947] __x64_sys_mount+0x63/0x70 [ 1709.185166][T17947] do_syscall_64+0x4a/0x90 [ 1709.189570][T17947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1709.193136][T17972] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.195483][T17947] RIP: 0033:0x467afa [ 1709.195497][T17947] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:39:05 executing program 1 (fault-call:0 fault-nth:62): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1709.217460][T17976] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.230031][T17947] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1709.241631][T17975] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.249456][T17947] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1709.249469][T17947] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 11:39:05 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1709.249478][T17947] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1709.249488][T17947] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1709.249496][T17947] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1709.290663][T17979] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.312064][T17983] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.331329][T17981] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1709.342339][T17990] loop1: detected capacity change from 0 to 136 [ 1709.347813][T17985] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.353390][T17990] FAULT_INJECTION: forcing a failure. [ 1709.353390][T17990] name failslab, interval 1, probability 0, space 0, times 0 [ 1709.369914][T17992] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.372326][T17990] CPU: 1 PID: 17990 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1709.384381][T17996] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1709.393471][T17990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1709.393482][T17990] Call Trace: [ 1709.393489][T17990] dump_stack+0x137/0x19d [ 1709.393509][T17990] should_fail+0x23c/0x250 11:39:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1709.417631][T17997] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.417964][T17990] __should_failslab+0x81/0x90 [ 1709.422421][T17998] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.426681][T17990] should_failslab+0x5/0x20 [ 1709.457932][T17990] kmem_cache_alloc_node+0x58/0x2b0 [ 1709.463121][T17990] ? create_task_io_context+0x36/0x210 [ 1709.468590][T17990] ? __mod_memcg_lruvec_state+0xaa/0x190 [ 1709.474215][T17990] create_task_io_context+0x36/0x210 11:39:06 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1709.478085][T18003] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.479524][T17990] submit_bio_checks+0x778/0x800 [ 1709.479561][T17990] ? kmem_cache_alloc+0x201/0x2f0 [ 1709.491411][T18000] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.495467][T17990] ? mempool_alloc_slab+0x16/0x20 [ 1709.495490][T17990] submit_bio_noacct+0x33/0x7e0 [ 1709.521364][T17990] ? mempool_alloc_slab+0x16/0x20 [ 1709.526376][T17990] ? mempool_free+0x130/0x130 11:39:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1709.528766][T18005] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.531126][T17990] ? mempool_alloc+0x99/0x300 [ 1709.546787][T17990] ? __bio_add_page+0x1a3/0x210 [ 1709.551672][T17990] submit_bio+0x16d/0x2b0 [ 1709.555991][T17990] ? bio_add_page+0x1fc/0x260 [ 1709.558762][T18008] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.560663][T17990] ? bio_alloc_bioset+0x402/0x480 [ 1709.560684][T17990] submit_bh_wbc+0x2f3/0x330 11:39:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1709.581235][T17990] __bread_gfp+0x110/0x220 [ 1709.585643][T17990] isofs_fill_super+0x9c5/0x1940 [ 1709.586006][T18006] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1709.590622][T17990] ? register_shrinker_prepared+0xc2/0xd0 [ 1709.607498][T17990] ? set_blocksize+0x197/0x270 [ 1709.612252][T17990] mount_bdev+0x1e8/0x290 [ 1709.614828][T18010] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1709.616583][T17990] ? isofs_mount+0x40/0x40 [ 1709.616608][T17990] ? _isofs_bmap+0x30/0x30 [ 1709.636545][T17990] isofs_mount+0x2d/0x40 [ 1709.640784][T17990] legacy_get_tree+0x70/0xc0 [ 1709.645408][T17990] vfs_get_tree+0x4a/0x1a0 [ 1709.649392][T18013] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.649811][T17990] path_mount+0x11d4/0x1ce0 [ 1709.665166][T18011] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.665271][T17990] __se_sys_mount+0x23d/0x2e0 [ 1709.680919][T17990] ? mntput+0x45/0x70 [ 1709.684382][T18016] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.684950][T17990] ? __fpregs_load_activate+0x103/0x1b0 [ 1709.696413][T18014] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.701546][T17990] __x64_sys_mount+0x63/0x70 [ 1709.717209][T17990] do_syscall_64+0x4a/0x90 [ 1709.721626][T17990] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1709.727324][T18018] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1709.727572][T17990] RIP: 0033:0x467afa [ 1709.727587][T17990] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1709.750491][T18019] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.762128][T17990] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1709.762147][T17990] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1709.762157][T17990] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1709.762167][T17990] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1709.773931][T18020] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1709.781538][T17990] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1709.824434][T17990] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 11:39:06 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read$usbmon(r2, &(0x7f0000000000)=""/186, 0xba) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:06 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:06 executing program 1 (fault-call:0 fault-nth:63): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1709.903557][T18025] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.927919][T18032] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1709.933977][T18034] loop1: detected capacity change from 0 to 136 [ 1709.939230][T18033] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.950409][T18034] FAULT_INJECTION: forcing a failure. [ 1709.950409][T18034] name failslab, interval 1, probability 0, space 0, times 0 [ 1709.959882][T18036] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.968935][T18034] CPU: 0 PID: 18034 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1709.989235][T18031] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1709.990144][T18034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1710.002653][T18038] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1710.011165][T18034] Call Trace: [ 1710.011173][T18034] dump_stack+0x137/0x19d [ 1710.022909][T18041] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.025566][T18034] should_fail+0x23c/0x250 11:39:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:06 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1710.029977][T18042] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.040855][T18034] ? mempool_alloc_slab+0x16/0x20 [ 1710.061253][T18034] __should_failslab+0x81/0x90 [ 1710.066096][T18034] should_failslab+0x5/0x20 [ 1710.070723][T18034] kmem_cache_alloc+0x46/0x2f0 [ 1710.075491][T18034] ? PageHuge+0x59/0xc0 [ 1710.079698][T18034] mempool_alloc_slab+0x16/0x20 [ 1710.084587][T18034] ? mempool_free+0x130/0x130 [ 1710.089250][T18034] mempool_alloc+0x8c/0x300 [ 1710.093811][T18034] ? __find_get_block+0x641/0x900 11:39:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1710.096193][T18047] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1710.098947][T18034] bio_alloc_bioset+0xcc/0x480 [ 1710.114772][T18034] ? __cond_resched+0x11/0x40 [ 1710.119435][T18034] submit_bh_wbc+0x130/0x330 [ 1710.123855][T18050] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.124040][T18034] __bread_gfp+0x110/0x220 [ 1710.135547][T18048] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1710.139428][T18034] isofs_fill_super+0x9c5/0x1940 [ 1710.155454][T18034] ? register_shrinker_prepared+0xc2/0xd0 [ 1710.161226][T18034] ? set_blocksize+0x197/0x270 [ 1710.165981][T18034] mount_bdev+0x1e8/0x290 [ 1710.170326][T18034] ? isofs_mount+0x40/0x40 [ 1710.172607][T18049] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.174818][T18034] ? _isofs_bmap+0x30/0x30 [ 1710.174843][T18034] isofs_mount+0x2d/0x40 [ 1710.186127][T18051] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.190349][T18034] legacy_get_tree+0x70/0xc0 [ 1710.210172][T18034] vfs_get_tree+0x4a/0x1a0 [ 1710.213786][T18057] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1710.214584][T18034] path_mount+0x11d4/0x1ce0 [ 1710.214603][T18034] __se_sys_mount+0x23d/0x2e0 [ 1710.226355][T18052] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.230146][T18034] ? mntput+0x45/0x70 [ 1710.236530][T18054] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.245811][T18034] ? __fpregs_load_activate+0x103/0x1b0 [ 1710.245839][T18034] __x64_sys_mount+0x63/0x70 [ 1710.251700][T18055] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.260809][T18034] do_syscall_64+0x4a/0x90 [ 1710.260833][T18034] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1710.292168][T18034] RIP: 0033:0x467afa [ 1710.294216][T18059] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.296158][T18034] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1710.296175][T18034] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000202 [ 1710.317419][T18060] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.326786][T18034] ORIG_RAX: 00000000000000a5 11:39:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:07 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:07 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6(0xa, 0xa, 0xfffffff7) splice(r2, &(0x7f0000000000)=0x9, r0, &(0x7f0000000040)=0xfc6c, 0x6, 0xd) 11:39:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:07 executing program 1 (fault-call:0 fault-nth:64): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1710.326795][T18034] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000467afa [ 1710.326805][T18034] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 00007f6a5b60d000 [ 1710.326817][T18034] RBP: 00007f6a5b60d040 R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1710.372558][T18034] R10: 0000000000008001 R11: 0000000000000202 R12: 00000000200001c0 [ 1710.380505][T18034] R13: 0000000020000080 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1710.431888][T18071] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1710.439450][T18076] loop1: detected capacity change from 0 to 136 [ 1710.443598][T18072] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.460458][T18074] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:07 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1710.471960][T18075] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.483478][T18080] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1710.483499][T18076] FAULT_INJECTION: forcing a failure. [ 1710.483499][T18076] name failslab, interval 1, probability 0, space 0, times 0 [ 1710.495447][T18081] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.507228][T18076] CPU: 0 PID: 18076 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1710.518730][T18082] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.528425][T18076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1710.528437][T18076] Call Trace: [ 1710.528443][T18076] dump_stack+0x137/0x19d [ 1710.557044][T18076] should_fail+0x23c/0x250 [ 1710.561449][T18076] __should_failslab+0x81/0x90 [ 1710.566259][T18076] ? kobject_uevent_env+0x1a7/0xc40 [ 1710.570915][T18085] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:07 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:07 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/110, 0x6e}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1710.571448][T18076] should_failslab+0x5/0x20 [ 1710.583026][T18086] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.586973][T18076] kmem_cache_alloc_trace+0x49/0x310 [ 1710.603230][T18076] ? kernfs_put+0x22a/0x300 [ 1710.607786][T18076] ? ___cache_free+0x3c/0x300 [ 1710.612504][T18076] ? dev_uevent_filter+0x70/0x70 [ 1710.617446][T18076] kobject_uevent_env+0x1a7/0xc40 [ 1710.622527][T18076] ? kernfs_put+0x2e2/0x300 [ 1710.627033][T18076] kobject_uevent+0x18/0x20 11:39:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1710.631535][T18076] __loop_clr_fd+0x433/0x640 [ 1710.635434][T18088] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.636125][T18076] lo_ioctl+0x9eb/0x11f0 [ 1710.636145][T18076] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 1710.655972][T18092] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.656640][T18076] ? call_rcu+0x259/0x6c0 [ 1710.671962][T18076] ? avc_has_extended_perms+0x5d8/0x7b0 [ 1710.677501][T18076] ? kfree+0xf0/0x1d0 11:39:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1710.681497][T18076] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1710.682707][T18094] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.686874][T18076] ? selinux_file_ioctl+0x8e0/0x970 [ 1710.686894][T18076] ? lo_release+0x120/0x120 [ 1710.705254][T18095] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.707515][T18076] blkdev_ioctl+0x1d0/0x3c0 [ 1710.707537][T18076] block_ioctl+0x6d/0x80 [ 1710.727240][T18076] ? blkdev_iopoll+0x70/0x70 11:39:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1710.729334][T18096] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.731875][T18076] __se_sys_ioctl+0xcb/0x140 [ 1710.731910][T18076] __x64_sys_ioctl+0x3f/0x50 [ 1710.752050][T18076] do_syscall_64+0x4a/0x90 [ 1710.756526][T18076] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1710.757791][T18098] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.762438][T18076] RIP: 0033:0x466397 [ 1710.762452][T18076] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1710.762466][T18076] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000246 [ 1710.789006][T18100] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.797006][T18076] ORIG_RAX: 0000000000000010 [ 1710.797015][T18076] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000466397 11:39:07 executing program 1 (fault-call:0 fault-nth:65): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1710.797027][T18076] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1710.797039][T18076] RBP: 00007f6a5b60d6bc R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1710.809387][T18101] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.814146][T18076] R10: 0000000000008001 R11: 0000000000000246 R12: ffffffffffffffff [ 1710.814160][T18076] R13: 0000000000000016 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1710.870121][T18103] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:07 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1710.897275][T18111] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.911602][T18116] loop1: detected capacity change from 0 to 136 [ 1710.911985][T18113] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.929525][T18114] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.952417][T18115] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1710.963638][T18121] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.975298][T18116] FAULT_INJECTION: forcing a failure. [ 1710.975298][T18116] name failslab, interval 1, probability 0, space 0, times 0 [ 1710.975334][T18124] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1710.987903][T18116] CPU: 1 PID: 18116 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1710.999213][T18123] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1711.009065][T18116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1711.009076][T18116] Call Trace: [ 1711.009084][T18116] dump_stack+0x137/0x19d [ 1711.037787][T18116] should_fail+0x23c/0x250 [ 1711.038719][T18125] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:07 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1711.042231][T18116] ? kzalloc+0x1d/0x30 [ 1711.057281][T18116] __should_failslab+0x81/0x90 [ 1711.062038][T18116] should_failslab+0x5/0x20 [ 1711.064400][T18126] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1711.066672][T18116] __kmalloc+0x66/0x340 [ 1711.081817][T18116] kzalloc+0x1d/0x30 [ 1711.085827][T18116] kobject_get_path+0x7c/0x110 [ 1711.090658][T18116] kobject_uevent_env+0x1be/0xc40 [ 1711.095673][T18116] ? __kernfs_remove+0x678/0x6a0 [ 1711.100598][T18116] ? kernfs_find_ns+0x30d/0x320 [ 1711.103456][T18130] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1711.105450][T18116] ? kernfs_put+0x39/0x300 [ 1711.105470][T18116] kobject_uevent+0x18/0x20 [ 1711.125339][T18116] __loop_clr_fd+0x433/0x640 [ 1711.129923][T18116] lo_ioctl+0x9eb/0x11f0 [ 1711.134159][T18116] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 1711.134579][T18131] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1711.139430][T18116] ? call_rcu+0x259/0x6c0 [ 1711.154741][T18116] ? avc_has_extended_perms+0x5d8/0x7b0 [ 1711.160278][T18116] ? kfree+0xf0/0x1d0 [ 1711.164276][T18116] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1711.165394][T18132] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1711.169639][T18116] ? selinux_file_ioctl+0x8e0/0x970 [ 1711.169658][T18116] ? lo_release+0x120/0x120 [ 1711.181604][T18133] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1711.185807][T18116] blkdev_ioctl+0x1d0/0x3c0 [ 1711.185827][T18116] block_ioctl+0x6d/0x80 [ 1711.185846][T18116] ? blkdev_iopoll+0x70/0x70 [ 1711.214553][T18116] __se_sys_ioctl+0xcb/0x140 [ 1711.219184][T18116] __x64_sys_ioctl+0x3f/0x50 [ 1711.223746][T18116] do_syscall_64+0x4a/0x90 [ 1711.228133][T18116] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1711.234011][T18116] RIP: 0033:0x466397 [ 1711.237890][T18116] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1711.257660][T18116] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1711.266044][T18116] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000466397 [ 1711.273991][T18116] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1711.281956][T18116] RBP: 00007f6a5b60d6bc R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1711.289911][T18116] R10: 0000000000008001 R11: 0000000000000246 R12: ffffffffffffffff [ 1711.297909][T18116] R13: 0000000000000016 R14: 00007f6a5b60d000 R15: 0000000020000000 11:39:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:08 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:08 executing program 3: poll(&(0x7f0000000240)=[{}], 0x1, 0x81) r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x2) fcntl$setlease(r0, 0x400, 0x2) mmap(&(0x7f0000746000/0x1000)=nil, 0x1000, 0x2, 0x11, r0, 0xd9aee000) 11:39:08 executing program 1 (fault-call:0 fault-nth:66): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1711.749577][T18148] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1711.755384][T18146] loop1: detected capacity change from 0 to 136 [ 1711.761000][T18151] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1711.778137][T18150] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1711.789545][T18152] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1711.800988][T18146] FAULT_INJECTION: forcing a failure. [ 1711.800988][T18146] name failslab, interval 1, probability 0, space 0, times 0 [ 1711.802301][T18155] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1711.813603][T18146] CPU: 1 PID: 18146 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1711.824751][T18156] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1711.834697][T18146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1711.834718][T18146] Call Trace: [ 1711.834724][T18146] dump_stack+0x137/0x19d [ 1711.834765][T18146] should_fail+0x23c/0x250 [ 1711.857718][T18158] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1711.859045][T18146] __should_failslab+0x81/0x90 [ 1711.869114][T18159] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1711.878839][T18146] should_failslab+0x5/0x20 11:39:08 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1711.878865][T18146] kmem_cache_alloc_node+0x58/0x2b0 [ 1711.878884][T18146] ? __alloc_skb+0xed/0x420 [ 1711.908733][T18146] __alloc_skb+0xed/0x420 [ 1711.913070][T18146] alloc_uevent_skb+0x5b/0x120 [ 1711.917870][T18146] kobject_uevent_env+0x863/0xc40 [ 1711.922895][T18146] ? kernfs_put+0x2e2/0x300 [ 1711.927409][T18146] kobject_uevent+0x18/0x20 [ 1711.931906][T18146] __loop_clr_fd+0x433/0x640 [ 1711.936540][T18146] lo_ioctl+0x9eb/0x11f0 [ 1711.940864][T18146] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 1711.946137][T18146] ? call_rcu+0x259/0x6c0 11:39:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1711.949660][T18164] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1711.950466][T18146] ? avc_has_extended_perms+0x5d8/0x7b0 [ 1711.962175][T18167] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1711.966989][T18146] ? kfree+0xf0/0x1d0 [ 1711.981973][T18146] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1711.982778][T18165] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1711.987343][T18146] ? selinux_file_ioctl+0x8e0/0x970 [ 1711.987364][T18146] ? lo_release+0x120/0x120 [ 1711.998831][T18167] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.003624][T18146] blkdev_ioctl+0x1d0/0x3c0 [ 1712.003645][T18146] block_ioctl+0x6d/0x80 [ 1712.025160][T18168] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.027823][T18146] ? blkdev_iopoll+0x70/0x70 [ 1712.027846][T18146] __se_sys_ioctl+0xcb/0x140 [ 1712.047982][T18146] __x64_sys_ioctl+0x3f/0x50 [ 1712.052556][T18146] do_syscall_64+0x4a/0x90 [ 1712.056968][T18146] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1712.062859][T18146] RIP: 0033:0x466397 [ 1712.062868][T18169] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1712.077875][T18146] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:39:08 executing program 1 (fault-call:0 fault-nth:67): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1712.085108][T18171] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.097499][T18146] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1712.097520][T18146] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000466397 [ 1712.097532][T18146] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1712.097543][T18146] RBP: 00007f6a5b60d6bc R08: 00007f6a5b60d040 R09: 00000000200001c0 11:39:08 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1712.118727][T18173] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.124856][T18146] R10: 0000000000008001 R11: 0000000000000246 R12: ffffffffffffffff [ 1712.124870][T18146] R13: 0000000000000016 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1712.169098][T18176] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.180472][T18177] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1712.192138][T18184] loop1: detected capacity change from 0 to 136 11:39:08 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='./file0\x00', 0x280680, 0xe0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) kcmp$KCMP_EPOLL_TFD(r2, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000040)={r1, r1, 0x3232}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r0, &(0x7f0000000000)="5ea1585a728d65fbbabec984b717efc49755b236c2bc620301c70363a630f33074b88c67c0ab2dc0a630a539adfd60a135cf6c", 0x33) [ 1712.192150][T18175] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.213490][T18191] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.226319][T18183] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.239427][T18184] FAULT_INJECTION: forcing a failure. [ 1712.239427][T18184] name failslab, interval 1, probability 0, space 0, times 0 [ 1712.239617][T18187] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1712.252030][T18184] CPU: 0 PID: 18184 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1712.273256][T18184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1712.275221][T18192] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.283431][T18184] Call Trace: [ 1712.283439][T18184] dump_stack+0x137/0x19d [ 1712.301991][T18184] should_fail+0x23c/0x250 [ 1712.304991][T18195] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.306415][T18184] __should_failslab+0x81/0x90 [ 1712.322158][T18184] should_failslab+0x5/0x20 [ 1712.326661][T18184] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1712.332456][T18184] ? __kmalloc_node_track_caller+0x30/0x40 [ 1712.338280][T18184] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 1712.343727][T18184] __kmalloc_node_track_caller+0x30/0x40 [ 1712.349361][T18184] ? alloc_uevent_skb+0x5b/0x120 [ 1712.354287][T18184] __alloc_skb+0x187/0x420 [ 1712.358691][T18184] alloc_uevent_skb+0x5b/0x120 [ 1712.363462][T18184] kobject_uevent_env+0x863/0xc40 [ 1712.368495][T18184] ? kernfs_put+0x2e2/0x300 [ 1712.372976][T18199] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 1712.372990][T18184] kobject_uevent+0x18/0x20 [ 1712.385516][T18184] __loop_clr_fd+0x433/0x640 [ 1712.388632][T18200] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1712.390094][T18184] lo_ioctl+0x9eb/0x11f0 [ 1712.390112][T18184] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 1712.409085][T18202] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.410720][T18184] ? call_rcu+0x259/0x6c0 [ 1712.423195][T18203] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1712.426033][T18184] ? avc_has_extended_perms+0x5d8/0x7b0 [ 1712.437854][T18204] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.442644][T18184] ? kfree+0xf0/0x1d0 [ 1712.442664][T18184] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1712.462952][T18184] ? selinux_file_ioctl+0x8e0/0x970 [ 1712.468237][T18184] ? lo_release+0x120/0x120 [ 1712.472844][T18184] blkdev_ioctl+0x1d0/0x3c0 [ 1712.477355][T18184] block_ioctl+0x6d/0x80 [ 1712.481587][T18184] ? blkdev_iopoll+0x70/0x70 [ 1712.486168][T18184] __se_sys_ioctl+0xcb/0x140 [ 1712.486710][T18207] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1712.490761][T18184] __x64_sys_ioctl+0x3f/0x50 [ 1712.490782][T18184] do_syscall_64+0x4a/0x90 [ 1712.490815][T18184] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1712.515666][T18209] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.516844][T18184] RIP: 0033:0x466397 [ 1712.516858][T18184] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:39:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:08 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mmap$usbmon(&(0x7f00004f9000/0x1000)=nil, 0x1000, 0x1, 0x10, 0xffffffffffffffff, 0x8) r2 = socket(0x10, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000440)="7800000018001f06b9409b0dffff00fe0212be140200060502c003004300070003000000fac8388827a685a168d0bf46d32345653600648dcaaf6c26c291214549935ade4a460c89b6ec0cff3959547f509058ba86c902000000000000000400160009000a000000000000000000000000f6b4f8eca0faed", 0x78, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x29, 0x9, 0x8, 0x10001, 0x40, @remote, @loopback, 0x7, 0x20, 0x8001, 0x6}}) poll(&(0x7f0000000240)=[{r1}], 0x1, 0x40081) r3 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) openat(r3, &(0x7f0000000000)='./file0\x00', 0xc0, 0x170) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_misc(r1, &(0x7f0000000080)={'syz1', "70b7852524d2b4628973d1d81f8be9e294b25b333c37a1d06f8c2b020a087a63ab5836f823d922d16acfe79928203f362b5c045c8afdfafe8e7f419b49fabb503e595ed2a2884c4d577c503623c5aebfcc9586a34ec6a966cbf4d2be33d6bc113d7064b55582e316dac4f22b7dbe22d2a0e90e50789734586d0f962fc29909488be7c36331c99d68fd423385099fd850bfbc400b3880373c"}, 0x9c) mmap(&(0x7f000064c000/0x3000)=nil, 0x3000, 0x8, 0x8010, r0, 0xbd4e0000) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f0000000040)=0x4, 0x4) 11:39:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:09 executing program 1 (fault-call:0 fault-nth:68): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:09 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1712.516872][T18184] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1712.528059][T18210] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1712.531737][T18184] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000466397 [ 1712.531749][T18184] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1712.531760][T18184] RBP: 00007f6a5b60d6bc R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1712.554168][T18211] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.559883][T18184] R10: 0000000000008001 R11: 0000000000000246 R12: ffffffffffffffff [ 1712.559901][T18184] R13: 0000000000000016 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1712.602213][T18213] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1712.652979][T18220] loop1: detected capacity change from 0 to 136 [ 1712.659112][T18222] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.670353][T18223] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.681809][T18224] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.693041][T18227] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1712.693061][T18220] FAULT_INJECTION: forcing a failure. [ 1712.693061][T18220] name failslab, interval 1, probability 0, space 0, times 0 [ 1712.701480][T18228] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.704188][T18220] CPU: 0 PID: 18220 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1712.729916][T18229] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.737852][T18220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1712.737863][T18220] Call Trace: [ 1712.737870][T18220] dump_stack+0x137/0x19d [ 1712.766608][T18220] should_fail+0x23c/0x250 [ 1712.767248][T18231] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.771015][T18220] __should_failslab+0x81/0x90 [ 1712.786762][T18220] should_failslab+0x5/0x20 [ 1712.791285][T18220] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1712.797010][T18220] ? __kmalloc_node_track_caller+0x30/0x40 [ 1712.797642][T18232] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1712.802866][T18220] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 1712.819476][T18220] __kmalloc_node_track_caller+0x30/0x40 [ 1712.825201][T18220] ? alloc_uevent_skb+0x5b/0x120 [ 1712.830136][T18220] __alloc_skb+0x187/0x420 [ 1712.834599][T18220] alloc_uevent_skb+0x5b/0x120 [ 1712.838129][T18234] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.839365][T18220] kobject_uevent_env+0x863/0xc40 [ 1712.853591][T18236] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.855392][T18220] ? kernfs_put+0x2e2/0x300 [ 1712.855415][T18220] kobject_uevent+0x18/0x20 [ 1712.867497][T18237] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1712.870875][T18220] __loop_clr_fd+0x433/0x640 [ 1712.870895][T18220] lo_ioctl+0x9eb/0x11f0 11:39:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1712.878162][T18238] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.886477][T18220] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 1712.886498][T18220] ? call_rcu+0x259/0x6c0 [ 1712.900285][T18239] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1712.906273][T18220] ? avc_has_extended_perms+0x5d8/0x7b0 [ 1712.906300][T18220] ? kfree+0xf0/0x1d0 [ 1712.936523][T18220] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1712.941953][T18220] ? selinux_file_ioctl+0x8e0/0x970 [ 1712.947133][T18220] ? lo_release+0x120/0x120 [ 1712.951614][T18220] blkdev_ioctl+0x1d0/0x3c0 [ 1712.956139][T18220] block_ioctl+0x6d/0x80 [ 1712.960416][T18220] ? blkdev_iopoll+0x70/0x70 [ 1712.964983][T18220] __se_sys_ioctl+0xcb/0x140 [ 1712.969619][T18220] __x64_sys_ioctl+0x3f/0x50 [ 1712.974183][T18220] do_syscall_64+0x4a/0x90 [ 1712.978578][T18220] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1712.984526][T18220] RIP: 0033:0x466397 [ 1712.988422][T18220] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1713.008057][T18220] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1713.016442][T18220] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000466397 [ 1713.024462][T18220] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1713.032422][T18220] RBP: 00007f6a5b60d6bc R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1713.040401][T18220] R10: 0000000000008001 R11: 0000000000000246 R12: ffffffffffffffff [ 1713.048343][T18220] R13: 0000000000000016 R14: 00007f6a5b60d000 R15: 0000000020000000 11:39:09 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) r1 = dup2(r0, r0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000000)={&(0x7f0000000340)=[0x0, 0x0], 0x2, 0x2}) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/34}, {&(0x7f00000000c0)=""/224}, {&(0x7f0000000280)=""/166}], 0x100000e4, 0xd9f, 0x0) 11:39:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:09 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:09 executing program 1 (fault-call:0 fault-nth:69): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1713.293871][T18255] loop1: detected capacity change from 0 to 136 [ 1713.300996][T18258] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1713.312259][T18256] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1713.323557][T18259] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1713.334928][T18260] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1713.335938][T18255] FAULT_INJECTION: forcing a failure. [ 1713.335938][T18255] name failslab, interval 1, probability 0, space 0, times 0 [ 1713.347186][T18263] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1713.358718][T18255] CPU: 1 PID: 18255 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1713.370706][T18267] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1713.379878][T18255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1713.379890][T18255] Call Trace: [ 1713.379896][T18255] dump_stack+0x137/0x19d [ 1713.379918][T18255] should_fail+0x23c/0x250 [ 1713.379934][T18255] __should_failslab+0x81/0x90 [ 1713.405192][T18264] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1713.408681][T18255] ? call_usermodehelper_setup+0x81/0x160 [ 1713.429616][T18265] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1713.434664][T18255] should_failslab+0x5/0x20 [ 1713.434692][T18255] kmem_cache_alloc_trace+0x49/0x310 [ 1713.455441][T18255] ? add_uevent_var+0x16e/0x1c0 [ 1713.460298][T18255] ? __kfree_skb+0xfe/0x150 [ 1713.464800][T18255] call_usermodehelper_setup+0x81/0x160 [ 1713.470348][T18255] ? add_uevent_var+0x1c0/0x1c0 [ 1713.471499][T18272] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1713.475192][T18255] kobject_uevent_env+0xb29/0xc40 11:39:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:10 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1713.475217][T18255] ? kernfs_put+0x2e2/0x300 [ 1713.495751][T18274] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1713.495792][T18255] kobject_uevent+0x18/0x20 [ 1713.507408][T18273] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1713.511280][T18255] __loop_clr_fd+0x433/0x640 [ 1713.511301][T18255] lo_ioctl+0x9eb/0x11f0 [ 1713.531171][T18255] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 1713.536457][T18255] ? call_rcu+0x259/0x6c0 11:39:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1713.540785][T18255] ? avc_has_extended_perms+0x5d8/0x7b0 [ 1713.546373][T18255] ? kfree+0xf0/0x1d0 [ 1713.550368][T18255] ? blkdev_common_ioctl+0x9c3/0x1040 [ 1713.552215][T18275] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1713.555729][T18255] ? selinux_file_ioctl+0x8e0/0x970 [ 1713.555748][T18255] ? lo_release+0x120/0x120 [ 1713.576405][T18255] blkdev_ioctl+0x1d0/0x3c0 [ 1713.580910][T18255] block_ioctl+0x6d/0x80 [ 1713.585199][T18255] ? blkdev_iopoll+0x70/0x70 [ 1713.589865][T18255] __se_sys_ioctl+0xcb/0x140 [ 1713.594463][T18255] __x64_sys_ioctl+0x3f/0x50 [ 1713.598011][T18281] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1713.599046][T18255] do_syscall_64+0x4a/0x90 [ 1713.599067][T18255] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1713.610913][T18276] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1713.614544][T18255] RIP: 0033:0x466397 [ 1713.614559][T18255] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1713.614572][T18255] RSP: 002b:00007f6a5b60cfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1713.623464][T18279] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1713.631553][T18255] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000466397 [ 1713.631567][T18255] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1713.631578][T18255] RBP: 00007f6a5b60d6bc R08: 00007f6a5b60d040 R09: 00000000200001c0 [ 1713.631590][T18255] R10: 0000000000008001 R11: 0000000000000246 R12: ffffffffffffffff [ 1713.631599][T18255] R13: 0000000000000016 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1713.714801][T18282] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1713.732172][T18283] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1713.745452][T18284] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1713.757399][T18287] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1713.768972][T18288] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:10 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x400, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='./file0\x00', 0x0, 0x81) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:10 executing program 1 (fault-call:0 fault-nth:70): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:10 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1714.203541][T18297] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.205131][T18301] loop1: detected capacity change from 0 to 136 [ 1714.215068][T18298] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.232173][T18300] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1714.243672][T18299] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.255216][T18306] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.266719][T18307] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.284080][T18301] FAULT_INJECTION: forcing a failure. [ 1714.284080][T18301] name failslab, interval 1, probability 0, space 0, times 0 [ 1714.289973][T18308] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1714.296780][T18301] CPU: 0 PID: 18301 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1714.316450][T18310] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.317979][T18301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1714.317990][T18301] Call Trace: [ 1714.317996][T18301] dump_stack+0x137/0x19d [ 1714.346848][T18301] should_fail+0x23c/0x250 11:39:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1714.351259][T18301] ? inotify_handle_inode_event+0x106/0x2d0 [ 1714.357157][T18301] __should_failslab+0x81/0x90 [ 1714.361933][T18301] should_failslab+0x5/0x20 [ 1714.366440][T18301] __kmalloc+0x66/0x340 [ 1714.370583][T18301] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 1714.375855][T18301] inotify_handle_inode_event+0x106/0x2d0 [ 1714.381562][T18301] ? tsan.module_ctor+0x10/0x10 [ 1714.386395][T18301] fsnotify+0x1040/0x1190 [ 1714.390724][T18301] __fsnotify_parent+0x2f3/0x430 [ 1714.395700][T18301] ? blkdev_common_ioctl+0x9c3/0x1040 11:39:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1714.401121][T18301] __fput+0x1a9/0x4e0 [ 1714.405100][T18301] ____fput+0x11/0x20 [ 1714.409065][T18301] task_work_run+0xae/0x130 [ 1714.413557][T18301] exit_to_user_mode_prepare+0x156/0x190 [ 1714.419193][T18301] syscall_exit_to_user_mode+0x20/0x40 [ 1714.424654][T18301] do_syscall_64+0x56/0x90 [ 1714.429133][T18301] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1714.435110][T18301] RIP: 0033:0x4193eb 11:39:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1714.439035][T18301] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 1714.458886][T18301] RSP: 002b:00007f6a5b60cf90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1714.467292][T18301] RAX: 0000000000000000 RBX: 0000000020000140 RCX: 00000000004193eb [ 1714.475252][T18301] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1714.483218][T18301] RBP: 00007f6a5b60d6bc R08: 0000000000000000 R09: 00000000200001c0 [ 1714.489013][T18316] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:11 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) r3 = dup(r1) r4 = eventfd2(0x8, 0x80800) r5 = fsmount(r1, 0x1, 0xf3) r6 = syz_mount_image$nfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x9742, 0x2, &(0x7f0000000400)=[{&(0x7f0000000300)="15f57c6ae21613ad0b5dd5ac61a390923659b7b5f57aca385d544ece37b104a26e2f99e1dbdbcec8e563eafce0b1fc5160c3a3257d76d335b492ebc2a1aa1629da296d928a02e139bc0028ead1b167bc44d9734997e78d5e1e6a34106245ea903226fd26ea9fdac4bbde5ea238d5857f40c4f0fcb76d146aa463251af0a8c6abee3d47baf48400448a1082d407a15e25f163a7adba4453b17aa39bde25784039f6b8f63fda299b387cc711af9560229d23f736664438c5e1", 0xb8, 0x87b}, {&(0x7f00000003c0), 0x0, 0x8}], 0x8, &(0x7f0000000440)={[{'/dev/usbmon#\x00'}], [{@context={'context', 0x3d, 'user_u'}}, {@dont_appraise}, {@obj_user}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/usbmon#\x00'}}, {@euid_lt={'euid<', 0xee00}}]}) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000540), 0xc0000, 0x0) io_submit(0x0, 0x4, &(0x7f00000006c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x4, r2, &(0x7f0000000000)="979dd0219e6b2c9dd30868b7a464e0d832c342cb2f86d3496dc7eb99d8c77c9a4b739ebd241b8b3c2ee61411f24b85caa5b19c0afe2cc1f41c8cec418449f440bd270203d25e", 0x46, 0x0, 0x0, 0x2, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0x6, r4, &(0x7f00000000c0)="01268cf89cc39ff5341d38b679a5aa65ff85b9a9a663ff10296bed5882839364df330babff52adb0b086760c6ed8bd06fdd865c7c74234780bd4777f9c902740f789708dcbd13418e543a9fb3099a380e7fc71bf7435ed97941c7142da473e4011e06651ea4a55d8e0c1ff6e911e5c494c6db49f9340db11a608092fc1bd960ac26339e22e151d4a3d022494958d19a559789a97a3307b430402f6acea44bf2dcff27da37114e9ac741e5c3af693f60bf94a616dfcaa76e468568be3d5c4c382e9d5f3516addd1", 0xc7, 0x9, 0x0, 0x1, r5}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x7, 0x3, r6, &(0x7f00000004c0)="dc525c1202ac9bc70d00df0790b7ef2cb377278f459e478fa5a4345121be96a6a49bf6772ccf87172f78c58e4b49d5a79cb7d807f4eab5b5fb41539212f31470f0fe064088e1311ecdaff8f0c2", 0x4d, 0x0, 0x0, 0x0, r7}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x3, 0x6, r1, &(0x7f00000005c0)="37b0ed76ee7fd649a711f84c77ecb8a4c6251d9cde264fd49a4f613bc84c37603ed25ee5078c33313079e8e12300b64130a04f1b7b0819ef0d6a44ee85401b7787885b96b0d8dc9a52d97022bd7de31c658a219f47a24094b2095c38ea592f0cdeac9051c28b764156deceebe4c9cd19b734e0d30668b9ad99e42a0b09d173515d5ade05330435db59433c6d455175fcc33da2fa", 0x94, 0x4, 0x0, 0x0, r1}]) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:11 executing program 1 (fault-call:0 fault-nth:71): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1714.491196][T18301] R10: 0000000000008001 R11: 0000000000000293 R12: ffffffffffffffff [ 1714.491209][T18301] R13: 0000000000000016 R14: 00007f6a5b60d000 R15: 0000000020000000 [ 1714.526968][T18316] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1714.556121][T18319] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.569693][T18318] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.584301][T18322] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.584966][T18329] loop1: detected capacity change from 0 to 136 11:39:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1714.596275][T18327] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.613574][T18328] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1714.625147][T18332] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.636612][T18334] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.647873][T18339] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1714.653538][T18336] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1714.657263][T18339] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1714.672600][T18329] FAULT_INJECTION: forcing a failure. [ 1714.672600][T18329] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1714.677551][T18339] tc_dump_action: action bad kind [ 1714.690542][T18329] CPU: 1 PID: 18329 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1714.690560][T18329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1714.690568][T18329] Call Trace: [ 1714.690574][T18329] dump_stack+0x137/0x19d [ 1714.697534][T18338] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.705761][T18329] should_fail+0x23c/0x250 [ 1714.738788][T18329] should_fail_usercopy+0x16/0x20 [ 1714.743846][T18329] _copy_to_user+0x1c/0x90 [ 1714.748370][T18329] simple_read_from_buffer+0xab/0x120 11:39:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1714.753826][T18329] proc_fail_nth_read+0xf6/0x140 [ 1714.754867][T18339] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1714.758763][T18329] ? rw_verify_area+0x136/0x250 [ 1714.768141][T18339] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1714.772954][T18329] ? proc_fault_inject_write+0x200/0x200 [ 1714.772977][T18329] vfs_read+0x154/0x5d0 [ 1714.782179][T18339] tc_dump_action: action bad kind [ 1714.787771][T18329] ? __fput+0x43e/0x4e0 [ 1714.801040][T18329] ? __fget_light+0x21b/0x260 [ 1714.805713][T18329] ? __cond_resched+0x11/0x40 [ 1714.810410][T18329] ksys_read+0xce/0x180 [ 1714.814602][T18329] __x64_sys_read+0x3e/0x50 [ 1714.815929][T18350] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.819102][T18329] do_syscall_64+0x4a/0x90 [ 1714.834506][T18329] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1714.837221][T18353] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1714.840454][T18329] RIP: 0033:0x41935c 11:39:11 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000000000)=""/12, 0xc}, {&(0x7f0000000040)=""/175, 0xaf}], 0x3, 0xcef, 0x4) 11:39:11 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1714.840470][T18329] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1714.853892][T18343] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.855502][T18329] RSP: 002b:00007f6a5b60d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1714.855523][T18329] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c 11:39:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1714.876686][T18351] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.886142][T18329] RDX: 000000000000000f RSI: 00007f6a5b60d1e0 RDI: 0000000000000003 [ 1714.886157][T18329] RBP: 00007f6a5b60d1d0 R08: 0000000000000000 R09: 00000000200001c0 [ 1714.886168][T18329] R10: 0000000000008001 R11: 0000000000000246 R12: 0000000000000002 [ 1714.886178][T18329] R13: 00007fff2c5ef76f R14: 00007f6a5b60d300 R15: 0000000000022000 [ 1714.940993][T18360] loop1: detected capacity change from 0 to 136 11:39:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:11 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x2, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1714.946169][T18354] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1714.965921][T18352] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.981678][T18347] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1714.993999][T18365] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1715.011723][T18368] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.025796][T18373] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1715.038759][T18374] loop1: detected capacity change from 0 to 136 [ 1715.039741][T18375] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1715.058099][T18378] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.079274][T18382] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1715.079312][T18374] loop1: detected capacity change from 0 to 136 11:39:11 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x3, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1715.104648][T18390] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0xb223eeb0, 0x4) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) r4 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r4}], 0x1, 0x81) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10010, r4, 0x8000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000000040)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x1, 0x0, 0xffff7fff, 0x3, &(0x7f0000000000), 0x1, 0x0, 0x0, {0x2}}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1715.135458][T18387] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.158639][T18388] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.173123][T18392] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1715.181936][T18397] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1715.184629][T18398] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.193712][T18397] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1715.205374][T18395] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.214122][T18397] tc_dump_action: action bad kind 11:39:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1715.230396][T18396] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.255037][T18400] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.266553][T18401] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:11 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x4, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1715.286333][T18411] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.300261][T18409] loop1: detected capacity change from 0 to 136 [ 1715.302755][T18414] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.318682][T18417] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x5, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1715.333959][T18422] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.345404][T18421] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.358863][T18423] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1715.373424][T18426] loop1: detected capacity change from 0 to 136 11:39:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1715.375455][T18425] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.392166][T18433] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.407536][T18430] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.419471][T18434] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd803}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1715.431054][T18435] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.444141][T18397] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1715.453572][T18397] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1715.462800][T18397] tc_dump_action: action bad kind [ 1715.464094][T18437] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:12 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000040)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000001b40)=""/4096, 0x1000}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003a00f9ffff7f000000000000080000000a01011c780001"], 0x120}], 0x1}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) close_range(r2, r3, 0x2) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x6, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1715.483555][T18438] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.500350][T18445] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1715.512685][T18451] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.523973][T18453] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7002000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1715.539604][T18454] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1715.551038][T18459] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x8, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x9, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1715.591278][T18469] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.602513][T18472] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1715.614618][T18465] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.626282][T18473] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xa, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xb, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1715.638010][T18474] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.650050][T18476] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1715.650187][T18481] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1715.670571][T18481] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1715.673813][T18478] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:12 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x4, 0xc0, 0x7f, 0x8, 0x0, 0x6, 0x10, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x800, 0x2, 0x9, 0x5, 0x2, 0xffffffc0, 0x1f, 0x0, 0x3, 0x0, 0x100000000}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xc, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1715.679796][T18481] tc_dump_action: action bad kind [ 1715.711333][T18483] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.724769][T18490] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1715.733828][T18481] tc_dump_action: action bad kind 11:39:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xd, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xe, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1715.747239][T18493] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1715.779525][T18502] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xf, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x10, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x11, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1715.798914][T18503] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.810450][T18505] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.822281][T18507] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1715.833960][T18508] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.846217][T18511] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.860111][T18514] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.880325][T18515] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:12 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x18000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x12, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 3: ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)={0x9, 0x9}) r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0, 0x8}], 0x1, 0x81) r1 = openat(0xffffffffffffffff, &(0x7f0000000b00)='./file0\x00', 0xf467578f00de4980, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) preadv(r3, &(0x7f0000000380)=[{&(0x7f0000000040)=""/103, 0x67}, {&(0x7f00000000c0)=""/246, 0xf6}, {&(0x7f0000000280)=""/202, 0xca}], 0x3, 0x1, 0xff) dup2(0xffffffffffffffff, r2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x22, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1715.900169][T18524] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.916243][T18528] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x25, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x48, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1715.958036][T18535] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1715.969331][T18539] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.980990][T18537] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1715.992721][T18541] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xd003000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x4c, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1716.004343][T18542] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1716.016319][T18545] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.027976][T18549] tc_dump_action: action bad kind [ 1716.033552][T18549] tc_dump_action: action bad kind [ 1716.038681][T18546] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x68, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1716.057052][T18550] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.072617][T18555] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.090420][T18556] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1716.102326][T18549] tc_dump_action: action bad kind 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x6c, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0xc881, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f00000000c0)={0x110000010}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x80000, 0x140) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x71a27000) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000180)) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000009c0)=ANY=[@ANYBLOB="200c2b90d3fac6490100003200f9ffff7f000000000000080000000a010100080001a820b3abd43b354ad2b6e9ab6ca03f8269e36c2f9292476bebfafac7d368da4d4788e3d163334c413e5f34b6d61ccb5421626a0f968a716143085319f632fef4a053adab2c5e844b334d78e0b2ea6a59f26667955ebedbdb8b1af3c4aee4f37757e225acc2f397b5e32b33fe22461c34cc17b95549b4cce8fecb7ebd958edb4aa6c1443af6a4f4f55e08613acbc8abcc8f99328b587b2a837414c427f4128ce80e7a32657596092e056141f1dc7018250bb3b39901a350da93c6c823d5229e39ff4f472c6256b1afcd8582792e086033bbac5eb6cee781749346b60d9dadc7"], 0x120}], 0x1}, 0x0) close(r4) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1, 0x2f}) r5 = syz_open_dev$vcsu(&(0x7f0000000040), 0x9, 0x4000c0) ioctl$MON_IOCT_RING_SIZE(r5, 0x9204, 0xed5a) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="2001cd59a2b7a84d6be2bdd200003200f9ffff5d19e115fb807f000000518681cb108ed1000000080000000a"], 0x120}], 0x1}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/69, 0x45}, {&(0x7f0000000340)=""/253, 0xfd}, {&(0x7f0000000000)=""/42, 0x2a}, {&(0x7f0000000440)=""/252, 0xfc}, {&(0x7f0000000540)=""/176, 0xb0}, {&(0x7f0000000600)=""/150, 0x96}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x7, 0x1, 0x0) 11:39:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1716.107720][T18560] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.108104][T18540] tc_dump_action: action bad kind [ 1716.132087][T18561] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.143439][T18564] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x74, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7a, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1716.157314][T18570] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.182662][T18569] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7e, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x96, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1716.209751][T18576] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.221350][T18580] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1716.232710][T18582] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.246423][T18585] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:12 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x3ff}) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1716.258113][T18587] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.270130][T18588] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1716.290107][T18591] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfe, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x204, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x300, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1716.305216][T18596] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.327837][T18599] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.341495][T18601] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x30000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1716.353127][T18605] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1716.365295][T18606] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.377306][T18607] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.394573][T18610] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x369, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x402, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1716.408093][T18611] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1716.431968][T18621] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x406, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x500, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1716.451882][T18622] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.464402][T18624] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.476644][T18629] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.488698][T18628] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x600, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet(0x2, 0x3, 0x14) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000180)=ANY=[], 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000440)={0x50, 0x0, 0x40a, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x2b, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x200008d1}, 0x4008) r2 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r2}], 0x1, 0x81) r3 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000780)) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) poll(&(0x7f0000000740)=[{r3, 0xc0}, {r4, 0x8200}], 0x2, 0xff) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fstat(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_none}, {@msize={'msize', 0x3d, 0x4}}, {@loose}, {@dfltgid={'dfltgid', 0x3d, r5}}], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '])+\\'}}, {@fowner_lt={'fowner<', r7}}, {@appraise}, {@subj_type={'subj_type', 0x3d, ')-'}}]}}) [ 1716.506626][T18630] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.523969][T18634] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x604, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x700, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1716.552975][T18637] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1716.583552][T18641] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x900, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xa00, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1716.600323][T18648] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.612724][T18646] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.623994][T18653] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1716.635971][T18656] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1716.647623][T18657] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.659290][T18660] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1716.672435][T18661] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.682200][T18664] tc_dump_action: action bad kind 11:39:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xb00, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xc00, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1716.697495][T18670] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.720714][T18673] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.732084][T18674] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1716.744381][T18675] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.755903][T18678] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.769250][T18679] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.781294][T18681] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:13 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r2, 0x8030942b, &(0x7f0000000000)={0x7, {0x14, 0x13a, 0x2, 0x3d7, 0x2}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xd00, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xe00, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1716.795177][T18684] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.818285][T18652] tc_dump_action: action bad kind [ 1716.839715][T18690] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xf00, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x1020, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1716.861227][T18699] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.872849][T18698] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.884937][T18701] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.896787][T18700] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x1100, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1716.916617][T18707] tc_dump_action: action bad kind [ 1716.921715][T18704] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.933145][T18710] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.945821][T18711] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x1200, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1716.961100][T18713] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1716.977761][T18719] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1716.990396][T18720] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.002726][T18707] tc_dump_action: action bad kind 