=[]) [ 153.035163][T15196] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 153.055655][T15201] EXT4-fs (loop1): unsupported descriptor size 0 16:53:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0x1, 0x8, 0x6, 0x25, @ipv4={'\x00', '\xff\xff', @loopback}, @remote, 0x720, 0x10, 0xdce7, 0xfffffffa}}) preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) [ 153.118889][T15221] loop5: detected capacity change from 0 to 4096 [ 153.139607][T15221] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 153.149848][T15221] EXT4-fs (loop5): group descriptors corrupted! 16:53:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 153.171483][T15235] loop4: detected capacity change from 0 to 4096 [ 153.180663][T15241] loop2: detected capacity change from 0 to 4096 [ 153.210034][T15249] loop1: detected capacity change from 0 to 4096 16:53:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/58, 0x3a}], 0x1, 0x515, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x101000, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x80, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRES16=r1, @ANYBLOB="2c776664856f3d", @ANYRESHEX=r2, @ANYRES64]) [ 153.218044][T15241] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 153.229851][T15235] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 153.239488][T15235] EXT4-fs (loop4): group descriptors corrupted! [ 153.239706][T15249] EXT4-fs (loop1): unsupported descriptor size 0 [ 153.260719][T15241] EXT4-fs (loop2): mount failed 16:53:21 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) dup2(r1, r2) 16:53:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) fcntl$setpipe(r1, 0x407, 0x3) vmsplice(r1, &(0x7f0000000380)=[{&(0x7f0000000080)="6d7a32ba9870fa7d1c85fb3a33c8d5022218774de7ff4fe0de5885ace34af6f0a44ddc2fd3144feadf639386ca3d393df5017e9cebb9ce51ab02a425a0accb80adcd6c6265a45d110032e99cd9518e24c93f485982c3c30ca7d0a73059a04fe1a4e9116ebb", 0x65}, {&(0x7f0000000100)="41407d07533a28c53e6181098c8ac6a90509397e69ca374a0ed4322d83d0fea004200a2ca81249089c9238062da36512a0f7", 0x32}, {&(0x7f0000000400)="a7f0d03b1e44614b7eee566effe28969cbbe5dad43d0cbb395f4a3ce6d45d54e71aeb21e70c9d8700d8e5ae156c0d87815d8587dea62ff4b879c9d8d58f5c9549fa1551e4451bf96eb4bbcc49062ef1258a52a58e5ec4abb5da5150196f1d288fd0899f0a55913ca4ae9b6bc3e510b4f2d983b3e4750fe0f7827459b65e250f4734718fbb7ea135dfc462515c4dbd9a41b3fcd3d010d0e7d2e771a205f6c77cb010000009aee723c0c5ec35e990538faa154c0ca23dd92a0cfc13f709870bc1895829e7f589d2f5ada7ae091d0927c661f04c239614f59d94f9f1cff71ba056105c1b59a93e87da1803e6ce9330217c15f64f7bd2cd567e38faf9f5f2bcf2790838a7e981ef2d1beaf8445ff01aa468ed633d4244f034b65851ad778497a783d52554e060f15550700f2749134809ba75e9ed44a6edb53ca224f2029b1a693a87e76e42ea3d9541ff39e90e610e04d0600f6b204f407e9584990e1ae5b0342d0bfdb3998e136656da728862fdd8a89", 0x16f}, {&(0x7f0000000240)="16546ead6ecf24604fb80236939b4b7d05ddd76dc5de1147d30ee62992be61406ca48712fa79fdcab48560d4a5eff742555ef11d6a39482dc0db555b7a78b1128e402379b6d89b3f1d514e1d569f4461e67e81451ab4289a74a0af12d17dd947eed113", 0x63}, {&(0x7f00000002c0)="f0025ce9889f721bd6132bb25ea2d23a6d65fb86d4302fe901ac51ef9ef2c0040f956c740b505dfe119e04b0099f595467a66dd42dc70e9fd3bfab1f9ff12b7cf111ffcba67faf0f7ca533318343ce8c96c41888e4346f479e3dd910c8652a125fce5f394a9116924df850f779c1b6eb09b4177b52b31e314f17f0e350bf8838e1f30c07c23afddd75039a4cdec56cd2a485ed98a5b6f6a5852eaabb5838167c75c65c0fa90f", 0xa6}], 0x5, 0xb) 16:53:21 executing program 3: sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="4c27fa2f644b64b45acea46a47f6d62071fd0f310a7f0fa0e799933d2b2b328ba9b5969fdeda435dce6448ac42932dcb59576e71174c70dee368452289082b4034798bb613a56b18a97f32249c042176b6e054dcbf3731cd19f1e4a429aea3698f79548b37d740fa", 0x68, 0x4000, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') close(r1) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0xff, 0x20, 0xff, 0x7, 0x0, 0x2, 0x8000, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xd25e, 0x0, @perf_config_ext={0x43, 0x6}, 0x200, 0x1, 0x4, 0x8, 0xfffffffffffffffd, 0x1, 0x8000, 0x0, 0x2}, 0x0, 0x4, r0, 0x1a) [ 153.842501][ T22] audit: type=1326 audit(1633366401.271:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15271 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f1a027158d9 code=0x0 [ 153.849279][T15282] loop1: detected capacity change from 0 to 4096 [ 153.871192][T15277] loop2: detected capacity change from 0 to 4096 [ 153.883075][T15282] EXT4-fs (loop1): unsupported descriptor size 0 [ 153.884943][T15281] loop4: detected capacity change from 0 to 4096 16:53:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 153.926686][T15281] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 153.938240][T15281] EXT4-fs (loop4): group descriptors corrupted! [ 153.938388][T15277] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 153.953421][T15277] EXT4-fs (loop2): mount failed 16:53:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 153.993487][T15306] loop1: detected capacity change from 0 to 4096 [ 154.004646][T15306] EXT4-fs (loop1): unsupported descriptor size 0 16:53:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 154.041989][T15319] loop4: detected capacity change from 0 to 4096 [ 154.058042][T15319] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 154.067988][T15319] EXT4-fs (loop4): group descriptors corrupted! [ 154.098685][T15323] loop2: detected capacity change from 0 to 4096 [ 154.128445][T15330] loop1: detected capacity change from 0 to 4096 [ 154.138429][T15323] EXT4-fs (loop2): corrupt root inode, run e2fsck 16:53:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 154.159701][T15323] EXT4-fs (loop2): mount failed [ 154.176916][T15330] EXT4-fs (loop1): unsupported descriptor size 0 16:53:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 154.206207][T15339] loop4: detected capacity change from 0 to 4096 [ 154.261018][T15339] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 154.275830][T15339] EXT4-fs (loop4): group descriptors corrupted! [ 154.286905][T15351] loop2: detected capacity change from 0 to 4096 [ 154.327264][T15351] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 154.353906][T15351] EXT4-fs (loop2): get root inode failed [ 154.359603][T15351] EXT4-fs (loop2): mount failed 16:53:22 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) dup2(r1, r2) 16:53:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) fcntl$setpipe(r1, 0x407, 0x3) vmsplice(r1, &(0x7f0000000380)=[{&(0x7f0000000080)="6d7a32ba9870fa7d1c85fb3a33c8d5022218774de7ff4fe0de5885ace34af6f0a44ddc2fd3144feadf639386ca3d393df5017e9cebb9ce51ab02a425a0accb80adcd6c6265a45d110032e99cd9518e24c93f485982c3c30ca7d0a73059a04fe1a4e9116ebb", 0x65}, {&(0x7f0000000100)="41407d07533a28c53e6181098c8ac6a90509397e69ca374a0ed4322d83d0fea004200a2ca81249089c9238062da36512a0f7", 0x32}, {&(0x7f0000000400)="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", 0x16f}, {&(0x7f0000000240)="16546ead6ecf24604fb80236939b4b7d05ddd76dc5de1147d30ee62992be61406ca48712fa79fdcab48560d4a5eff742555ef11d6a39482dc0db555b7a78b1128e402379b6d89b3f1d514e1d569f4461e67e81451ab4289a74a0af12d17dd947eed113", 0x63}, {&(0x7f00000002c0)="f0025ce9889f721bd6132bb25ea2d23a6d65fb86d4302fe901ac51ef9ef2c0040f956c740b505dfe119e04b0099f595467a66dd42dc70e9fd3bfab1f9ff12b7cf111ffcba67faf0f7ca533318343ce8c96c41888e4346f479e3dd910c8652a125fce5f394a9116924df850f779c1b6eb09b4177b52b31e314f17f0e350bf8838e1f30c07c23afddd75039a4cdec56cd2a485ed98a5b6f6a5852eaabb5838167c75c65c0fa90f", 0xa6}], 0x5, 0xb) [ 154.745116][T15373] loop1: detected capacity change from 0 to 4096 [ 154.754427][T15374] loop4: detected capacity change from 0 to 4096 [ 154.759338][ T22] audit: type=1326 audit(1633366402.191:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15368 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f1a027158d9 code=0x0 [ 154.765299][T15381] loop2: detected capacity change from 0 to 4096 [ 154.805101][T15373] EXT4-fs (loop1): unsupported descriptor size 0 [ 154.819433][T15374] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 154.829288][T15374] EXT4-fs (loop4): group descriptors corrupted! 16:53:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 154.902532][T15381] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 154.932470][T15381] EXT4-fs (loop2): get root inode failed [ 154.938505][T15381] EXT4-fs (loop2): mount failed [ 154.975539][T15402] loop1: detected capacity change from 0 to 4096 [ 155.002448][T15402] EXT4-fs (loop1): unsupported descriptor size 0 [ 155.002609][T15405] loop4: detected capacity change from 0 to 4096 16:53:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 155.055027][T15405] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 155.065229][T15405] EXT4-fs (loop4): group descriptors corrupted! 16:53:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 155.128494][T15421] loop2: detected capacity change from 0 to 4096 [ 155.135012][T15424] loop1: detected capacity change from 0 to 4096 [ 155.161679][T15424] EXT4-fs (loop1): unsupported descriptor size 0 [ 155.169591][T15432] loop4: detected capacity change from 0 to 4096 16:53:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 155.176450][T15421] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 155.194087][T15432] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 155.203874][T15432] EXT4-fs (loop4): group descriptors corrupted! [ 155.211459][T15421] EXT4-fs (loop2): get root inode failed [ 155.217355][T15421] EXT4-fs (loop2): mount failed [ 155.265946][T15439] loop1: detected capacity change from 0 to 4096 [ 155.286883][T15439] EXT4-fs (loop1): unsupported descriptor size 0 [ 155.292466][T15446] loop2: detected capacity change from 0 to 4096 [ 155.324451][T15446] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:53:23 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) dup2(r1, r2) 16:53:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) fcntl$setpipe(r1, 0x407, 0x3) vmsplice(r1, &(0x7f0000000380)=[{&(0x7f0000000080)="6d7a32ba9870fa7d1c85fb3a33c8d5022218774de7ff4fe0de5885ace34af6f0a44ddc2fd3144feadf639386ca3d393df5017e9cebb9ce51ab02a425a0accb80adcd6c6265a45d110032e99cd9518e24c93f485982c3c30ca7d0a73059a04fe1a4e9116ebb", 0x65}, {&(0x7f0000000100)="41407d07533a28c53e6181098c8ac6a90509397e69ca374a0ed4322d83d0fea004200a2ca81249089c9238062da36512a0f7", 0x32}, {&(0x7f0000000400)="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", 