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x2000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1717.010188][T18721] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.048660][T18730] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.070054][T18734] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.081648][T18731] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x2010, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1717.109304][T18732] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1717.129266][T18737] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x2200, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1717.150640][T18738] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.174890][T18739] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x2500, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1717.205769][T18740] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1717.240762][T18748] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1717.278475][T18747] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.302142][T18752] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x4000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1717.324818][T18756] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1717.345187][T18757] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x4800, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1717.368384][T18758] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.386265][T18761] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.411257][T18762] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1717.450607][T18766] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.486925][T18768] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x6800, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1717.508571][T18774] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.528224][T18776] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x6903, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1717.551679][T18779] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1717.574365][T18777] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.588056][T18780] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7400, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1717.606647][T18784] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1717.637286][T18790] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1717.661461][T18787] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.672729][T18796] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.692274][T18799] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7e00, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x9600, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1717.707786][T18802] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1717.727410][T18801] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.747735][T18803] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfeff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1717.765881][T18806] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1717.799023][T18813] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1717.831107][T18809] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.846118][T18820] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.862483][T18823] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfffe, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1717.876879][T18825] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.893902][T18826] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1717.924869][T18827] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1717.948145][T18834] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x20000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x80000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1717.965556][T18835] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1717.983379][T18836] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1717.998657][T18840] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.010910][T18841] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x80040, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1718.025474][T18842] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.051427][T18847] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1718.063579][T18845] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000100)) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x4c, r2, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4088011}, 0x20000015) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) waitid(0x1, r3, &(0x7f0000000340), 0x40000000, &(0x7f00000003c0)) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r2, 0x200, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, r3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000180)={'wpan0\x00', 0x0}) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f00000001c0)=0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r2, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_PID={0x8, 0x1c, r3}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_PID={0x8, 0x1c, r6}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000001}, 0x40000) 11:39:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x400000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1718.077854][T18852] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1718.100659][T18853] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x18000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap$usbmon(&(0x7f0000291000/0x1000)=nil, 0x1000, 0x1000000, 0x4000010, r2, 0x401) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1718.117662][T18857] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.131752][T18863] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.143317][T18862] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.155982][T18864] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x2040000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1718.178752][T18868] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1718.202844][T18875] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.216175][T18871] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1718.228516][T18880] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.242085][T18885] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.253918][T18883] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1718.269623][T18887] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.285598][T18888] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.297433][T18895] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.310956][T18897] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x10fd44) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x408000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1718.331900][T18898] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1718.344244][T18900] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.357349][T18901] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.371363][T18907] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x6040000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1718.395515][T18908] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1718.409277][T18909] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.427797][T18917] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1718.440839][T18920] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.474382][T18927] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x26000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1718.486451][T18931] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.498333][T18929] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.510108][T18932] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1718.522102][T18934] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.534256][T18939] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:15 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x1, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x6b876000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xb000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1718.548599][T18938] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.571059][T18941] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xc000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xd000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xe000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1718.590549][T18948] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.602341][T18949] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.613722][T18951] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xf000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1718.646421][T18958] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.662743][T18957] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1718.674117][T18963] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.686111][T18965] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x4e22, @broadcast}, {0x306, @local}, 0x0, {0x2, 0x4e23, @broadcast}, 'wlan1\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x11000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1718.697767][T18968] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.708956][T18969] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1718.720465][T18972] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.736331][T18974] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1718.764571][T18981] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.776257][T18983] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x12000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000000)=[{r0, 0x2084}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000040)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x16bb8aa6, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1718.809542][T18992] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1718.827143][T18998] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1718.842328][T18991] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1718.860137][T18993] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.872085][T19004] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.887882][T19006] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x22000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x25000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1718.905594][T19001] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.926192][T19007] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.941230][T19013] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1718.958912][T19018] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.971796][T19020] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1718.987747][T19023] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0xc0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000580)=ANY=[@ANYBLOB="200100003200f9ffff7f000000ffffff070000000a0101000800017c68fe868585d260bd275f11c7e6426a02f0beea160f3a3e7923611b2147cb69ee08cfe56baf5e62b3a75644f03335f6b777a223bfcbb98caeed1eabeec4d29c9e922d9ddc0b4b958b37dc295e6ab57c707b713955c490c5d76907e1f43f19000000000000d495d45b1c5afceb7fe59b227da5687dbb584a51055faf41fd4bd569b3d2513e9f2c9ec35a1cfe818e8638194c89add17d66effe6869b0877a8e50d337ee"], 0x120}], 0x1}, 0x0) sendmmsg(r2, &(0x7f0000000180)=[{{&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @rand_addr=0x64010100}, 0x2, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="0ef37a295d2d3aa5b7ba1d71aae91f14b025da0719aa6646881b82361dc5ff8ce14efe64d58fcb556f39fb66ec30a9a11a029654608fb9", 0x37}, {&(0x7f0000000100)="1fe024642e69e13721837c5052ccea9e908a77a6acd4d584f00a65b3a7369d947ed9", 0x22}], 0x2}}], 0x1, 0x20004810) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x101) r3 = openat(0xffffffffffffffff, &(0x7f0000000540)='/proc/self/exe\x00', 0x448100, 0x1d4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f0000000400)={0x0, @ipx={0x4, 0x401, 0x2, "84f1f3743473", 0x7}, @l2tp={0x2, 0x0, @remote, 0x4}, @qipcrtr={0x2a, 0xffffffffffffffff}, 0x86, 0x0, 0x0, 0x0, 0x4274, &(0x7f00000003c0)='ipvlan1\x00', 0x2, 0x80, 0x9}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f00000002c0)={0x100000000, 0x8, '\x00', 0x1, &(0x7f0000000280)=[0x0]}) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x108) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) r6 = eventfd2(0x55e, 0x80801) ioctl$F2FS_IOC_GARBAGE_COLLECT(r6, 0x4004f506, &(0x7f0000000480)=0x1) splice(r4, &(0x7f0000000340)=0x5, r5, &(0x7f0000000380)=0x656, 0x4, 0x4) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x40000800, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1719.000859][T19025] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.017007][T19028] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1719.036379][T19033] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1719.063403][T19036] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1719.075284][T19035] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.090982][T19044] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1719.110641][T19045] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.128268][T19052] tc_dump_action: action bad kind [ 1719.132384][T19055] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.134444][T19052] tc_dump_action: action bad kind [ 1719.146108][T19048] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x69030000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1719.160853][T19052] tc_dump_action: action bad kind [ 1719.166226][T19051] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.177846][T19058] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.190224][T19057] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.202200][T19052] tc_dump_action: action bad kind 11:39:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x7}) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000000)={0x59, 0xee2, 0x1, 'queue1\x00', 0x9}) r1 = syz_mount_image$nfs4(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)="dd5f6aff1d7909a74d61661fc01285a062a1353fb4f2a671e7ecc11a3706a2f874e879cdabc8390a896d777ddf879a7f887933", 0x33, 0x6f9c}, {&(0x7f0000000280)="7d3eb8a6625ad7a0429b78f8a261179967fa64e8c19ef47bbe71c1ee81ffddae6559338ae9a38555c9f863bb3f1e0de8d0a6ac519b78eae9ef29f458", 0x3c, 0xffff}, {&(0x7f00000002c0)="e2e35b484f2389883876a75db394de3e04465838274c6557efbb229532d28b54bf16a66e9669c7020286e9f6456f139b3d9101b632a2ecbe7231b715a5071f5869496b60711aebcdb59964a315831b589213eda4bc742f5b8fde812460abc5a98664436acee1ee93ee40e2434cee7e8b3368a7ef2feab92c", 0x78, 0x2}], 0x880008, &(0x7f00000003c0)={[], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}) r2 = openat(r1, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000400)={0x0, 0x1010000000000000, 0x1, [0x100000000, 0x9, 0xafdb, 0x6, 0x1], [0x400, 0x9, 0x0, 0x80000000, 0x80, 0xf87, 0xa908, 0x0, 0x1, 0x8, 0xff, 0x2, 0x0, 0xffffffff, 0x8, 0x5, 0xff, 0x7, 0x7, 0x4, 0x7bb8, 0x2, 0x9, 0x0, 0x2, 0xfffffffffffffffe, 0x8, 0x7, 0x5, 0x8608, 0x200, 0x81, 0xfffffffffffffff9, 0x400040000, 0xa6f, 0x10001, 0x4449, 0x1, 0x100, 0x3, 0x8, 0x6ff1, 0x1800b24, 0x7d97d356, 0xd1, 0x3f, 0x0, 0x400, 0x5, 0x9, 0x77ce, 0x0, 0x800, 0x2, 0x6, 0x10001, 0x7, 0x3, 0x8, 0x0, 0x14f0faa4, 0x3, 0x8, 0x81, 0x0, 0x7fff, 0xbece, 0x90000000000, 0xfffffffffffffffb, 0x100000001, 0x3, 0xf5, 0x5, 0x1, 0xc3, 0x5, 0x100000000, 0x890, 0xb0f6, 0x8000, 0x3f, 0x81, 0xf3, 0x9, 0x2, 0x2, 0x7fffffff, 0xb387, 0x8, 0x800, 0x2, 0x100, 0x80000000, 0xc8, 0x3, 0x3ff, 0x4, 0xfffffffffffff001, 0x2b53416c, 0x0, 0x2, 0x5, 0x8, 0x8, 0x49000000, 0x7ff, 0x91, 0x2, 0x6, 0x1, 0x0, 0x1, 0x2, 0xffffffff00000001, 0xe, 0x800, 0xa79, 0x4, 0xfff, 0x0, 0x7]}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) fchdir(r5) sendmsg$netlink(r4, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000840)=[r4], 0x1) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1719.212109][T19065] tc_dump_action: action bad kind [ 1719.222096][T19062] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.235310][T19065] tc_dump_action: action bad kind [ 1719.240980][T19064] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1719.255553][T19069] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.268124][T19073] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.301273][T19077] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:16 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7e000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:16 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1719.313122][T19079] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.326503][T19084] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.337989][T19085] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:16 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1719.354666][T19086] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1719.369347][T19089] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.381264][T19091] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.392884][T19095] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:16 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x96000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1719.407344][T19097] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1719.426958][T19102] tc_dump_action: action bad kind [ 1719.432276][T19100] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.443028][T19102] tc_dump_action: action bad kind [ 1719.446274][T19103] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.460428][T19108] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.473703][T19107] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.489551][T19112] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1719.500889][T19113] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1719.512455][T19114] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:16 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:16 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:16 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r2, 0xf504, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1720.189005][T19117] __nla_validate_parse: 32 callbacks suppressed [ 1720.189015][T19117] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1720.204706][T19117] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1720.213891][T19117] tc_dump_action: action bad kind [ 1720.218925][T19118] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1720.228524][T19118] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1720.237738][T19118] tc_dump_action: action bad kind 11:39:16 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xa68abb16, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:16 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:16 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xdaffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1720.263649][T19125] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.275905][T19130] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.287754][T19123] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1720.299706][T19127] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1720.311378][T19132] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.322973][T19135] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.337757][T19136] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1720.339998][T19140] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xf9fdffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1720.358344][T19140] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1720.360766][T19139] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.367660][T19140] tc_dump_action: action bad kind 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x18}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1720.406444][T19140] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1720.415892][T19140] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1720.424282][T19147] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.425107][T19140] tc_dump_action: action bad kind 11:39:17 executing program 3: add_key$fscrypt_v1(&(0x7f0000001780), 0x0, 0x0, 0x0, 0xffffffffffffffff) setfsgid(0xee00) r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) renameat(r1, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x50) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x86000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1720.446508][T19153] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.462715][T19156] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.478902][T19157] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.491075][T19160] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1720.516012][T19167] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.536793][T19163] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1720.551434][T19171] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfffbffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfffffbff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1720.562642][T19172] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.574618][T19175] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1720.586624][T19176] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.600263][T19179] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DISCONNECT(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r2, 0x100, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x7}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3a}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1c}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1f}]}, 0x40}, 0x1, 0x0, 0x0, 