0x16f}, {&(0x7f0000000240)="16546ead6ecf24604fb80236939b4b7d05ddd76dc5de1147d30ee62992be61406ca48712fa79fdcab48560d4a5eff742555ef11d6a39482dc0db555b7a78b1128e402379b6d89b3f1d514e1d569f4461e67e81451ab4289a74a0af12d17dd947eed113", 0x63}, {&(0x7f00000002c0)="f0025ce9889f721bd6132bb25ea2d23a6d65fb86d4302fe901ac51ef9ef2c0040f956c740b505dfe119e04b0099f595467a66dd42dc70e9fd3bfab1f9ff12b7cf111ffcba67faf0f7ca533318343ce8c96c41888e4346f479e3dd910c8652a125fce5f394a9116924df850f779c1b6eb09b4177b52b31e314f17f0e350bf8838e1f30c07c23afddd75039a4cdec56cd2a485ed98a5b6f6a5852eaabb5838167c75c65c0fa90f", 0xa6}], 0x5, 0xb) [ 155.626181][T15470] loop1: detected capacity change from 0 to 4096 [ 155.637510][T15475] loop4: detected capacity change from 0 to 4096 [ 155.640132][T15474] loop2: detected capacity change from 0 to 4096 [ 155.644103][ T22] audit: type=1326 audit(1633366403.071:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15467 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f1a027158d9 code=0x0 16:53:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004cb00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004cd00)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {0x0, r2}], 0x1, "060cd6bed5f770"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004cb00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004cd00)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {0x0, r5}], 0x1, "060cd6bed5f770"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="020000000000200040000000008712635b2b510000000800000000000000ff03000000000000f8ffffffffffffff060000000000000006000000a3000000080000000600000000fdffffffffffffff08000000000000040000000000000001000000000000001800000000000000000000000000000000000000000000000000000000000000f461af675a6e570dac8ebc60918aa26481469a8d2cf5e1293c8036b9114bcd0031575407fd0b4563ff8d86ec946b4f28030a51ddbff44df72498e539070003b5a33a968009c8e7cae7ab31175a5ad57ef7432fedd588e80e8fb288da9cbb01b92caf0606a91b4c1f4dc3c76a5abd865b94da862ad3c025d427e1dea62534b303058f1023086627f46f1d800381a348643b185777918b91ce1d38"]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000527c0)={0xfffffffffffffde1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x28, "8884bb413ecd8f"}) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004cb00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004cd00)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {0x0, r10}], 0x1, "060cd6bed5f770"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000537c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000539c0)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, r5}, {}, {r6, r7}, {r9}, {r11}], 0x20, "04910306e8d8d3"}) [ 155.679564][T15474] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 155.706214][T15470] EXT4-fs (loop1): unsupported descriptor size 0 [ 155.722406][T15474] EXT4-fs (loop2): get root inode failed [ 155.728194][T15474] EXT4-fs (loop2): mount failed [ 155.734675][T15475] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 155.740370][ C1] sd 0:0:1:0: tag#7676 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 155.744648][T15475] EXT4-fs (loop4): group descriptors corrupted! [ 155.754537][ C1] sd 0:0:1:0: tag#7676 CDB: opcode=0xe5 (vendor) [ 155.768576][ C1] sd 0:0:1:0: tag#7676 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 155.777866][ C1] sd 0:0:1:0: tag#7676 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 155.787023][ C1] sd 0:0:1:0: tag#7676 CDB[20]: ba [ 155.793098][ C1] sd 0:0:1:0: tag#7677 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 155.803007][ C1] sd 0:0:1:0: tag#7677 CDB: opcode=0xe5 (vendor) [ 155.809416][ C1] sd 0:0:1:0: tag#7677 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 155.818484][ C1] sd 0:0:1:0: tag#7677 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 155.827880][ C1] sd 0:0:1:0: tag#7677 CDB[20]: ba [ 155.834178][ C0] sd 0:0:1:0: tag#7678 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 155.834389][ C1] sd 0:0:1:0: tag#7679 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 155.844228][ C0] sd 0:0:1:0: tag#7678 CDB: opcode=0xe5 (vendor) [ 155.854125][ C1] sd 0:0:1:0: tag#7679 CDB: opcode=0xe5 (vendor) [ 155.860538][ C0] sd 0:0:1:0: tag#7678 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 16:53:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) 16:53:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 155.866926][ C1] sd 0:0:1:0: tag#7679 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 155.876220][ C0] sd 0:0:1:0: tag#7678 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 155.885614][ C1] sd 0:0:1:0: tag#7679 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 155.894872][ C0] sd 0:0:1:0: tag#7678 CDB[20]: ba [ 155.903904][ C1] sd 0:0:1:0: tag#7679 CDB[20]: ba 16:53:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/82, 0x52}], 0x1, 0x516, 0xfe) 16:53:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 155.973641][T15506] loop2: detected capacity change from 0 to 4096 [ 155.997534][T15511] loop1: detected capacity change from 0 to 4096 [ 156.009039][T15506] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated 16:53:23 executing program 3: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000000100)=[{r2}], 0x1, 0x603) r3 = dup2(r1, r2) fcntl$setown(r2, 0x8, r0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0xff, 0x6, 0x4, 0x0, 0x3, 0x2, 0x0, 0x1f, 0xb6, 0x40, 0x359, 0x7, 0x7, 0x38, 0x1, 0xfffc, 0x7f, 0x3ff}, [{0x5, 0x7fffffff, 0x40, 0x584b, 0x7fff, 0x100, 0x5, 0x4}], "54bddaf5fd92b9ae549ca5e43461b2907b95ae1a826a1544040b2a1a98a9e2752c8557ab9ab100f9fd85939f175129b3590e56667690a34e7c18ef1452dc29d92454323fc70fb7959c23269d0267ed63045a727e364ff2a4dd29995d703d59c6e55d0ced61439a4b243ad3c271", ['\x00']}, 0x1e5) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) r6 = syz_open_procfs(r5, &(0x7f0000000040)='net/ip6_mr_vif\x00') fchmod(r6, 0x24) [ 156.021695][T15511] EXT4-fs (loop1): unsupported descriptor size 0 [ 156.035010][T15518] loop4: detected capacity change from 0 to 4096 [ 156.061485][T15506] EXT4-fs (loop2): get root inode failed [ 156.067703][T15506] EXT4-fs (loop2): mount failed [ 156.087604][T15518] EXT4-fs (loop4): unsupported descriptor size 0 16:53:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:23 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) dup2(r1, r2) 16:53:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) fcntl$setpipe(r1, 0x407, 0x3) [ 156.509590][T15553] loop2: detected capacity change from 0 to 4096 [ 156.516218][T15552] loop1: detected capacity change from 0 to 4096 [ 156.525938][T15555] loop4: detected capacity change from 0 to 4096 16:53:24 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) dup2(r1, r2) 16:53:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 156.549254][T15553] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 156.562673][T15553] EXT4-fs (loop2): get root inode failed [ 156.568369][T15553] EXT4-fs (loop2): mount failed [ 156.575259][T15555] EXT4-fs (loop4): unsupported descriptor size 0 [ 156.585151][T15552] EXT4-fs (loop1): unsupported descriptor size 0 16:53:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:24 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) dup2(r1, r2) 16:53:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 156.668653][T15584] loop2: detected capacity change from 0 to 4096 [ 156.683974][T15581] loop4: detected capacity change from 0 to 4096 [ 156.693958][T15581] EXT4-fs (loop4): unsupported descriptor size 0 [ 156.701782][T15584] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 156.727291][T15590] loop1: detected capacity change from 0 to 4096 [ 156.734845][T15584] EXT4-fs (loop2): get root inode failed [ 156.741927][T15584] EXT4-fs (loop2): mount failed [ 156.748089][T15596] loop4: detected capacity change from 0 to 4096 [ 156.770568][T15596] EXT4-fs (loop4): unsupported descriptor size 0 [ 156.784003][T15590] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 16:53:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x42000, 0x0) preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000080)=""/71, 0x47}], 0x1, 0x515, 0x0) 16:53:24 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) dup(r0) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) dup2(0xffffffffffffffff, r1) 16:53:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 157.020169][T15619] loop4: detected capacity change from 0 to 4096 [ 157.039724][T15619] EXT4-fs (loop4): unsupported descriptor size 0 [ 157.059532][T15631] loop2: detected capacity change from 0 to 4096 [ 157.060938][T15630] loop1: detected capacity change from 0 to 4096 [ 157.066176][ T22] audit: type=1326 audit(1633366404.491:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15621 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f1a027158d9 code=0x0 [ 157.097502][T15630] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 157.107713][T15631] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 157.120393][T15631] EXT4-fs (loop2): get root inode failed [ 157.126130][T15631] EXT4-fs (loop2): mount failed 16:53:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:24 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000080)=0x20, 0x3f) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r1, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) 16:53:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 157.379646][T15662] loop1: detected capacity change from 0 to 4096 [ 157.390293][T15662] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 157.395164][T15663] loop4: detected capacity change from 0 to 4096 [ 157.403988][T15669] loop2: detected capacity change from 0 to 4096 [ 157.415954][T15663] EXT4-fs (loop4): unsupported descriptor size 0 16:53:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:24 executing program 3: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000000100)=[{r2, 0x1403}], 0x1, 0x603) r3 = dup2(r1, r2) fcntl$setown(r2, 0x8, r0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x8, 0x1010, r3, 0x0) syz_io_uring_setup(0x1152, &(0x7f0000000200)={0x0, 0x0, 0x2}, &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0xcbb1c5c5b8448d1e, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x4) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r8 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f0000190000/0x2000)=nil, &(0x7f0000000400)=0x0, &(0x7f0000000100)=0x0) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r11}}, 0x0) syz_io_uring_submit(r4, r6, &(0x7f0000000040)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd=r7, 0x83, 0x0, 0x2, 0x4, 0x1, {0x0, r11}}, 0x5) tkill(r0, 0x14) syz_open_procfs(r0, &(0x7f0000000000)='net/mcfilter\x00') preadv(0xffffffffffffffff, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/60, 0x3c}], 0x1, 0x515, 0x0) [ 157.449689][T15669] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 157.511776][T15669] EXT4-fs (loop2): get root inode failed [ 157.517766][T15669] EXT4-fs (loop2): mount failed [ 157.526695][T15687] loop1: detected capacity change from 0 to 4096 [ 157.546434][T15687] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 157.555465][T15689] loop4: detected capacity change from 0 to 4096 [ 157.591009][T15689] EXT4-fs (loop4): unsupported descriptor size 0 16:53:25 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) dup(r0) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) dup2(0xffffffffffffffff, r1) 16:53:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf465", 0xf, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 157.916395][T15725] loop2: detected capacity change from 0 to 4096 [ 157.930201][T15729] loop4: detected capacity change from 0 to 4096 [ 157.933179][T15730] loop1: detected capacity change from 0 to 4096 [ 157.947678][ T22] audit: type=1326 audit(1633366405.381:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15724 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f1a027158d9 code=0x0 [ 157.972805][T15730] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 157.984961][T15725] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 157.998538][T15725] EXT4-fs (loop2): get root inode failed [ 158.004300][T15725] EXT4-fs (loop2): mount failed [ 158.005989][T15729] EXT4-fs (loop4): unsupported descriptor size 0 16:53:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0x10000, 0x0) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) 16:53:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) fcntl$setpipe(r1, 0x407, 0x3) 16:53:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf465", 0xf, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 158.260814][T15754] loop1: detected capacity change from 0 to 4096 [ 158.270560][T15755] loop2: detected capacity change from 0 to 4096 [ 158.281769][T15754] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 158.281912][T15761] loop4: detected capacity change from 0 to 4096 16:53:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 158.300048][T15755] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 158.318174][T15761] EXT4-fs (loop4): unsupported descriptor size 0 [ 158.325894][T15755] EXT4-fs (loop2): get root inode failed [ 158.331686][T15755] EXT4-fs (loop2): mount failed 16:53:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf465", 0xf, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 158.385284][T15780] loop1: detected capacity change from 0 to 4096 [ 158.394454][T15780] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 158.400063][T15781] loop4: detected capacity change from 0 to 4096 [ 158.418510][T15790] loop2: detected capacity change from 0 to 4096 [ 158.440215][T15781] EXT4-fs (loop4): unsupported descriptor size 0 [ 158.455051][T15790] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 158.468115][T15790] EXT4-fs (loop2): get root inode failed [ 158.474050][T15790] EXT4-fs (loop2): mount failed 16:53:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) dup(r0) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) dup2(0xffffffffffffffff, r1) [ 158.821318][T15813] loop1: detected capacity change from 0 to 4096 [ 158.823653][T15814] loop2: detected capacity change from 0 to 4096 [ 158.836355][ T22] audit: type=1326 audit(1633366406.261:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15811 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f1a027158d9 code=0x0 [ 158.836835][T15817] loop4: detected capacity change from 0 to 4096 [ 158.875534][T15813] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 158.901899][T15814] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 158.915795][T15817] EXT4-fs (loop4): unsupported descriptor size 0 [ 158.917310][T15814] EXT4-fs (loop2): get root inode failed [ 158.928467][T15814] EXT4-fs (loop2): mount failed 16:53:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0x10000, 0x0) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) 16:53:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) fcntl$setpipe(r1, 0x407, 0x3) [ 159.151008][T15843] loop1: detected capacity change from 0 to 4096 [ 159.155770][T15844] loop4: detected capacity change from 0 to 4096 [ 159.158389][T15845] loop2: detected capacity change from 0 to 4096 [ 159.174806][T15843] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 159.182145][T15844] EXT4-fs (loop4): unsupported descriptor size 0 16:53:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 159.189718][T15845] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 159.214015][T15845] EXT4-fs (loop2): get root inode failed [ 159.219762][T15845] EXT4-fs (loop2): mount failed 16:53:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 159.262908][T15871] loop4: detected capacity change from 0 to 4096 [ 159.273800][T15871] EXT4-fs (loop4): unsupported descriptor size 0 [ 159.287092][T15873] loop2: detected capacity change from 0 to 4096 [ 159.299219][T15877] loop1: detected capacity change from 0 to 4096 16:53:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 159.312121][T15877] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 159.321567][T15873] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 159.331697][T15887] loop4: detected capacity change from 0 to 4096 [ 159.341006][T15873] EXT4-fs (loop2): get root inode failed [ 159.346834][T15873] EXT4-fs (loop2): mount failed 16:53:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 159.363545][T15887] EXT4-fs (loop4): unsupported descriptor size 0 [ 159.370918][T15893] loop1: detected capacity change from 0 to 4096 [ 159.396153][T15893] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 159.420323][T15903] loop2: detected capacity change from 0 to 4096 [ 159.430071][T15903] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 159.442935][T15903] EXT4-fs (loop2): get root inode failed [ 159.448630][T15903] EXT4-fs (loop2): mount failed 16:53:27 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) dup2(r1, 0xffffffffffffffff) [ 159.698904][ T22] audit: type=1326 audit(1633366407.131:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15917 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f1a027158d9 code=0x0 16:53:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0x10000, 0x0) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) 16:53:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) fcntl$setpipe(r1, 0x407, 0x3) [ 160.026692][T15925] loop1: detected capacity change from 0 to 4096 [ 160.027444][T15934] loop2: detected capacity change from 0 to 4096 [ 160.040316][T15931] loop4: detected capacity change from 0 to 4096 [ 160.057116][T15925] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 16:53:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 160.073355][T15931] EXT4-fs (loop4): unsupported descriptor size 0 [ 160.080845][T15934] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 160.094072][T15934] EXT4-fs (loop2): get root inode failed [ 160.099762][T15934] EXT4-fs (loop2): mount failed 16:53:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 160.156136][T15962] loop4: detected capacity change from 0 to 4096 [ 160.166759][T15962] EXT4-fs (loop4): unsupported descriptor size 0 [ 160.167569][T15959] loop1: detected capacity change from 0 to 4096 [ 160.195620][T15968] loop2: detected capacity change from 0 to 4096 [ 160.203007][T15959] EXT4-fs (loop1): invalid first ino: 0 [ 160.224366][T15976] loop4: detected capacity change from 0 to 4096 [ 160.239281][T15976] EXT4-fs (loop4): unsupported descriptor size 0 16:53:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 160.250177][T15968] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 160.262977][T15968] EXT4-fs (loop2): get root inode failed [ 160.269051][T15968] EXT4-fs (loop2): mount failed [ 160.289330][T15987] loop4: detected capacity change from 0 to 4096 [ 160.313012][T15987] EXT4-fs (loop4): unsupported descriptor size 0 [ 160.339889][T15996] loop1: detected capacity change from 0 to 4096 [ 160.362176][T15996] EXT4-fs (loop1): invalid first ino: 0 16:53:27 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) dup2(r1, 0xffffffffffffffff) [ 160.568264][ T22] audit: type=1326 audit(1633366408.001:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16005 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f1a027158d9 code=0x0 16:53:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r5, 0x0, 0x10000, 0x0) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) [ 160.924624][T16021] loop1: detected capacity change from 0 to 4096 [ 160.927877][T16022] loop4: detected capacity change from 0 to 4096 [ 160.934340][T16023] loop2: detected capacity change from 0 to 4096 [ 160.958960][T16021] EXT4-fs (loop1): invalid first ino: 0 [ 160.966559][T16022] EXT4-fs (loop4): unsupported descriptor size 0 16:53:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 160.967116][T16023] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 160.979920][T16023] EXT4-fs (loop2): mount failed 16:53:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 161.015013][T16043] loop1: detected capacity change from 0 to 4096 [ 161.052710][T16052] loop2: detected capacity change from 0 to 4096 16:53:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 161.053815][T16043] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 161.076987][T16057] loop4: detected capacity change from 0 to 4096 [ 161.079091][T16052] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 161.090945][T16052] EXT4-fs (loop2): mount failed [ 161.096398][T16057] EXT4-fs (loop4): unsupported descriptor size 0 16:53:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 161.176484][T16073] loop1: detected capacity change from 0 to 4096 [ 161.190609][T16074] loop4: detected capacity change from 0 to 4096 [ 161.197274][T16077] loop2: detected capacity change from 0 to 4096 [ 161.198283][T16073] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 161.217153][T16074] EXT4-fs (loop4): unsupported descriptor size 0 [ 161.239175][T16077] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 