0x404c890}, 0x800) r4 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000, 0x12, r5, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockname$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @empty}, &(0x7f0000000280)=0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000340)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000300)=""/38, 0x26}) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000, 0x2, &(0x7f0000ffe000/0x1000)=nil) [ 1720.618137][T19180] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.632635][T19185] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:17 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x26}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1720.665933][T19191] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.678788][T19195] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.690442][T19197] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1720.707377][T19196] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1720.724615][T19200] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.739279][T19206] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1720.754216][T19208] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xffffff97, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1720.768714][T19209] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.782212][T19213] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1720.797358][T19215] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xffffffda, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SG_SET_COMMAND_Q(r2, 0x2271, &(0x7f0000000000)=0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1720.814525][T19216] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.832581][T19222] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.845843][T19223] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.861752][T19228] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1720.887400][T19232] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.899822][T19234] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.911787][T19235] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1720.929258][T19238] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.947281][T19243] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.959101][T19246] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x80000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x2, 0x101400) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000080)=""/4, 0x4}) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000200)={&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000001180)=""/4096, 0x1000}) fcntl$setown(r1, 0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1720.977892][T19249] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1720.989189][T19254] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.005988][T19255] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:17 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1721.032967][T19252] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1721.045453][T19261] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.058857][T19265] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.071192][T19266] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x2000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1721.090731][T19271] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.102788][T19274] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.125964][T19272] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1721.130067][T19278] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1721.146411][T19278] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1721.148460][T19283] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.155604][T19278] tc_dump_action: action bad kind [ 1721.172338][T19279] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x40000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd8030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1721.184492][T19284] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.199434][T19280] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1721.217208][T19288] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:17 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f0000000080)={{'\x00', 0x2}, {0x80}, 0xb4, 0x0, 0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)="c4ae0d83a97366b106deba3b8c3c50463ba166ba25e2ce2e64f9627d4f22dc017976454e5460eb24b6832e51a06a644157a9a1bbc5369ec5af608016d588c85d375fe258c7e1407785ccde62191ac996df330f2c762608df5ade1e6b7110f29efba88d396ebb3802a3c8a77fec0296707ae98962e9cc0c1d4a9720814ae8b3542e72da9aa4e76757dbbbce2331697f62ef94766d4c1889dfe8c3a837d989dfcf43b7b9812b6666fe8fd7f8d344f6756ed32c6d15f00416e094301918baf33e50e7a856152b6017a995579ec72974f410ff6c1cf938b989a1844168532a67b32d7c97fd310d7f878c80d3c1e72adfdaed450c972669cfd2a6c758cf60307fc6c66fae22aa0b4814b6b7e88e42e9ae5081507201ae82d5f256fe598744221b7652f25e02fb0321529b395caeb2eaa3ea10986e148c90b938d726aa69c8b5bf96a443a4591ee52c40e34859481aa3e7a07b4bd64c0a8aa072240f496215e78a6b5b8d6db8075187d55f8a05e54c50b0b3867588248b966ba27a0e7c8ec16463cebd44c0b0bf99bcd50ff957bfb838067492b3a902d40b4941870e94df9b3bd5125fbe089959c746b30c593830fd1ba0707132044e503a57b2e147632cd8690daadddc0be637399ae850c9ab5f25485659b6b9a5270a5b5fdad5abccadde1f2b3236abb89b454c", 0x1e5, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="020000006c010000010000000ce1000000fed73425498e9b2df61e5f2aae028cb7ca9a6cd37b89640c667968d2168bda513a06b77d8b393619dc4570ab893e8dcb9704defbb42a40582e2761439816ae3cd63f7d809d3d4716cf74240db3e5ce7e097f4c921ed5b379df6541cac641c8537a0923821454b3a28378b2b7eec24f0d14cd6a642a5859f57ef0517902c984ef5238d0a6fdf428ddea1fb63a59ec82356e2cb22cfcbad679eb828f59fd3ccd2f2bc9a52567e57c75f53782856f796e94400063abf29502c9b64bc1c754edf7f9b5046cf292cd350f80cf260eea78a3a20d0e3f6b19bf3ebc0b725a55aaeee219db7e00000025c7666ed00446b733e8e92ca90dfcab8728933fccf2c3b7b59079f0de489e8d22ca2125e85dd6a948735722476bdda677dd030fc7945c1def01a6d6d0ad3f093f00e89f54117d5afd0230a3954479569f26e14e627af4ef05022706b63f8c14dd67d0247812b8c8e5850069d8a4896dfa189b6e55965600a4e075cdf85d6c000000919eb5fc1c49b20c082396a2f9d240cf933137febfeb972f699f7d0539bb644ebbd62b075bcb704750d38a0ea60ac88ac30500f02cff3cbaef97079f6dd9583d4b9b104767322459b604670583eec16de8cac10461a2351bcbdeb894127ce07baf813ea08c6a296fd011b703"], 0x1e4}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$CHAR_RAW_RESETZONE(r2, 0x40101283, &(0x7f0000000100)={0x5, 0x401}) preadv(r1, &(0x7f0000000280), 0x0, 0xd9f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = signalfd(0xffffffffffffffff, &(0x7f0000000680)={[0x9]}, 0x8) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r4, 0x89f9, &(0x7f0000000740)={'ip6gre0\x00', &(0x7f00000006c0)={'ip6tnl0\x00', 0x0, 0x4, 0x1f, 0x1, 0x1, 0x2e, @private1, @remote, 0x9, 0x7, 0x1000, 0x6}}) getdents64(r3, &(0x7f0000000140)=""/181, 0xb5) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1721.241319][T19292] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.256128][T19299] tc_dump_action: action bad kind [ 1721.258690][T19296] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1721.272521][T19300] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:17 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x204000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1721.297673][T19301] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.309320][T19305] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.325224][T19306] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1721.338293][T19310] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.350385][T19312] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.362362][T19315] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1721.379074][T19316] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r0, 0x3, 0x80000000, 0x3f}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x5}) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="210100003200f9fbff7f000000000000080000000a010100080001684ad99d9d9ef41c39bba2199d44b081fd39574b9b0002e7"], 0x120}], 0x1}, 0x0) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) fdatasync(r4) fcntl$setown(r2, 0x8, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_void(r2, 0x1, 0x24, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1721.404531][T19324] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.420488][T19330] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.432695][T19331] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:18 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x604000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1721.446061][T19328] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.458368][T19333] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.482638][T19335] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1721.504179][T19343] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.517487][T19344] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.534123][T19348] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:18 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000), 0x100000000, 0x2000) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1721.549219][T19349] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.571997][T19355] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1721.599178][T19358] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.612411][T19359] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.625789][T19367] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.638224][T19366] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xc00000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xd00000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1721.651701][T19371] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.664220][T19372] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.682899][T19377] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:18 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x941c, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xe00000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1721.707518][T19383] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1721.731236][T19382] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.742963][T19393] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:18 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xf00000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1721.755070][T19387] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.787892][T19394] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x1000000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1721.807757][T19397] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.825733][T19402] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x1100000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read$usbmon(r1, &(0x7f0000000000)=""/157, 0x9d) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1721.860898][T19407] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.879736][T19406] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:18 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x18}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x1200000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1721.919713][T19411] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1721.954052][T19410] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x270}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x16bb8aa600000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1721.979518][T19417] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1721.999063][T19419] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1722.022647][T19424] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.044941][T19425] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.067435][T19429] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:18 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0xfe8f7000) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3, 0x3}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1722.092396][T19430] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.114483][T19432] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1722.142392][T19435] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1722.180618][T19439] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x2200000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x2500000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1722.196178][T19446] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.210988][T19448] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.224906][T19452] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:18 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="200100003200f9ffff7f000000000000080000000a010100080001"], 0x120}], 0x1}, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:39:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x3d0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1722.237204][T19454] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.252869][T19455] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1722.274971][T19463] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:18 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1722.286705][T19458] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x4000080000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1722.318158][T19462] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.331410][T19468] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.343701][T19472] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1722.355824][T19476] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1722.368669][T19477] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.380570][T19481] tc_dump_action: action bad kind [ 1722.386268][T19479] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.397675][T19480] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:19 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x30}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x81) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000000)={0x5, 0x81, 0x6, 0x200, 0x6}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1722.416911][T19485] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.435228][T19487] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.454718][T19495] tc_dump_action: action bad kind 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x6903000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1722.459946][T19494] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.476951][T19497] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.489879][T19498] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1722.508170][T19501] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1722.520099][T19503] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.532494][T19505] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1722.543828][T19510] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:19 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7e00000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1722.567328][T19512] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.585483][T19518] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:19 executing program 3 (fault-call:2 fault-nth:0): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1722.611549][T19524] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1722.636421][T19528] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.647811][T19530] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1722.659842][T19534] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x9600000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1722.682423][T19539] FAULT_INJECTION: forcing a failure. [ 1722.682423][T19539] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1722.695563][T19539] CPU: 1 PID: 19539 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1722.705845][T19539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1722.715880][T19539] Call Trace: [ 1722.719151][T19539] dump_stack+0x137/0x19d [ 1722.723488][T19539] should_fail+0x23c/0x250 [ 1722.727900][T19539] should_fail_usercopy+0x16/0x20 [ 1722.732915][T19539] _copy_from_user+0x1c/0xd0 [ 1722.737507][T19539] perf_copy_attr+0x156/0x650 [ 1722.742176][T19539] __se_sys_perf_event_open+0xb6/0x2740 [ 1722.747722][T19539] ? vfs_write+0x50c/0x770 [ 1722.752130][T19539] __x64_sys_perf_event_open+0x63/0x70 [ 1722.757612][T19539] do_syscall_64+0x4a/0x90 [ 1722.762025][T19539] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1722.768000][T19539] RIP: 0033:0x4665d9 [ 1722.771875][T19539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1722.791665][T19539] RSP: 002b:00007f59e947b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1722.800082][T19539] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1722.808059][T19539] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 1722.816024][T19539] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1722.823978][T19539] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 11:39:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xdaffffff00000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:19 executing program 3 (fault-call:2 fault-nth:1): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1722.831944][T19539] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 [ 1722.849038][T19536] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1722.860323][T19538] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xf9fdffff00000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1722.882256][T19544] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1722.897313][T19555] FAULT_INJECTION: forcing a failure. [ 1722.897313][T19555] name failslab, interval 1, probability 0, space 0, times 0 [ 1722.909948][T19555] CPU: 0 PID: 19555 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1722.920200][T19555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1722.930247][T19555] Call Trace: 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1722.933535][T19555] dump_stack+0x137/0x19d [ 1722.937861][T19555] should_fail+0x23c/0x250 [ 1722.942272][T19555] __should_failslab+0x81/0x90 [ 1722.947041][T19555] should_failslab+0x5/0x20 [ 1722.951645][T19555] kmem_cache_alloc_node+0x58/0x2b0 [ 1722.956927][T19555] ? cred_has_capability+0x1af/0x210 [ 1722.962268][T19555] ? perf_event_alloc+0x160/0x1790 [ 1722.967376][T19555] perf_event_alloc+0x160/0x1790 [ 1722.972303][T19555] __se_sys_perf_event_open+0x5c7/0x2740 [ 1722.977967][T19555] ? vfs_write+0x50c/0x770 [ 1722.982378][T19555] __x64_sys_perf_event_open+0x63/0x70 [ 1722.987837][T19555] do_syscall_64+0x4a/0x90 [ 1722.992321][T19555] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1722.998242][T19555] RIP: 0033:0x4665d9 [ 1723.002113][T19555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.021828][T19555] RSP: 002b:00007f59e947b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1723.030220][T19555] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1723.038348][T19555] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 1723.046327][T19555] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1723.054303][T19555] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1723.062323][T19555] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 11:39:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfeffffff00000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:19 executing program 3 (fault-call:2 fault-nth:2): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1723.077698][T19557] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.090424][T19558] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1723.103124][T19561] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.126998][T19569] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.140516][T19572] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.152917][T19575] FAULT_INJECTION: forcing a failure. [ 1723.152917][T19575] name failslab, interval 1, probability 0, space 0, times 0 [ 1723.165598][T19575] CPU: 0 PID: 19575 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1723.175778][T19575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1723.185931][T19575] Call Trace: [ 1723.189227][T19575] dump_stack+0x137/0x19d [ 1723.193556][T19575] should_fail+0x23c/0x250 [ 1723.197987][T19575] ? perf_uprobe_init+0x45/0x140 [ 1723.202910][T19575] __should_failslab+0x81/0x90 [ 1723.207730][T19575] should_failslab+0x5/0x20 [ 1723.212299][T19575] __kmalloc_track_caller+0x64/0x340 [ 1723.217568][T19575] ? strnlen_user+0x137/0x1c0 [ 1723.222287][T19575] strndup_user+0x73/0x120 [ 1723.226755][T19575] perf_uprobe_init+0x45/0x140 [ 1723.231505][T19575] perf_uprobe_event_init+0xde/0x140 [ 1723.236924][T19575] perf_try_init_event+0x21a/0x400 [ 1723.242041][T19575] perf_event_alloc+0xa60/0x1790 [ 1723.246962][T19575] __se_sys_perf_event_open+0x5c7/0x2740 [ 1723.252684][T19575] ? vfs_write+0x50c/0x770 [ 1723.257084][T19575] __x64_sys_perf_event_open+0x63/0x70 [ 1723.262528][T19575] do_syscall_64+0x4a/0x90 [ 1723.267008][T19575] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1723.272886][T19575] RIP: 0033:0x4665d9 [ 1723.276772][T19575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.296459][T19575] RSP: 002b:00007f59e947b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1723.304857][T19575] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1723.312809][T19575] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 