161.248014][T16077] EXT4-fs (loop2): mount failed 16:53:28 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) dup2(r1, 0xffffffffffffffff) [ 161.436745][ T22] audit: type=1326 audit(1633366408.861:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16094 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f1a027158d9 code=0x0 16:53:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r5, 0x0, 0x10000, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0x10000, 0x0) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) [ 161.806056][T16110] loop2: detected capacity change from 0 to 4096 [ 161.808350][T16107] loop1: detected capacity change from 0 to 4096 [ 161.829428][T16117] loop4: detected capacity change from 0 to 4096 [ 161.839199][T16110] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 161.852281][T16107] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 161.861300][T16110] EXT4-fs (loop2): get root inode failed [ 161.867073][T16110] EXT4-fs (loop2): mount failed [ 161.872928][T16117] EXT4-fs (loop4): unsupported descriptor size 0 16:53:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r5, 0x0, 0x10000, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 161.961839][T16143] loop2: detected capacity change from 0 to 4096 [ 161.980196][T16146] loop1: detected capacity change from 0 to 4096 [ 161.988653][T16152] loop4: detected capacity change from 0 to 4096 16:53:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 162.004493][T16143] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 162.024161][T16143] EXT4-fs (loop2): get root inode failed [ 162.027832][T16146] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 162.029964][T16143] EXT4-fs (loop2): mount failed [ 162.056454][T16152] EXT4-fs (loop4): unsupported descriptor size 0 [ 162.080774][T16162] loop2: detected capacity change from 0 to 4096 [ 162.091608][T16162] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 162.104846][T16162] EXT4-fs (loop2): get root inode failed 16:53:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 162.110581][T16162] EXT4-fs (loop2): mount failed [ 162.173661][T16178] loop4: detected capacity change from 0 to 4096 [ 162.191525][T16178] EXT4-fs (loop4): unsupported descriptor size 0 16:53:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r5, 0x0, 0x10000, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) [ 162.327924][T16198] loop1: detected capacity change from 0 to 4096 [ 162.331408][T16197] loop4: detected capacity change from 0 to 4096 [ 162.341401][T16198] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 162.347407][T16199] loop2: detected capacity change from 0 to 4096 [ 162.367800][T16199] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 162.377678][T16199] EXT4-fs (loop2): group descriptors corrupted! [ 162.393926][T16197] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:53:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0x10000, 0x0) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) 16:53:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 162.654133][T16233] loop2: detected capacity change from 0 to 4096 [ 162.661411][T16234] loop1: detected capacity change from 0 to 4096 [ 162.678585][T16233] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 162.680058][T16240] loop4: detected capacity change from 0 to 4096 [ 162.688756][T16233] EXT4-fs (loop2): group descriptors corrupted! 16:53:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 162.703695][T16234] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 162.714686][T16240] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:53:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 162.749361][T16250] loop2: detected capacity change from 0 to 4096 [ 162.779856][T16250] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 162.789863][T16250] EXT4-fs (loop2): group descriptors corrupted! 16:53:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) [ 162.820113][T16261] loop1: detected capacity change from 0 to 4096 [ 162.830989][T16268] loop4: detected capacity change from 0 to 4096 [ 162.845374][T16268] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:53:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 162.865215][T16261] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 162.903090][T16286] loop2: detected capacity change from 0 to 4096 [ 162.932350][T16286] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 162.942258][T16286] EXT4-fs (loop2): group descriptors corrupted! 16:53:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) fcntl$setpipe(r1, 0x407, 0x3) vmsplice(r1, &(0x7f0000000380)=[{&(0x7f0000000080)="6d7a32ba9870fa7d1c85fb3a33c8d5022218774de7ff4fe0de5885ace34af6f0a44ddc2fd3144feadf639386ca3d393df5017e9cebb9ce51ab02a425a0accb80adcd6c6265a45d110032e99cd9518e24c93f485982c3c30ca7d0a73059a04fe1a4e9116ebb", 0x65}, {&(0x7f0000000100)="41407d07533a28c53e6181098c8ac6a90509397e69ca374a0ed4322d83d0fea004200a2ca81249089c9238062da36512a0f7", 0x32}, {&(0x7f0000000400)="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", 0x16f}, {&(0x7f0000000240)="16546ead6ecf24604fb80236939b4b7d05ddd76dc5de1147d30ee62992be61406ca48712fa79fdcab48560d4a5eff742555ef11d6a39482dc0db555b7a78b1128e402379b6d89b3f1d514e1d569f4461e67e81451ab4289a74a0af12d17dd947eed113", 0x63}, {&(0x7f00000002c0)="f0025ce9889f721bd6132bb25ea2d23a6d65fb86d4302fe901ac51ef9ef2c0040f956c740b505dfe119e04b0099f595467a66dd42dc70e9fd3bfab1f9ff12b7cf111ffcba67faf0f7ca533318343ce8c96c41888e4346f479e3dd910c8652a125fce5f394a9116924df850f779c1b6eb09b4177b52b31e314f17f0e350bf8838e1f30c07c23afddd75039a4cdec56cd2a485ed98a5b6f6a5852eaabb5838167c75c65c0fa90f", 0xa6}], 0x5, 0xb) 16:53:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0x10000, 0x0) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) 16:53:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 163.537043][T16308] loop4: detected capacity change from 0 to 4096 [ 163.555923][T16310] loop2: detected capacity change from 0 to 4096 [ 163.565939][T16318] loop1: detected capacity change from 0 to 4096 [ 163.577634][T16308] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:53:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 163.585206][T16310] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 163.595734][T16310] EXT4-fs (loop2): group descriptors corrupted! [ 163.607384][T16318] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 16:53:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 163.655835][T16327] loop4: detected capacity change from 0 to 4096 [ 163.677948][T16339] loop1: detected capacity change from 0 to 4096 [ 163.694750][T16327] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:53:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 163.705468][T16345] loop2: detected capacity change from 0 to 4096 [ 163.727254][T16339] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 163.762979][T16345] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 163.772912][T16345] EXT4-fs (loop2): group descriptors corrupted! [ 163.777583][T16357] loop4: detected capacity change from 0 to 4096 [ 163.789095][T16357] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:53:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) fcntl$setpipe(r1, 0x407, 0x3) vmsplice(r1, &(0x7f0000000380)=[{&(0x7f0000000080)="6d7a32ba9870fa7d1c85fb3a33c8d5022218774de7ff4fe0de5885ace34af6f0a44ddc2fd3144feadf639386ca3d393df5017e9cebb9ce51ab02a425a0accb80adcd6c6265a45d110032e99cd9518e24c93f485982c3c30ca7d0a73059a04fe1a4e9116ebb", 0x65}, {&(0x7f0000000100)="41407d07533a28c53e6181098c8ac6a90509397e69ca374a0ed4322d83d0fea004200a2ca81249089c9238062da36512a0f7", 0x32}, {&(0x7f0000000400)="a7f0d03b1e44614b7eee566effe28969cbbe5dad43d0cbb395f4a3ce6d45d54e71aeb21e70c9d8700d8e5ae156c0d87815d8587dea62ff4b879c9d8d58f5c9549fa1551e4451bf96eb4bbcc49062ef1258a52a58e5ec4abb5da5150196f1d288fd0899f0a55913ca4ae9b6bc3e510b4f2d983b3e4750fe0f7827459b65e250f4734718fbb7ea135dfc462515c4dbd9a41b3fcd3d010d0e7d2e771a205f6c77cb010000009aee723c0c5ec35e990538faa154c0ca23dd92a0cfc13f709870bc1895829e7f589d2f5ada7ae091d0927c661f04c239614f59d94f9f1cff71ba056105c1b59a93e87da1803e6ce9330217c15f64f7bd2cd567e38faf9f5f2bcf2790838a7e981ef2d1beaf8445ff01aa468ed633d4244f034b65851ad778497a783d52554e060f15550700f2749134809ba75e9ed44a6edb53ca224f2029b1a693a87e76e42ea3d9541ff39e90e610e04d0600f6b204f407e9584990e1ae5b0342d0bfdb3998e136656da728862fdd8a89", 0x16f}, {&(0x7f0000000240)="16546ead6ecf24604fb80236939b4b7d05ddd76dc5de1147d30ee62992be61406ca48712fa79fdcab48560d4a5eff742555ef11d6a39482dc0db555b7a78b1128e402379b6d89b3f1d514e1d569f4461e67e81451ab4289a74a0af12d17dd947eed113", 0x63}, {&(0x7f00000002c0)="f0025ce9889f721bd6132bb25ea2d23a6d65fb86d4302fe901ac51ef9ef2c0040f956c740b505dfe119e04b0099f595467a66dd42dc70e9fd3bfab1f9ff12b7cf111ffcba67faf0f7ca533318343ce8c96c41888e4346f479e3dd910c8652a125fce5f394a9116924df850f779c1b6eb09b4177b52b31e314f17f0e350bf8838e1f30c07c23afddd75039a4cdec56cd2a485ed98a5b6f6a5852eaabb5838167c75c65c0fa90f", 0xa6}], 0x5, 0xb) 16:53:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 164.052369][T16379] loop4: detected capacity change from 0 to 4096 [ 164.053529][T16380] loop1: detected capacity change from 0 to 4096 [ 164.076845][T16380] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 164.080638][T16379] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:53:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r5, 0x0, 0x10000, 0x0) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 164.457797][T16404] loop1: detected capacity change from 0 to 4096 [ 164.465764][T16406] loop2: detected capacity change from 0 to 4096 [ 164.470238][T16407] loop4: detected capacity change from 0 to 4096 [ 164.493003][T16404] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 16:53:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) [ 164.502574][T16407] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 164.520923][T16406] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 164.531104][T16406] EXT4-fs (loop2): group descriptors corrupted! [ 164.585183][T16429] loop1: detected capacity change from 0 to 4096 [ 164.599113][T16429] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 16:53:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) fcntl$setpipe(r1, 0x407, 0x3) vmsplice(r1, &(0x7f0000000380)=[{&(0x7f0000000080)="6d7a32ba9870fa7d1c85fb3a33c8d5022218774de7ff4fe0de5885ace34af6f0a44ddc2fd3144feadf639386ca3d393df5017e9cebb9ce51ab02a425a0accb80adcd6c6265a45d110032e99cd9518e24c93f485982c3c30ca7d0a73059a04fe1a4e9116ebb", 0x65}, {&(0x7f0000000100)="41407d07533a28c53e6181098c8ac6a90509397e69ca374a0ed4322d83d0fea004200a2ca81249089c9238062da36512a0f7", 0x32}, {&(0x7f0000000400)="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", 0x16f}, {&(0x7f0000000240)="16546ead6ecf24604fb80236939b4b7d05ddd76dc5de1147d30ee62992be61406ca48712fa79fdcab48560d4a5eff742555ef11d6a39482dc0db555b7a78b1128e402379b6d89b3f1d514e1d569f4461e67e81451ab4289a74a0af12d17dd947eed113", 0x63}, {&(0x7f00000002c0)="f0025ce9889f721bd6132bb25ea2d23a6d65fb86d4302fe901ac51ef9ef2c0040f956c740b505dfe119e04b0099f595467a66dd42dc70e9fd3bfab1f9ff12b7cf111ffcba67faf0f7ca533318343ce8c96c41888e4346f479e3dd910c8652a125fce5f394a9116924df850f779c1b6eb09b4177b52b31e314f17f0e350bf8838e1f30c07c23afddd75039a4cdec56cd2a485ed98a5b6f6a5852eaabb5838167c75c65c0fa90f", 0xa6}], 0x5, 0xb) 16:53:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 164.911997][T16452] loop2: detected capacity change from 0 to 4096 [ 164.917662][T16455] loop4: detected capacity change from 0 to 4096 [ 164.928376][T16455] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 164.931995][T16456] loop1: detected capacity change from 0 to 4096 [ 164.944386][T16452] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 164.954186][T16452] EXT4-fs (loop2): group descriptors corrupted! [ 164.972296][T16456] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 16:53:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 165.331142][T16482] loop4: detected capacity change from 0 to 4096 [ 165.341724][T16482] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 165.345465][T16483] loop1: detected capacity change from 0 to 4096 [ 165.361809][T16490] loop2: detected capacity change from 0 to 4096 16:53:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 165.377541][T16483] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 165.395684][T16490] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 165.405547][T16490] EXT4-fs (loop2): group descriptors corrupted! 16:53:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 165.436670][T16501] loop4: detected capacity change from 0 to 4096 [ 165.459908][T16508] loop1: detected capacity change from 0 to 4096 [ 165.469187][T16501] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 165.477665][T16508] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 165.512664][T16522] loop2: detected capacity change from 0 to 4096 [ 165.548612][T16522] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 165.558027][T16522] EXT4-fs (loop2): group descriptors corrupted! 16:53:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) fcntl$setpipe(r1, 0x407, 0x3) 16:53:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, 0x0) 16:53:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 165.762551][T16548] loop2: detected capacity change from 0 to 4096 [ 165.766800][T16552] loop1: detected capacity change from 0 to 4096 [ 165.770223][T16551] loop4: detected capacity change from 0 to 4096 [ 165.790315][T16548] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 165.799590][T16548] EXT4-fs (loop2): group descriptors corrupted! [ 165.808626][T16551] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:53:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, 0x0) 16:53:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, 0x0) [ 166.245034][T16576] loop4: detected capacity change from 0 to 4096 [ 166.248653][T16578] loop1: detected capacity change from 0 to 4096 [ 166.255947][T16583] loop2: detected capacity change from 0 to 4096 [ 166.279164][T16576] EXT4-fs (loop4): invalid first ino: 0 16:53:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 166.299723][T16583] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 166.308987][T16583] EXT4-fs (loop2): group descriptors corrupted! 16:53:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6040000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f465", 0x43, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 166.341673][T16596] loop1: detected capacity change from 0 to 4096 [ 166.396791][T16607] loop2: detected capacity change from 0 to 4096 [ 166.408559][T16607] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 166.417982][T16607] EXT4-fs (loop2): group descriptors corrupted! [ 166.437667][T16615] loop1: detected capacity change from 0 to 197120 [ 166.448617][T16615] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 16:53:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6040000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f465", 0x43, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 16:53:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 166.635283][T16635] loop1: detected capacity change from 0 to 197120 [ 166.648065][T16639] loop4: detected capacity change from 0 to 4096 [ 166.652297][T16643] loop2: detected capacity change from 0 to 4096 [ 166.667453][T16635] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 166.678921][T16643] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 166.689360][T16643] EXT4-fs (loop2): group descriptors corrupted! [ 166.701069][T16639] EXT4-fs (loop4): invalid first ino: 0 16:53:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x10000, 0x0) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r5, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[], 0x10034) fcntl$setpipe(r1, 0x407, 0x3) 16:53:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) [ 167.113534][T16671] loop4: detected capacity change from 0 to 4096 [ 167.119983][T16676] loop2: detected capacity change from 0 to 4096 [ 167.125869][T16671] EXT4-fs (loop4): invalid first ino: 0 [ 167.133910][T16676] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 167.143372][T16676] EXT4-fs (loop2): group descriptors corrupted! 16:53:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 167.204532][T16688] loop4: detected capacity change from 0 to 4096 [ 167.238161][T16688] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 167.245066][T16700] loop2: detected capacity change from 0 to 4096 16:53:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 167.257078][T16700] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 167.266752][T16700] EXT4-fs (loop2): group descriptors corrupted! [ 167.298295][T16709] loop4: detected capacity change from 0 to 4096 [ 167.326553][T16709] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 16:53:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0x10000, 0x0) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) 16:53:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 167.507518][T16724] loop4: detected capacity change from 0 to 4096 [ 167.513263][T16725] loop2: detected capacity change from 0 to 4096 [ 167.520412][T16724] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 167.537354][T16725] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 167.546895][T16725] EXT4-fs (loop2): group descriptors corrupted! [ 167.598548][T16738] loop2: detected capacity change from 0 to 4096 [ 167.608703][T16738] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 167.618555][T16738] EXT4-fs (loop2): group descriptors corrupted! 16:53:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000001c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a}], 0x0, &(0x7f00000000c0)=ANY=[]) getpgid(r0) r1 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x3, 0xffffffffffffffff, 0x3) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write$cgroup_type(r1, &(0x7f00000009c0), 0xd4ba0ff) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0x40000, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000300)) readlink(&(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 16:53:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 167.980532][T16753] loop2: detected capacity change from 0 to 4096 [ 167.990164][T16753] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 167.999676][T16753] EXT4-fs (loop2): group descriptors corrupted! [ 168.007244][T16757] loop4: detected capacity change from 0 to 4096 [ 168.016982][T16762] loop1: detected capacity change from 0 to 4096 16:53:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:35 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 168.041203][T16757] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 16:53:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) [ 168.093385][T16762] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 168.101966][T16775] loop2: detected capacity change from 0 to 4096 [ 168.123797][T16775] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 168.133387][T16775] EXT4-fs (loop2): group descriptors corrupted! 16:53:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0x10000, 0x0) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) 16:53:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 1) 16:53:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) [ 168.380867][T16806] loop2: detected capacity change from 0 to 4096 [ 168.385768][T16807] loop4: detected capacity change from 0 to 4096 [ 168.396391][T16806] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 168.406053][T16806] EXT4-fs (loop2): group descriptors corrupted! 16:53:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) [ 168.435518][T16807] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 168.462360][T16822] FAULT_INJECTION: forcing a failure. [ 168.462360][T16822] name failslab, interval 1, probability 0, space 0, times 0 [ 168.475379][T16822] CPU: 1 PID: 16822 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 16:53:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 168.484827][T16822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.495387][T16822] Call Trace: [ 168.498662][T16822] dump_stack_lvl+0xd6/0x122 [ 168.503417][T16822] dump_stack+0x11/0x1b [ 168.507879][T16822] should_fail+0x23c/0x250 [ 168.512469][T16822] ? __se_sys_memfd_create+0xfb/0x390 [ 168.517853][T16822] __should_failslab+0x81/0x90 [ 168.522798][T16822] should_failslab+0x5/0x20 [ 168.527528][T16822] __kmalloc+0x6f/0x350 16:53:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 168.531880][T16822] ? strnlen_user+0x137/0x1c0 [ 168.537757][T16822] __se_sys_memfd_create+0xfb/0x390 [ 168.543062][T16822] __x64_sys_memfd_create+0x2d/0x40 [ 168.548521][T16822] do_syscall_64+0x44/0xa0 [ 168.552967][T16822] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.559026][T16822] RIP: 0033:0x7fd846a558d9 [ 168.563441][T16822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.583322][T16822] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 168.592083][T16822] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd846a558d9 [ 168.600054][T16822] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fd846aaee76 [ 168.608639][T16822] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 168.616934][T16822] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 168.625160][T16822] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 16:53:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 168.958719][T16854] loop2: detected capacity change from 0 to 4096 [ 168.983922][T16854] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 168.993772][T16854] EXT4-fs (loop2): group descriptors corrupted! 