1723.320849][T19575] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 11:39:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfeffffffffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:20 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 3 (fault-call:2 fault-nth:3): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1723.328884][T19575] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1723.336933][T19575] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 [ 1723.346007][T19576] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1723.362616][T19577] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1723.404503][T19586] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.416289][T19587] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1723.428981][T19588] ref_ctr_offset mismatch. inode: 0x361c offset: 0x4 ref_ctr_offset(old): 0x12 ref_ctr_offset(new): 0x8 [ 1723.429319][T19589] FAULT_INJECTION: forcing a failure. [ 1723.429319][T19589] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1723.440715][T19592] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.453150][T19589] CPU: 1 PID: 19589 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1723.453168][T19589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1723.465075][T19593] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1723.474276][T19589] Call Trace: [ 1723.474285][T19589] dump_stack+0x137/0x19d [ 1723.493949][T19591] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.495484][T19589] should_fail+0x23c/0x250 [ 1723.498829][T19594] ref_ctr_offset mismatch. inode: 0x361c offset: 0x4 ref_ctr_offset(old): 0x12 ref_ctr_offset(new): 0x8 [ 1723.503062][T19589] should_fail_usercopy+0x16/0x20 [ 1723.503082][T19589] _copy_from_user+0x1c/0xd0 [ 1723.524911][T19595] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.529628][T19589] strndup_user+0xb0/0x120 11:39:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1723.529647][T19589] perf_uprobe_init+0x45/0x140 [ 1723.559425][T19589] perf_uprobe_event_init+0xde/0x140 [ 1723.564723][T19589] perf_try_init_event+0x21a/0x400 [ 1723.569828][T19589] perf_event_alloc+0xa60/0x1790 [ 1723.574766][T19589] __se_sys_perf_event_open+0x5c7/0x2740 [ 1723.580387][T19589] ? vfs_write+0x50c/0x770 [ 1723.584811][T19589] __x64_sys_perf_event_open+0x63/0x70 [ 1723.590268][T19589] do_syscall_64+0x4a/0x90 11:39:20 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1723.593260][T19603] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.594678][T19589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1723.606444][T19604] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.611601][T19589] RIP: 0033:0x4665d9 [ 1723.611617][T19589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.646077][T19589] RSP: 002b:00007f59e947b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 11:39:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfffbffff00000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xffffff7f00000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1723.646849][T19608] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.654536][T19589] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1723.654551][T19589] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 1723.654562][T19589] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1723.654574][T19589] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 11:39:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 3 (fault-call:2 fault-nth:4): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1723.685943][T19609] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.689592][T19589] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 [ 1723.704457][T19610] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1723.734816][T19607] ref_ctr_offset mismatch. inode: 0x361c offset: 0x5 ref_ctr_offset(old): 0x12 ref_ctr_offset(new): 0x8 11:39:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1723.755660][T19611] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.765740][T19622] FAULT_INJECTION: forcing a failure. [ 1723.765740][T19622] name failslab, interval 1, probability 0, space 0, times 0 [ 1723.767758][T19612] ref_ctr_offset mismatch. inode: 0x361c offset: 0x5 ref_ctr_offset(old): 0x12 ref_ctr_offset(new): 0x8 [ 1723.779274][T19622] CPU: 0 PID: 19622 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 11:39:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1723.800505][T19622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1723.801742][T19616] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1723.810548][T19622] Call Trace: [ 1723.810558][T19622] dump_stack+0x137/0x19d [ 1723.823627][T19621] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.824892][T19622] should_fail+0x23c/0x250 [ 1723.844610][T19622] ? getname_kernel+0x37/0x1d0 [ 1723.849405][T19622] __should_failslab+0x81/0x90 11:39:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1723.850945][T19624] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.854163][T19622] should_failslab+0x5/0x20 [ 1723.854187][T19622] kmem_cache_alloc+0x46/0x2f0 [ 1723.854206][T19622] ? __next_node_in+0xad/0xe0 [ 1723.871179][T19625] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.874411][T19622] getname_kernel+0x37/0x1d0 [ 1723.894657][T19622] kern_path+0x19/0x40 [ 1723.898714][T19622] create_local_trace_uprobe+0x3f/0x3c0 11:39:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1723.904319][T19622] perf_uprobe_init+0xbe/0x140 [ 1723.909088][T19622] perf_uprobe_event_init+0xde/0x140 [ 1723.914377][T19622] perf_try_init_event+0x21a/0x400 [ 1723.915684][T19631] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.919491][T19622] perf_event_alloc+0xa60/0x1790 [ 1723.919512][T19622] __se_sys_perf_event_open+0x5c7/0x2740 [ 1723.933165][T19633] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1723.935459][T19622] ? vfs_write+0x50c/0x770 11:39:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1723.935479][T19622] __x64_sys_perf_event_open+0x63/0x70 [ 1723.961893][T19622] do_syscall_64+0x4a/0x90 [ 1723.966304][T19622] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1723.972199][T19622] RIP: 0033:0x4665d9 [ 1723.976134][T19622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.995736][T19622] RSP: 002b:00007f59e947b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 11:39:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:20 executing program 3 (fault-call:2 fault-nth:5): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1724.004193][T19622] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1724.012160][T19622] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 1724.020123][T19622] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1724.028264][T19622] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1724.036232][T19622] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 11:39:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1724.049995][T19632] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1724.061229][T19641] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1724.073503][T19642] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1724.085418][T19651] FAULT_INJECTION: forcing a failure. [ 1724.085418][T19651] name failslab, interval 1, probability 0, space 0, times 0 [ 1724.098019][T19651] CPU: 0 PID: 19651 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1724.108151][T19651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1724.118189][T19651] Call Trace: [ 1724.121500][T19651] dump_stack+0x137/0x19d [ 1724.125878][T19651] should_fail+0x23c/0x250 [ 1724.130456][T19651] __should_failslab+0x81/0x90 [ 1724.135224][T19651] ? proc_self_get_link+0x90/0x100 [ 1724.140335][T19651] should_failslab+0x5/0x20 [ 1724.144892][T19651] kmem_cache_alloc_trace+0x49/0x310 [ 1724.150159][T19651] proc_self_get_link+0x90/0x100 [ 1724.155179][T19651] ? proc_setup_self+0x1d0/0x1d0 [ 1724.160251][T19651] step_into+0x9b4/0xec0 [ 1724.164512][T19651] walk_component+0x190/0x350 [ 1724.169184][T19651] link_path_walk+0x4ba/0x780 [ 1724.173914][T19651] path_lookupat+0x7b/0x570 [ 1724.178395][T19651] filename_lookup+0xff/0x390 [ 1724.183047][T19651] ? kmem_cache_alloc+0x201/0x2f0 [ 1724.188050][T19651] ? getname_kernel+0x37/0x1d0 [ 1724.192796][T19651] kern_path+0x2e/0x40 [ 1724.196845][T19651] create_local_trace_uprobe+0x3f/0x3c0 [ 1724.202391][T19651] perf_uprobe_init+0xbe/0x140 [ 1724.207137][T19651] perf_uprobe_event_init+0xde/0x140 [ 1724.212402][T19651] perf_try_init_event+0x21a/0x400 [ 1724.217511][T19651] perf_event_alloc+0xa60/0x1790 [ 1724.222441][T19651] __se_sys_perf_event_open+0x5c7/0x2740 [ 1724.228163][T19651] ? vfs_write+0x50c/0x770 [ 1724.232554][T19651] __x64_sys_perf_event_open+0x63/0x70 [ 1724.237992][T19651] do_syscall_64+0x4a/0x90 [ 1724.242394][T19651] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1724.248294][T19651] RIP: 0033:0x4665d9 [ 1724.252175][T19651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1724.271760][T19651] RSP: 002b:00007f59e947b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1724.280187][T19651] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1724.288137][T19651] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 1724.296084][T19651] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 11:39:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:21 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 3 (fault-call:2 fault-nth:6): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1724.304041][T19651] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1724.312067][T19651] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 [ 1724.320926][T19636] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1724.332121][T19641] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1724.343899][T19652] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1724.356546][T19651] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 11:39:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x6, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x7, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1724.412775][T19665] FAULT_INJECTION: forcing a failure. [ 1724.412775][T19665] name failslab, interval 1, probability 0, space 0, times 0 [ 1724.425412][T19665] CPU: 1 PID: 19665 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1724.435588][T19665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1724.445635][T19665] Call Trace: [ 1724.448920][T19665] dump_stack+0x137/0x19d [ 1724.453250][T19665] should_fail+0x23c/0x250 [ 1724.457676][T19665] __should_failslab+0x81/0x90 11:39:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0xa, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0xf, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x14, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1724.462444][T19665] ? create_local_trace_uprobe+0xa9/0x3c0 [ 1724.468214][T19665] should_failslab+0x5/0x20 [ 1724.472718][T19665] kmem_cache_alloc_trace+0x49/0x310 [ 1724.478112][T19665] create_local_trace_uprobe+0xa9/0x3c0 [ 1724.483681][T19665] perf_uprobe_init+0xbe/0x140 [ 1724.488441][T19665] perf_uprobe_event_init+0xde/0x140 [ 1724.493722][T19665] perf_try_init_event+0x21a/0x400 [ 1724.498825][T19665] perf_event_alloc+0xa60/0x1790 [ 1724.503754][T19665] __se_sys_perf_event_open+0x5c7/0x2740 [ 1724.509374][T19665] ? vfs_write+0x50c/0x770 [ 1724.513846][T19665] __x64_sys_perf_event_open+0x63/0x70 [ 1724.519328][T19665] do_syscall_64+0x4a/0x90 [ 1724.523829][T19665] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1724.529715][T19665] RIP: 0033:0x4665d9 [ 1724.533688][T19665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1724.553315][T19665] RSP: 002b:00007f59e947b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1724.561875][T19665] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1724.569940][T19665] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 1724.577885][T19665] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1724.585889][T19665] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1724.593890][T19665] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 [ 1724.601886][T19665] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 1724.608788][T19669] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1724.620354][T19664] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1724.632682][T19683] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1724.644420][T19668] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0xfe, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:21 executing program 3 (fault-call:2 fault-nth:7): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1724.659390][T19684] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1724.670601][T19685] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1724.715517][T19694] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1724.729365][T19696] FAULT_INJECTION: forcing a failure. [ 1724.729365][T19696] name failslab, interval 1, probability 0, space 0, times 0 [ 1724.742011][T19696] CPU: 0 PID: 19696 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1724.745192][T19697] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1724.752151][T19696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1724.752163][T19696] Call Trace: [ 1724.752170][T19696] dump_stack+0x137/0x19d [ 1724.752192][T19696] should_fail+0x23c/0x250 [ 1724.785262][T19696] ? kzalloc+0x16/0x20 [ 1724.789337][T19696] __should_failslab+0x81/0x90 [ 1724.794090][T19696] should_failslab+0x5/0x20 [ 1724.798650][T19696] __kmalloc+0x66/0x340 [ 1724.802792][T19696] kzalloc+0x16/0x20 [ 1724.806668][T19696] trace_probe_init+0x41/0x250 [ 1724.811414][T19696] create_local_trace_uprobe+0xd1/0x3c0 [ 1724.816942][T19696] perf_uprobe_init+0xbe/0x140 [ 1724.821703][T19696] perf_uprobe_event_init+0xde/0x140 [ 1724.827009][T19696] perf_try_init_event+0x21a/0x400 [ 1724.832108][T19696] perf_event_alloc+0xa60/0x1790 [ 1724.837028][T19696] __se_sys_perf_event_open+0x5c7/0x2740 [ 1724.842639][T19696] ? vfs_write+0x50c/0x770 [ 1724.847096][T19696] __x64_sys_perf_event_open+0x63/0x70 [ 1724.852560][T19696] do_syscall_64+0x4a/0x90 [ 1724.857029][T19696] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1724.862938][T19696] RIP: 0033:0x4665d9 [ 1724.866889][T19696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1724.886478][T19696] RSP: 002b:00007f59e947b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1724.894926][T19696] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1724.902877][T19696] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 11:39:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x122, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:21 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 3 (fault-call:2 fault-nth:8): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1724.910830][T19696] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1724.918786][T19696] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1724.926803][T19696] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 [ 1724.934828][T19696] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 1724.949387][T19702] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1724.961764][T19699] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1724.996736][T19706] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1725.008248][T19711] FAULT_INJECTION: forcing a failure. [ 1725.008248][T19711] name failslab, interval 1, probability 0, space 0, times 0 [ 1725.010824][T19701] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1725.020952][T19711] CPU: 1 PID: 19711 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1725.033934][T19710] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1725.042041][T19711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1725.042053][T19711] Call Trace: [ 1725.042060][T19711] dump_stack+0x137/0x19d [ 1725.042078][T19711] should_fail+0x23c/0x250 [ 1725.075137][T19711] ? trace_probe_init+0x1bd/0x250 [ 1725.080160][T19711] __should_failslab+0x81/0x90 [ 1725.084906][T19711] should_failslab+0x5/0x20 [ 1725.089433][T19711] __kmalloc_track_caller+0x64/0x340 [ 1725.094719][T19711] ? __kmalloc+0x23d/0x340 [ 1725.099200][T19711] ? kzalloc+0x16/0x20 [ 1725.103266][T19711] kstrdup+0x31/0x70 [ 1725.107138][T19711] trace_probe_init+0x1bd/0x250 [ 1725.111972][T19711] create_local_trace_uprobe+0xd1/0x3c0 [ 1725.117500][T19711] perf_uprobe_init+0xbe/0x140 [ 1725.122275][T19711] perf_uprobe_event_init+0xde/0x140 [ 1725.127643][T19711] perf_try_init_event+0x21a/0x400 [ 1725.132736][T19711] perf_event_alloc+0xa60/0x1790 [ 1725.137672][T19711] __se_sys_perf_event_open+0x5c7/0x2740 [ 1725.143301][T19711] ? vfs_write+0x50c/0x770 [ 1725.147834][T19711] __x64_sys_perf_event_open+0x63/0x70 [ 1725.153279][T19711] do_syscall_64+0x4a/0x90 [ 1725.157674][T19711] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1725.163562][T19711] RIP: 0033:0x4665d9 11:39:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x160, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1725.167445][T19711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1725.187031][T19711] RSP: 002b:00007f59e947b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1725.195434][T19711] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1725.203386][T19711] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 11:39:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x300, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:21 executing program 3 (fault-call:2 fault-nth:9): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1725.211340][T19711] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1725.219316][T19711] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1725.227290][T19711] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 [ 1725.235292][T19711] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 1725.251591][T19712] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:21 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:22 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1e00, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1725.273351][T19714] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1725.304411][T19721] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1725.333615][T19727] FAULT_INJECTION: forcing a failure. [ 1725.333615][T19727] name failslab, interval 1, probability 0, space 0, times 0 [ 1725.346228][T19727] CPU: 0 PID: 19727 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1725.356374][T19727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1725.366426][T19727] Call Trace: [ 1725.369700][T19727] dump_stack+0x137/0x19d [ 1725.374071][T19727] should_fail+0x23c/0x250 [ 1725.378500][T19727] ? trace_probe_init+0x1e1/0x250 11:39:22 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1725.383523][T19727] __should_failslab+0x81/0x90 [ 1725.388286][T19727] should_failslab+0x5/0x20 [ 1725.392786][T19727] __kmalloc_track_caller+0x64/0x340 [ 1725.398121][T19727] ? trace_probe_init+0x1bd/0x250 [ 1725.403144][T19727] kstrdup+0x31/0x70 [ 1725.407031][T19727] trace_probe_init+0x1e1/0x250 [ 1725.411880][T19727] create_local_trace_uprobe+0xd1/0x3c0 [ 1725.417465][T19727] perf_uprobe_init+0xbe/0x140 [ 1725.422242][T19727] perf_uprobe_event_init+0xde/0x140 [ 1725.427526][T19727] perf_try_init_event+0x21a/0x400 [ 1725.432671][T19727] perf_event_alloc+0xa60/0x1790 [ 1725.437606][T19727] __se_sys_perf_event_open+0x5c7/0x2740 [ 1725.443272][T19727] ? vfs_write+0x50c/0x770 [ 1725.447686][T19727] __x64_sys_perf_event_open+0x63/0x70 [ 1725.453139][T19727] do_syscall_64+0x4a/0x90 [ 1725.457556][T19727] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1725.463446][T19727] RIP: 0033:0x4665d9 11:39:22 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x3400, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1725.467389][T19727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1725.486988][T19727] RSP: 002b:00007f59e947b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1725.495396][T19727] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1725.503351][T19727] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 1725.511314][T19727] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1725.519277][T19727] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 11:39:22 executing program 3 (fault-call:2 fault-nth:10): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1725.527358][T19727] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 [ 1725.535375][T19727] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 1725.542274][T19728] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1725.554212][T19729] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1725.572447][T19730] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1725.598703][T19738] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1725.599670][T19741] FAULT_INJECTION: forcing a failure. [ 1725.599670][T19741] name failslab, interval 1, probability 0, space 0, times 0 [ 1725.622438][T19741] CPU: 0 PID: 19741 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1725.632583][T19741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1725.642630][T19741] Call Trace: [ 1725.645892][T19741] dump_stack+0x137/0x19d [ 1725.650223][T19741] should_fail+0x23c/0x250 [ 1725.654631][T19741] ? create_local_trace_uprobe+0x235/0x3c0 [ 1725.656375][T19744] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1725.660433][T19741] __should_failslab+0x81/0x90 [ 1725.676330][T19741] should_failslab+0x5/0x20 [ 