16:53:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 2) 16:53:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0x10000, 0x0) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) sendto$inet(r1, &(0x7f0000000180)="bdc718cc06935da10a038275cfd01d13f02191062a4caa1d240d4772cd21933fb7c0c332614848f3276c946310b521df49e52013d31edf912895f3c7deee3c2ab8aee8d2f758a73d4c594c34e6f2d6533101b2ed3fdbe284534c4a57866ece331c1e7b8e6a19234beadd31adfffd486890e0f200b8e74142a63f6d4ecda0d1add2ee0389ac3a2b0acfbb9ed9694bbc8e9634d0f1aa273c6b25a3c39fbf2114766f8a8b2da2e778ee", 0xa8, 0x0, &(0x7f0000000580)={0x2, 0x4e20, @multicast1}, 0x10) 16:53:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 169.243744][T16877] loop2: detected capacity change from 0 to 4096 [ 169.251804][T16878] FAULT_INJECTION: forcing a failure. [ 169.251804][T16878] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 169.252324][T16882] loop4: detected capacity change from 0 to 4096 [ 169.266142][T16878] CPU: 1 PID: 16878 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 169.281484][T16878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.291725][T16878] Call Trace: [ 169.295010][T16878] dump_stack_lvl+0xd6/0x122 [ 169.299684][T16878] dump_stack+0x11/0x1b [ 169.304021][T16878] should_fail+0x23c/0x250 [ 169.308450][T16878] should_fail_usercopy+0x16/0x20 [ 169.313463][T16878] _copy_from_user+0x1c/0xd0 [ 169.318177][T16878] __se_sys_memfd_create+0x137/0x390 [ 169.323626][T16878] __x64_sys_memfd_create+0x2d/0x40 [ 169.328872][T16878] do_syscall_64+0x44/0xa0 [ 169.333318][T16878] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.339355][T16878] RIP: 0033:0x7fd846a558d9 [ 169.344411][T16878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.365574][T16878] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 169.374007][T16878] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd846a558d9 [ 169.382154][T16878] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fd846aaee76 [ 169.390282][T16878] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 169.398242][T16878] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 169.406282][T16878] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 169.420899][T16882] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 169.430962][T16877] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) 16:53:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 3) [ 169.440889][T16877] EXT4-fs (loop2): group descriptors corrupted! 16:53:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 169.468381][T16893] FAULT_INJECTION: forcing a failure. [ 169.468381][T16893] name failslab, interval 1, probability 0, space 0, times 0 [ 169.481392][T16893] CPU: 1 PID: 16893 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 169.490501][T16893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.500735][T16893] Call Trace: [ 169.504022][T16893] dump_stack_lvl+0xd6/0x122 [ 169.508836][T16893] dump_stack+0x11/0x1b [ 169.513082][T16893] should_fail+0x23c/0x250 [ 169.517593][T16893] ? shmem_alloc_inode+0x22/0x30 [ 169.522814][T16893] __should_failslab+0x81/0x90 [ 169.527779][T16893] ? shmem_match+0xa0/0xa0 [ 169.532339][T16893] should_failslab+0x5/0x20 [ 169.537027][T16893] kmem_cache_alloc+0x4f/0x300 [ 169.542247][T16893] ? shmem_match+0xa0/0xa0 [ 169.546953][T16893] shmem_alloc_inode+0x22/0x30 [ 169.552072][T16893] new_inode_pseudo+0x38/0x1c0 [ 169.557374][T16893] new_inode+0x21/0x120 [ 169.562001][T16893] shmem_get_inode+0xb7/0x4a0 [ 169.566857][T16893] __shmem_file_setup+0xf1/0x1d0 [ 169.571789][T16893] shmem_file_setup+0x37/0x40 [ 169.576458][T16893] __se_sys_memfd_create+0x1eb/0x390 [ 169.582082][T16893] __x64_sys_memfd_create+0x2d/0x40 [ 169.587457][T16893] do_syscall_64+0x44/0xa0 [ 169.591933][T16893] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.597869][T16893] RIP: 0033:0x7fd846a558d9 [ 169.602296][T16893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.622517][T16893] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 169.631215][T16893] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd846a558d9 [ 169.639494][T16893] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fd846aaee76 [ 169.647771][T16893] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 169.656132][T16893] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 16:53:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 169.664445][T16893] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 16:53:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 4) [ 169.698850][T16907] loop4: detected capacity change from 0 to 4096 [ 169.714120][T16907] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 169.735043][T16914] loop2: detected capacity change from 0 to 4096 [ 169.740004][T16917] FAULT_INJECTION: forcing a failure. [ 169.740004][T16917] name failslab, interval 1, probability 0, space 0, times 0 [ 169.755354][T16917] CPU: 0 PID: 16917 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 169.760569][T16914] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 169.764546][T16917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.764559][T16917] Call Trace: [ 169.764566][T16917] dump_stack_lvl+0xd6/0x122 [ 169.773888][T16914] EXT4-fs (loop2): group descriptors corrupted! [ 169.783913][T16917] dump_stack+0x11/0x1b [ 169.802714][T16917] should_fail+0x23c/0x250 [ 169.807128][T16917] ? security_inode_alloc+0x30/0x180 [ 169.812603][T16917] __should_failslab+0x81/0x90 [ 169.817527][T16917] should_failslab+0x5/0x20 [ 169.822290][T16917] kmem_cache_alloc+0x4f/0x300 [ 169.827411][T16917] security_inode_alloc+0x30/0x180 [ 169.832620][T16917] inode_init_always+0x20b/0x430 [ 169.837887][T16917] ? shmem_match+0xa0/0xa0 [ 169.842589][T16917] new_inode_pseudo+0x73/0x1c0 [ 169.847347][T16917] new_inode+0x21/0x120 [ 169.852919][T16917] shmem_get_inode+0xb7/0x4a0 [ 169.857721][T16917] __shmem_file_setup+0xf1/0x1d0 [ 169.862954][T16917] shmem_file_setup+0x37/0x40 [ 169.868335][T16917] __se_sys_memfd_create+0x1eb/0x390 [ 169.874021][T16917] __x64_sys_memfd_create+0x2d/0x40 [ 169.879485][T16917] do_syscall_64+0x44/0xa0 [ 169.883913][T16917] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.889970][T16917] RIP: 0033:0x7fd846a558d9 16:53:37 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 169.894597][T16917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.915410][T16917] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 169.923913][T16917] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd846a558d9 [ 169.932085][T16917] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fd846aaee76 16:53:37 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 169.940693][T16917] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 169.951304][T16917] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 169.959279][T16917] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 16:53:37 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 5) [ 170.019027][T16932] loop4: detected capacity change from 0 to 4096 [ 170.046817][T16932] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 170.071078][T16942] FAULT_INJECTION: forcing a failure. [ 170.071078][T16942] name failslab, interval 1, probability 0, space 0, times 0 [ 170.085358][T16942] CPU: 1 PID: 16942 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 170.097356][T16942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.108103][T16942] Call Trace: [ 170.111922][T16942] dump_stack_lvl+0xd6/0x122 [ 170.116696][T16942] dump_stack+0x11/0x1b [ 170.121202][T16942] should_fail+0x23c/0x250 [ 170.125682][T16942] ? __d_alloc+0x36/0x370 [ 170.130080][T16942] __should_failslab+0x81/0x90 [ 170.135238][T16942] should_failslab+0x5/0x20 [ 170.139892][T16942] kmem_cache_alloc+0x4f/0x300 [ 170.144675][T16942] ? security_inode_alloc+0x138/0x180 [ 170.150169][T16942] ? __init_rwsem+0x59/0x70 [ 170.154916][T16942] __d_alloc+0x36/0x370 [ 170.159244][T16942] d_alloc_pseudo+0x1a/0x50 [ 170.164039][T16942] alloc_file_pseudo+0x77/0x150 [ 170.168988][T16942] __shmem_file_setup+0x14c/0x1d0 [ 170.174869][T16942] shmem_file_setup+0x37/0x40 [ 170.179531][T16942] __se_sys_memfd_create+0x1eb/0x390 [ 170.184926][T16942] __x64_sys_memfd_create+0x2d/0x40 [ 170.190102][T16942] do_syscall_64+0x44/0xa0 [ 170.194691][T16942] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 170.200682][T16942] RIP: 0033:0x7fd846a558d9 [ 170.205277][T16942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.225414][T16942] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 170.233813][T16942] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd846a558d9 [ 170.241970][T16942] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fd846aaee76 [ 170.249969][T16942] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 170.258016][T16942] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 16:53:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r5, 0x0, 0x10000, 0x0) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r4, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 6) [ 170.266475][T16942] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 170.323916][T16959] FAULT_INJECTION: forcing a failure. [ 170.323916][T16959] name failslab, interval 1, probability 0, space 0, times 0 [ 170.337118][T16959] CPU: 1 PID: 16959 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 170.345991][T16959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.347020][T16962] loop2: detected capacity change from 0 to 4096 [ 170.356225][T16959] Call Trace: [ 170.356236][T16959] dump_stack_lvl+0xd6/0x122 [ 170.356258][T16959] dump_stack+0x11/0x1b [ 170.374703][T16959] should_fail+0x23c/0x250 [ 170.379124][T16959] ? __alloc_file+0x2e/0x1a0 [ 170.384069][T16959] __should_failslab+0x81/0x90 [ 170.389027][T16959] should_failslab+0x5/0x20 [ 170.393923][T16959] kmem_cache_alloc+0x4f/0x300 [ 170.399005][T16959] __alloc_file+0x2e/0x1a0 [ 170.403413][T16959] alloc_empty_file+0xcd/0x1c0 [ 170.408403][T16959] alloc_file+0x3a/0x280 [ 170.412716][T16959] alloc_file_pseudo+0xfa/0x150 [ 170.417617][T16959] __shmem_file_setup+0x14c/0x1d0 [ 170.422672][T16959] shmem_file_setup+0x37/0x40 [ 170.427530][T16959] __se_sys_memfd_create+0x1eb/0x390 [ 170.432982][T16959] __x64_sys_memfd_create+0x2d/0x40 [ 170.438213][T16959] do_syscall_64+0x44/0xa0 [ 170.442633][T16959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 170.448537][T16959] RIP: 0033:0x7fd846a558d9 [ 170.452947][T16959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.472844][T16959] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 170.481331][T16959] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd846a558d9 [ 170.489380][T16959] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fd846aaee76 [ 170.497455][T16959] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 170.505729][T16959] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 170.513720][T16959] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 16:53:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 7) [ 170.528768][T16962] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 170.535405][T16960] loop4: detected capacity change from 0 to 4096 [ 170.538550][T16962] EXT4-fs (loop2): group descriptors corrupted! [ 170.551437][T16960] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 16:53:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 170.623907][T16985] FAULT_INJECTION: forcing a failure. [ 170.623907][T16985] name failslab, interval 1, probability 0, space 0, times 0 [ 170.636887][T16985] CPU: 1 PID: 16985 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 170.645945][T16985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.656135][T16985] Call Trace: [ 170.659441][T16985] dump_stack_lvl+0xd6/0x122 [ 170.664042][T16985] dump_stack+0x11/0x1b [ 170.668200][T16985] should_fail+0x23c/0x250 [ 170.672686][T16985] ? security_file_alloc+0x30/0x190 [ 170.677964][T16985] __should_failslab+0x81/0x90 [ 170.682776][T16985] should_failslab+0x5/0x20 [ 170.687277][T16985] kmem_cache_alloc+0x4f/0x300 [ 170.692693][T16985] security_file_alloc+0x30/0x190 [ 170.697993][T16985] __alloc_file+0x83/0x1a0 [ 170.699695][T16998] loop4: detected capacity change from 0 to 4096 [ 170.702518][T16985] alloc_empty_file+0xcd/0x1c0 [ 170.713102][T16998] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 170.713975][T16985] alloc_file+0x3a/0x280 [ 170.714006][T16985] alloc_file_pseudo+0xfa/0x150 [ 170.732073][T16985] __shmem_file_setup+0x14c/0x1d0 [ 170.737125][T16985] shmem_file_setup+0x37/0x40 [ 170.742012][T16985] __se_sys_memfd_create+0x1eb/0x390 [ 170.747291][T16985] __x64_sys_memfd_create+0x2d/0x40 [ 170.752477][T16985] do_syscall_64+0x44/0xa0 [ 170.757101][T16985] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 170.763100][T16985] RIP: 0033:0x7fd846a558d9 [ 170.767742][T16985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.787510][T16985] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 170.796018][T16985] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd846a558d9 [ 170.804182][T16985] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fd846aaee76 [ 170.812837][T16985] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 170.823676][T16985] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 170.832357][T16985] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 16:53:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 8) 16:53:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) [ 171.205890][T17022] FAULT_INJECTION: forcing a failure. [ 171.205890][T17022] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 171.216464][T17026] loop4: detected capacity change from 0 to 4096 [ 171.219223][T17022] CPU: 0 PID: 17022 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 171.225638][T17024] loop2: detected capacity change from 0 to 4096 [ 171.234654][T17022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.234669][T17022] Call Trace: [ 171.234676][T17022] dump_stack_lvl+0xd6/0x122 [ 171.234700][T17022] dump_stack+0x11/0x1b [ 171.234716][T17022] should_fail+0x23c/0x250 [ 171.234732][T17022] __alloc_pages+0x102/0x320 [ 171.234753][T17022] alloc_pages_vma+0x5ee/0x770 [ 171.234773][T17022] shmem_getpage_gfp+0x96d/0x13d0 [ 171.282562][T17022] ? policydb_context_isvalid+0x135/0x230 [ 171.288285][T17022] shmem_write_begin+0x7e/0x100 [ 171.293249][T17022] generic_perform_write+0x1b8/0x3e0 [ 171.298761][T17022] __generic_file_write_iter+0x174/0x310 [ 171.304382][T17022] ? generic_write_checks+0x250/0x290 [ 171.309918][T17022] generic_file_write_iter+0x75/0x130 [ 171.315376][T17022] vfs_write+0x7bc/0x900 [ 171.319799][T17022] __x64_sys_pwrite64+0xf5/0x150 [ 171.324817][T17022] do_syscall_64+0x44/0xa0 [ 171.329335][T17022] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 171.335316][T17022] RIP: 0033:0x7fd846a088a7 [ 171.339909][T17022] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 171.360062][T17022] RSP: 002b:00007fd8447ccf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 171.368723][T17022] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a088a7 [ 171.377063][T17022] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 171.385127][T17022] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 171.393171][T17022] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 16:53:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) [ 171.401137][T17022] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 171.413681][T17024] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 171.419852][T17022] loop1: detected capacity change from 0 to 4096 [ 171.423547][T17024] EXT4-fs (loop2): group descriptors corrupted! 16:53:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) [ 171.459523][T17026] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 171.462409][T17022] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 16:53:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 171.537935][T17058] loop2: detected capacity change from 0 to 4096 [ 171.564337][T17058] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 171.574498][T17058] EXT4-fs (loop2): group descriptors corrupted! [ 171.584701][T17067] loop4: detected capacity change from 0 to 4096 [ 171.594726][T17067] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 16:53:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 9) 16:53:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) [ 172.092119][T17089] FAULT_INJECTION: forcing a failure. [ 172.092119][T17089] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 172.092261][T17093] loop2: detected capacity change from 0 to 4096 [ 172.105491][T17089] CPU: 1 PID: 17089 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 172.120997][T17089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.131996][T17089] Call Trace: [ 172.135528][T17089] dump_stack_lvl+0xd6/0x122 [ 172.140202][T17089] dump_stack+0x11/0x1b [ 172.144413][T17089] should_fail+0x23c/0x250 [ 172.148912][T17089] should_fail_usercopy+0x16/0x20 [ 172.153931][T17089] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 172.159655][T17089] ? shmem_write_begin+0x7e/0x100 [ 172.164668][T17089] generic_perform_write+0x201/0x3e0 [ 172.169947][T17089] __generic_file_write_iter+0x174/0x310 [ 172.175576][T17089] ? generic_write_checks+0x250/0x290 [ 172.181004][T17089] generic_file_write_iter+0x75/0x130 [ 172.186866][T17089] vfs_write+0x7bc/0x900 [ 172.192000][T17089] __x64_sys_pwrite64+0xf5/0x150 [ 172.197477][T17089] do_syscall_64+0x44/0xa0 [ 172.201986][T17089] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 172.207875][T17089] RIP: 0033:0x7fd846a088a7 [ 172.212472][T17089] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 172.232543][T17089] RSP: 002b:00007fd8447ccf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 172.240942][T17089] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a088a7 [ 172.248896][T17089] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 172.256851][T17089] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 172.264995][T17089] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 172.273257][T17089] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 172.283231][T17092] loop4: detected capacity change from 0 to 4096 16:53:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 172.287204][T17093] EXT4-fs (loop2): unsupported descriptor size 0 [ 172.305660][T17092] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 172.312638][T17089] loop1: detected capacity change from 0 to 4096 [ 172.325977][T17089] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated 16:53:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 172.348169][T17089] EXT4-fs (loop1): get root inode failed [ 172.353857][T17089] EXT4-fs (loop1): mount failed 16:53:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 172.414007][T17126] loop2: detected capacity change from 0 to 4096 [ 172.424317][T17126] EXT4-fs (loop2): unsupported descriptor size 0 [ 172.446156][T17132] loop4: detected capacity change from 0 to 4096 [ 172.455391][T17132] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 172.496079][T17142] loop2: detected capacity change from 0 to 4096 [ 172.504897][T17142] EXT4-fs (loop2): unsupported descriptor size 0 16:53:40 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 10) 16:53:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 172.975568][T17162] FAULT_INJECTION: forcing a failure. [ 172.975568][T17162] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 172.988973][T17162] CPU: 0 PID: 17162 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 172.994426][T17163] loop4: detected capacity change from 0 to 4096 [ 172.997742][T17162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.997768][T17162] Call Trace: [ 172.997775][T17162] dump_stack_lvl+0xd6/0x122 [ 172.997799][T17162] dump_stack+0x11/0x1b [ 173.008561][T17164] loop2: detected capacity change from 0 to 4096 [ 173.014253][T17162] should_fail+0x23c/0x250 [ 173.014278][T17162] should_fail_usercopy+0x16/0x20 [ 173.031177][T17163] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 