1725.680823][T19741] __kmalloc_track_caller+0x64/0x340 [ 1725.686095][T19741] ? kstrdup+0x4c/0x70 [ 1725.690151][T19741] kstrdup+0x31/0x70 11:39:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1725.692704][T19745] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1725.694050][T19741] create_local_trace_uprobe+0x235/0x3c0 [ 1725.694075][T19741] perf_uprobe_init+0xbe/0x140 [ 1725.715487][T19741] perf_uprobe_event_init+0xde/0x140 [ 1725.720816][T19741] perf_try_init_event+0x21a/0x400 [ 1725.725917][T19741] perf_event_alloc+0xa60/0x1790 [ 1725.730878][T19741] __se_sys_perf_event_open+0x5c7/0x2740 [ 1725.736509][T19741] ? vfs_write+0x50c/0x770 [ 1725.740936][T19741] __x64_sys_perf_event_open+0x63/0x70 [ 1725.746394][T19741] do_syscall_64+0x4a/0x90 [ 1725.750808][T19741] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1725.751645][T19747] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1725.756705][T19741] RIP: 0033:0x4665d9 [ 1725.756724][T19741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1725.773532][T19742] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1725.791344][T19741] RSP: 002b:00007f59e947b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1725.791367][T19741] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1725.818730][T19741] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 1725.826724][T19741] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1725.834687][T19741] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 11:39:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:22 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0xd200, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:22 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x18}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:22 executing program 3 (fault-call:2 fault-nth:11): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1725.842639][T19741] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 [ 1725.850860][T19750] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1725.875566][T19741] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 [ 1725.914131][T19759] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1725.941546][T19761] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1725.955220][T19762] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1725.967408][T19766] FAULT_INJECTION: forcing a failure. [ 1725.967408][T19766] name failslab, interval 1, probability 0, space 0, times 0 [ 1725.980057][T19766] CPU: 1 PID: 19766 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1725.990186][T19766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1726.000245][T19766] Call Trace: [ 1726.003560][T19766] dump_stack+0x137/0x19d [ 1726.007926][T19766] should_fail+0x23c/0x250 [ 1726.012333][T19766] ? traceprobe_set_print_fmt+0x45/0xa0 [ 1726.017864][T19766] __should_failslab+0x81/0x90 [ 1726.022845][T19766] should_failslab+0x5/0x20 [ 1726.027371][T19766] __kmalloc+0x66/0x340 [ 1726.031564][T19766] ? __kmalloc_track_caller+0x23b/0x340 [ 1726.037155][T19766] traceprobe_set_print_fmt+0x45/0xa0 [ 1726.042522][T19766] create_local_trace_uprobe+0x2eb/0x3c0 [ 1726.048149][T19766] perf_uprobe_init+0xbe/0x140 [ 1726.052900][T19766] perf_uprobe_event_init+0xde/0x140 [ 1726.058245][T19766] perf_try_init_event+0x21a/0x400 [ 1726.063340][T19766] perf_event_alloc+0xa60/0x1790 [ 1726.068259][T19766] __se_sys_perf_event_open+0x5c7/0x2740 [ 1726.073902][T19766] ? vfs_write+0x50c/0x770 [ 1726.078303][T19766] __x64_sys_perf_event_open+0x63/0x70 [ 1726.083751][T19766] do_syscall_64+0x4a/0x90 [ 1726.088209][T19766] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1726.094090][T19766] RIP: 0033:0x4665d9 11:39:22 executing program 3 (fault-call:2 fault-nth:12): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1726.097984][T19766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1726.117624][T19766] RSP: 002b:00007f59e947b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1726.126058][T19766] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1726.134011][T19766] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 1726.141979][T19766] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1726.149951][T19766] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 11:39:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:22 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1726.157975][T19766] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 [ 1726.171110][T19765] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1726.191397][T19767] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:22 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0xd300, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1726.220268][T19768] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1726.244772][T19771] FAULT_INJECTION: forcing a failure. [ 1726.244772][T19771] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1726.257998][T19771] CPU: 0 PID: 19771 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1726.268151][T19771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1726.278260][T19771] Call Trace: [ 1726.281527][T19771] dump_stack+0x137/0x19d [ 1726.285854][T19771] should_fail+0x23c/0x250 [ 1726.290338][T19771] __alloc_pages+0x102/0x320 [ 1726.294916][T19771] probe_event_enable+0x421/0x7d0 [ 1726.299959][T19771] ? __uprobe_trace_func+0x430/0x430 [ 1726.305246][T19771] trace_uprobe_register+0x88/0x410 [ 1726.310437][T19771] perf_trace_event_init+0x34e/0x790 [ 1726.315742][T19771] perf_uprobe_init+0xf5/0x140 [ 1726.320502][T19771] perf_uprobe_event_init+0xde/0x140 [ 1726.325795][T19771] perf_try_init_event+0x21a/0x400 [ 1726.330911][T19771] perf_event_alloc+0xa60/0x1790 [ 1726.335839][T19771] __se_sys_perf_event_open+0x5c7/0x2740 [ 1726.341495][T19771] ? vfs_write+0x50c/0x770 [ 1726.345916][T19771] __x64_sys_perf_event_open+0x63/0x70 [ 1726.351445][T19771] do_syscall_64+0x4a/0x90 [ 1726.356035][T19771] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1726.361928][T19771] RIP: 0033:0x4665d9 [ 1726.365809][T19771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1726.385404][T19771] RSP: 002b:00007f59e947b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1726.393801][T19771] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1726.401764][T19771] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 1726.409741][T19771] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 11:39:23 executing program 3 (fault-call:2 fault-nth:13): set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1726.417720][T19771] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1726.425764][T19771] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 [ 1726.439296][T19775] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1726.454856][T19779] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:23 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1726.471934][T19783] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1726.488725][T19785] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1726.502141][T19784] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x26}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1726.524676][T19783] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1726.544650][T19787] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 [ 1726.565134][T19787] FAULT_INJECTION: forcing a failure. 11:39:23 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffe, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1726.565134][T19787] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1726.578242][T19787] CPU: 0 PID: 19787 Comm: syz-executor.3 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1726.588385][T19787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1726.598587][T19787] Call Trace: [ 1726.601850][T19787] dump_stack+0x137/0x19d [ 1726.606171][T19787] should_fail+0x23c/0x250 [ 1726.610594][T19787] should_fail_usercopy+0x16/0x20 [ 1726.615681][T19787] _copy_to_user+0x1c/0x90 [ 1726.620092][T19787] simple_read_from_buffer+0xab/0x120 [ 1726.625471][T19787] proc_fail_nth_read+0xf6/0x140 [ 1726.630396][T19787] ? rw_verify_area+0x136/0x250 [ 1726.635318][T19787] ? proc_fault_inject_write+0x200/0x200 [ 1726.641040][T19787] vfs_read+0x154/0x5d0 [ 1726.645199][T19787] ? __fget_light+0x21b/0x260 [ 1726.649937][T19787] ? __cond_resched+0x11/0x40 [ 1726.654599][T19787] ksys_read+0xce/0x180 [ 1726.658750][T19787] __x64_sys_read+0x3e/0x50 [ 1726.663235][T19787] do_syscall_64+0x4a/0x90 [ 1726.667665][T19787] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1726.673610][T19787] RIP: 0033:0x41935c [ 1726.677498][T19787] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1726.697094][T19787] RSP: 002b:00007f59e947b170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1726.705556][T19787] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 1726.713506][T19787] RDX: 000000000000000f RSI: 00007f59e947b1e0 RDI: 0000000000000004 11:39:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1726.721460][T19787] RBP: 00007f59e947b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1726.729418][T19787] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1726.737388][T19787] R13: 00007ffd239bc72f R14: 00007f59e947b300 R15: 0000000000022000 [ 1726.754916][T19790] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:23 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1726.789919][T19791] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1726.804118][T19794] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1726.816558][T19800] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1726.829763][T19802] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 [ 1726.846101][T19803] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1726.857358][T19804] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1726.878991][T19806] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1726.922643][T19811] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1726.943000][T19814] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x9, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1726.972568][T19821] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1727.004862][T19816] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1727.023190][T19824] ref_ctr_offset mismatch. inode: 0x361c offset: 0xd ref_ctr_offset(old): 0x12 ref_ctr_offset(new): 0x8 [ 1727.035113][T19827] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1727.047465][T19831] ref_ctr_offset mismatch. inode: 0x361c offset: 0xd ref_ctr_offset(old): 0x12 ref_ctr_offset(new): 0x8 [ 1727.059403][T19829] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:23 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x29000, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:23 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1727.079234][T19832] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1727.146984][T19841] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1727.159171][T19843] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1727.170928][T19844] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x20000200, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x10}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1727.186932][T19845] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1727.198914][T19848] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1727.210551][T19847] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1727.228690][T19849] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:23 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1727.247813][T19851] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1727.289203][T19854] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1727.325658][T19859] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1727.337286][T19864] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1727.349150][T19867] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 [ 1727.361492][T19865] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1727.377274][T19869] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1727.401785][T19871] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 [ 1727.422213][T19870] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:24 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x11}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:24 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1727.945190][T19878] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1727.957124][T19880] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1727.973757][T19885] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 11:39:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x3, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:24 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1727.985754][T19882] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1727.997685][T19886] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1728.009504][T19887] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1728.025446][T19888] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 11:39:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x12}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1728.049216][T19889] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1728.069024][T19893] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1728.084489][T19894] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1728.100715][T19896] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 [ 1728.112866][T19898] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1728.128337][T19899] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1728.140712][T19900] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1728.152580][T19904] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 [ 1728.171206][T19906] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1728.189750][T19909] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1728.205419][T19910] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:25 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffe, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x4, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:25 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x18}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1728.927292][T19920] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1728.940769][T19923] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1728.953085][T19922] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 [ 1728.965112][T19926] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:25 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1728.981558][T19925] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1728.999515][T19928] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 [ 1729.015231][T19927] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1729.040653][T19931] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1729.062674][T19929] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1729.078657][T19934] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x86}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1729.090636][T19935] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 [ 1729.115368][T19936] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1729.133499][T19938] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1729.151516][T19942] ref_ctr_offset mismatch. inode: 0x361c offset: 0x25 ref_ctr_offset(old): 0x8 ref_ctr_offset(new): 0x12 [ 1729.162981][T19939] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1729.187948][T19946] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1729.199263][T19947] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1729.240139][T19948] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:26 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0xffff88812acb8a18, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:26 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x6, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x26}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd003}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1729.901734][T19963] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1729.913466][T19960] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1729.928789][T19959] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:26 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1729.945022][T19964] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1729.960792][T19966] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1729.977730][T19965] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x27}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1730.015176][T19969] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1730.068134][T19971] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1730.080236][T19974] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1730.096504][T19981] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1730.108593][T19979] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1730.144938][T19982] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1730.172213][T19984] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1730.216503][T19985] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1730.730270][T19961] ================================================================== [ 1730.738367][T19961] BUG: KCSAN: data-race in file_remove_privs / selinux_file_permission [ 1730.746603][T19961] [ 1730.748914][T19961] write to 0xffff88812e97985c of 4 bytes by task 19988 on cpu 1: [ 1730.756650][T19961] file_remove_privs+0x312/0x3a0 [ 1730.761579][T19961] __generic_file_write_iter+0xdd/0x300 [ 1730.767112][T19961] generic_file_write_iter+0x75/0x130 [ 1730.772480][T19961] vfs_write+0x69d/0x770 [ 1730.776702][T19961] __x64_sys_pwrite64+0xf5/0x150 [ 1730.781629][T19961] do_syscall_64+0x4a/0x90 [ 1730.786025][T19961] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1730.791908][T19961] [ 1730.794222][T19961] read to 0xffff88812e97985c of 4 bytes by task 19961 on cpu 0: [ 1730.801852][T19961] selinux_file_permission+0x41b/0x530 [ 1730.807300][T19961] security_file_permission+0x42/0xa0 [ 1730.812667][T19961] rw_verify_area+0x136/0x250 [ 1730.817331][T19961] vfs_write+0xe2/0x770 [ 1730.821472][T19961] __x64_sys_pwrite64+0xf5/0x150 [ 1730.826390][T19961] do_syscall_64+0x4a/0x90 11:39:27 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0xffff88812acb8b98, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:27 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x48}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x8, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1730.830790][T19961] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1730.836666][T19961] [ 1730.838975][T19961] Reported by Kernel Concurrency Sanitizer on: [ 1730.845107][T19961] CPU: 0 PID: 19961 Comm: syz-executor.1 Tainted: G W 5.13.0-rc2-syzkaller #0 [ 1730.855249][T19961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1730.865286][T19961] ================================================================== [ 1730.911451][T19995] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1730.926955][T20000] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1730.939754][T19997] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4c}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1730.953078][T20001] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1730.973603][T20002] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1730.991406][T20003] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x9, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1731.053003][T20010] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1731.070876][T20009] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1731.088663][T20015] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1731.104464][T20008] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1731.122124][T20016] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1731.143614][T20019] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1731.160544][T20021] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1731.181215][T20022] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:28 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffffffffffe, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:28 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x60}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xa, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1731.891987][T20034] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1731.903714][T20035] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1731.924979][T20039] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:28 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xb, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x68}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1731.936191][T20040] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1731.957029][T20038] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1731.989356][T20044] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1732.016213][T20048] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1732.028006][T20046] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1732.045145][T20047] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1732.073064][T20055] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1732.088829][T20057] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1732.113082][T20058] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1732.124350][T20059] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1732.161864][T20060] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:29 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:29 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6c}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1732.851983][T20068] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1732.867024][T20071] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1732.879037][T20075] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:29 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xd, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1732.895554][T20077] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1732.910658][T20076] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1732.922329][T20078] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x74}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1732.988053][T20082] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1733.016356][T20083] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:29 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1733.038605][T20086] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1733.057531][T20088] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1733.073113][T20092] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1733.091375][T20094] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1733.119213][T20096] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1733.161166][T20097] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xe, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7a}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="034344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="044344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="054344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1733.850404][T20112] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1733.862497][T20116] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1733.882167][T20110] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x10, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1733.893360][T20113] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="064344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x270}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1733.921345][T20121] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1733.932539][T20122] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1733.945300][T20123] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='\aCD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='\bCD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1733.978278][T20129] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:30 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='\tCD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1734.027122][T20134] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.043545][T20138] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.062800][T20144] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x11, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1734.074076][T20145] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1734.087130][T20143] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.116640][T20148] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='\nCD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='\vCD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='\fCD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:30 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1734.150756][T20151] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.186888][T20160] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='\rCD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1734.201559][T20159] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1734.214669][T20161] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="0e4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1734.243483][T20168] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.260620][T20170] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x12, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="0f4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1734.285866][T20174] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.301215][T20177] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.323912][T20179] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3d8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="104344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1734.335711][T20181] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.352962][T20182] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x1c, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="114344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1734.394612][T20187] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1734.417033][T20193] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="124344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x500}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="134344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1734.473461][T20199] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.489187][T20203] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.500494][T20204] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="144344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x25, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1734.540839][T20210] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.557481][T20211] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1734.571397][T20213] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="154344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x600}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1734.615887][T20223] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.647469][T20224] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="164344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="174344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1734.668053][T20228] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1734.691187][T20232] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="184344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1734.720145][T20239] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1734.733357][T20240] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x27, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="194344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:31 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="1a4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1734.762541][T20247] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.778326][T20249] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1734.799551][T20250] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x700}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="1b4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1734.825635][T20256] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1734.842859][T20257] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="1c4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1734.879506][T20265] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="1d4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x48, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1734.920878][T20272] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1734.936538][T20271] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1734.948721][T20273] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x900}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="1e4344303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='!CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x4c, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1734.981146][T20279] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1734.999132][T20281] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.012992][T20283] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='\"CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:31 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1735.062263][T20295] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1735.087814][T20293] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='#CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1735.103157][T20303] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1735.123661][T20301] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.149625][T20308] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='$CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1735.161518][T20307] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.187523][T20311] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1735.199040][T20315] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='%CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x60, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='&CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1735.215111][T20316] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1735.226295][T20307] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.242762][T20318] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='\'CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='(CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:32 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1735.307206][T20327] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.329634][T20333] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)=')CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x68, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1735.348828][T20334] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.360481][T20330] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1735.375924][T20337] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='*CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1735.415253][T20344] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1735.433220][T20346] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='+CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:32 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1735.472720][T20352] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.489610][T20357] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.502130][T20358] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)=',CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x18000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1735.531886][T20361] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.551404][T20365] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1735.564304][T20366] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='-CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:32 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='.CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1735.586124][T20371] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.606947][T20373] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.629421][T20377] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='/CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='0CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='1CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1735.671585][T20376] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1735.690467][T20385] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.702091][T20388] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x74, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='2CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='3CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1735.713629][T20389] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1735.733366][T20392] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.755610][T20393] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1735.804764][T20401] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1735.836490][T20407] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='4CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1735.847746][T20406] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='5CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1735.878838][T20413] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.891288][T20415] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.903171][T20418] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:32 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x26000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='6CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1735.921670][T20421] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.937886][T20422] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='7CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1735.977050][T20428] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1735.999433][T20433] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='8CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xff, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='9CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1736.017492][T20432] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1736.029663][T20434] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1736.045210][T20442] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1736.064324][T20443] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1100}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)=':CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1736.111638][T20450] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1736.139089][T20453] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)=';CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)='CD001', 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1736.221226][T20464] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1736.257260][T20470] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff0944303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1736.283220][T20473] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1736.305531][T20479] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1736.318738][T20484] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1200}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff2544303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4302303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:33 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1736.330408][T20480] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1736.360500][T20485] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1736.371976][T20490] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4321303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4322303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1736.439438][T20499] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1736.451948][T20500] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1736.463302][T20505] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4323303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1800}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1736.486879][T20508] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1736.513429][T20512] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4325303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1736.560317][T20516] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1736.577728][T20517] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4386303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4388303031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1736.605734][T20525] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1736.629170][T20527] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1736.649978][T20537] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344fe3031", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff434430fe31", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1736.664373][T20533] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x4, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff43443030fe", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1736.704182][T20536] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1736.719689][T20539] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1736.736755][T20546] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff43443030fe", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1736.792811][T20552] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1736.804360][T20549] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1736.819564][T20553] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff43443030fe", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:33 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1736.848114][T20557] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1736.879038][T20563] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff43443030fe", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff43443030ff", 0x6, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2500}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1736.893319][T20565] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1736.911575][T20570] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1736.926257][T20572] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x70020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x5, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0xfe, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1736.958148][T20576] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1736.989571][T20579] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:33 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x785, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1737.004634][T20582] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.026786][T20590] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.037981][T20592] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x7b5, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2600}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1737.069357][T20593] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.083325][T20597] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1737.097326][T20600] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:33 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x18000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0x7bd, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1737.147117][T20604] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.159553][T20605] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.175508][T20608] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0xfffe, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x6, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2700}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1737.195050][T20614] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.207498][T20617] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1737.219179][T20618] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:33 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1737.255577][T20623] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0xfffffffe, 0x8800}], 0x8000, &(0x7f0000000000)) 11:39:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1737.296412][T20625] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.308524][T20633] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4800}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1737.347166][T20636] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.358689][T20637] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.371290][T20638] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x7, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:34 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1737.441657][T20644] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.464722][T20643] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd0030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1737.482613][T20649] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1737.498401][T20652] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.522921][T20654] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x8, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x25}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:34 executing program 1: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="ff4344303031", 0xfffffffffffffffe, 0x8800}], 0x8000, &(0x7f0000000000)) [ 1737.553893][T20656] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.590958][T20658] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:34 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4c00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1737.615389][T20659] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.628628][T20662] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 11:39:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1737.674704][T20663] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 [ 1737.692627][T20671] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x8 [ 1737.716901][T20674] ref_ctr_offset mismatch. inode: 0x361c offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x12 11:39:34 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x30000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:39:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x9, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0