173.033013][T17162] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 173.054884][T17162] ? shmem_write_begin+0x7e/0x100 [ 173.060027][T17162] generic_perform_write+0x201/0x3e0 [ 173.065432][T17162] __generic_file_write_iter+0x174/0x310 [ 173.072154][T17162] ? generic_write_checks+0x250/0x290 [ 173.077618][T17162] generic_file_write_iter+0x75/0x130 [ 173.083102][T17162] vfs_write+0x7bc/0x900 [ 173.087900][T17162] __x64_sys_pwrite64+0xf5/0x150 [ 173.092892][T17162] do_syscall_64+0x44/0xa0 [ 173.097495][T17162] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 173.103732][T17162] RIP: 0033:0x7fd846a088a7 [ 173.108193][T17162] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 173.128227][T17162] RSP: 002b:00007fd8447ccf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 173.136911][T17162] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a088a7 [ 173.144968][T17162] RDX: 000000000000001f RSI: 0000000020010100 RDI: 0000000000000004 [ 173.153213][T17162] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 173.161333][T17162] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000004 16:53:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 173.169705][T17162] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 173.179048][T17164] EXT4-fs (loop2): unsupported descriptor size 0 [ 173.190786][T17162] loop1: detected capacity change from 0 to 4096 [ 173.201549][T17162] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 173.214082][T17162] EXT4-fs (loop1): get root inode failed [ 173.219865][T17162] EXT4-fs (loop1): mount failed 16:53:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0) 16:53:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 11) [ 173.287063][T17195] loop2: detected capacity change from 0 to 4096 [ 173.295481][T17194] loop4: detected capacity change from 0 to 4096 [ 173.329367][T17195] EXT4-fs (loop2): unsupported descriptor size 0 [ 173.330348][T17211] FAULT_INJECTION: forcing a failure. [ 173.330348][T17211] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 173.350324][T17211] CPU: 0 PID: 17211 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 173.359092][T17211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.369411][T17211] Call Trace: [ 173.372761][T17211] dump_stack_lvl+0xd6/0x122 [ 173.377476][T17211] dump_stack+0x11/0x1b [ 173.381735][T17211] should_fail+0x23c/0x250 [ 173.386718][T17211] __alloc_pages+0x102/0x320 [ 173.391754][T17211] alloc_pages_vma+0x5ee/0x770 [ 173.396946][T17211] shmem_getpage_gfp+0x96d/0x13d0 [ 173.402053][T17211] ? policydb_context_isvalid+0x135/0x230 [ 173.408231][T17211] shmem_write_begin+0x7e/0x100 [ 173.413320][T17211] generic_perform_write+0x1b8/0x3e0 [ 173.418828][T17211] __generic_file_write_iter+0x174/0x310 [ 173.424459][T17211] ? generic_write_checks+0x250/0x290 [ 173.430282][T17211] generic_file_write_iter+0x75/0x130 [ 173.435942][T17211] vfs_write+0x7bc/0x900 [ 173.440351][T17211] __x64_sys_pwrite64+0xf5/0x150 [ 173.445295][T17211] do_syscall_64+0x44/0xa0 [ 173.450053][T17211] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 173.456291][T17211] RIP: 0033:0x7fd846a088a7 [ 173.460706][T17211] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 173.480806][T17211] RSP: 002b:00007fd8447ccf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 173.489295][T17211] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a088a7 [ 173.497426][T17211] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000004 [ 173.505408][T17211] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 173.513492][T17211] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 173.521446][T17211] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 16:53:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 173.531152][T17211] loop1: detected capacity change from 0 to 4096 [ 173.541255][T17211] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 173.551026][T17211] EXT4-fs (loop1): group descriptors corrupted! [ 173.566358][T17220] loop2: detected capacity change from 0 to 4096 [ 173.576148][T17220] EXT4-fs (loop2): unsupported descriptor size 0 16:53:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0) 16:53:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 12) 16:53:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 174.050794][T17238] loop4: detected capacity change from 0 to 4096 [ 174.084379][T17248] FAULT_INJECTION: forcing a failure. [ 174.084379][T17248] name failslab, interval 1, probability 0, space 0, times 0 [ 174.088089][T17247] loop2: detected capacity change from 0 to 4096 [ 174.097131][T17248] CPU: 0 PID: 17248 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 174.097155][T17248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.097163][T17248] Call Trace: [ 174.097171][T17248] dump_stack_lvl+0xd6/0x122 [ 174.130730][T17248] dump_stack+0x11/0x1b [ 174.134929][T17248] should_fail+0x23c/0x250 [ 174.139343][T17248] ? xas_create+0x3fb/0xb30 [ 174.143833][T17248] __should_failslab+0x81/0x90 [ 174.148590][T17248] should_failslab+0x5/0x20 [ 174.153085][T17248] kmem_cache_alloc+0x4f/0x300 [ 174.157926][T17248] xas_create+0x3fb/0xb30 [ 174.162487][T17248] ? get_page_from_freelist+0x510/0x830 [ 174.168072][T17248] xas_create_range+0x146/0x360 [ 174.172924][T17248] shmem_add_to_page_cache+0x3bd/0x660 [ 174.178374][T17248] shmem_getpage_gfp+0xba5/0x13d0 [ 174.183380][T17248] ? policydb_context_isvalid+0x135/0x230 [ 174.189289][T17248] shmem_write_begin+0x7e/0x100 [ 174.194121][T17248] generic_perform_write+0x1b8/0x3e0 [ 174.199492][T17248] __generic_file_write_iter+0x174/0x310 [ 174.205377][T17248] ? generic_write_checks+0x250/0x290 [ 174.210821][T17248] generic_file_write_iter+0x75/0x130 [ 174.216253][T17248] vfs_write+0x7bc/0x900 [ 174.221080][T17248] __x64_sys_pwrite64+0xf5/0x150 [ 174.226025][T17248] do_syscall_64+0x44/0xa0 [ 174.230694][T17248] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 174.236590][T17248] RIP: 0033:0x7fd846a088a7 [ 174.241257][T17248] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 174.261258][T17248] RSP: 002b:00007fd8447ccf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 174.269915][T17248] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a088a7 [ 174.277894][T17248] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000004 [ 174.285871][T17248] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 174.293980][T17248] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 16:53:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0) 16:53:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 174.301936][T17248] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 174.334700][T17247] EXT4-fs (loop2): unsupported descriptor size 0 16:53:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, 0x0, 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 174.360571][T17248] loop1: detected capacity change from 0 to 4096 [ 174.407000][T17248] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 174.428761][T17248] EXT4-fs (loop1): get root inode failed [ 174.434533][T17248] EXT4-fs (loop1): mount failed [ 174.445065][T17280] loop4: detected capacity change from 0 to 4096 16:53:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 13) 16:53:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 1) 16:53:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 174.453782][T17283] loop2: detected capacity change from 0 to 4096 [ 174.474108][T17283] EXT4-fs (loop2): unsupported descriptor size 0 16:53:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) [ 174.549493][T17304] FAULT_INJECTION: forcing a failure. [ 174.549493][T17304] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 174.553794][T17305] loop2: detected capacity change from 0 to 4096 [ 174.562748][T17304] CPU: 1 PID: 17304 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 174.577995][T17304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.588077][T17304] Call Trace: [ 174.591572][T17304] dump_stack_lvl+0xd6/0x122 [ 174.596169][T17304] dump_stack+0x11/0x1b [ 174.600487][T17304] should_fail+0x23c/0x250 [ 174.604911][T17304] should_fail_usercopy+0x16/0x20 [ 174.610022][T17304] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 174.615750][T17304] ? shmem_write_begin+0x7e/0x100 [ 174.620881][T17304] generic_perform_write+0x201/0x3e0 [ 174.626762][T17304] __generic_file_write_iter+0x174/0x310 [ 174.632922][T17304] ? generic_write_checks+0x250/0x290 [ 174.638297][T17304] generic_file_write_iter+0x75/0x130 [ 174.643786][T17304] vfs_write+0x7bc/0x900 [ 174.648023][T17304] __x64_sys_pwrite64+0xf5/0x150 [ 174.652998][T17304] do_syscall_64+0x44/0xa0 [ 174.657494][T17304] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 174.663392][T17304] RIP: 0033:0x7fd846a088a7 [ 174.667862][T17304] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 174.688359][T17304] RSP: 002b:00007fd8447ccf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 16:53:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[], 0x10034) [ 174.697115][T17304] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a088a7 [ 174.705203][T17304] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000004 [ 174.715600][T17304] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 174.723647][T17304] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 174.731691][T17304] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 16:53:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 174.768124][T17317] FAULT_INJECTION: forcing a failure. [ 174.768124][T17317] name failslab, interval 1, probability 0, space 0, times 0 [ 174.781140][T17317] CPU: 0 PID: 17317 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 174.785483][T17304] loop1: detected capacity change from 0 to 4096 [ 174.790063][T17317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.790074][T17317] Call Trace: [ 174.790081][T17317] dump_stack_lvl+0xd6/0x122 [ 174.814404][T17317] dump_stack+0x11/0x1b 16:53:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, 0x0, 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 174.818566][T17317] should_fail+0x23c/0x250 [ 174.822986][T17317] ? __se_sys_memfd_create+0xfb/0x390 [ 174.828520][T17317] __should_failslab+0x81/0x90 [ 174.833559][T17317] should_failslab+0x5/0x20 [ 174.838159][T17317] __kmalloc+0x6f/0x350 [ 174.842323][T17317] ? strnlen_user+0x137/0x1c0 [ 174.847116][T17317] __se_sys_memfd_create+0xfb/0x390 [ 174.852341][T17317] __x64_sys_memfd_create+0x2d/0x40 [ 174.857954][T17317] do_syscall_64+0x44/0xa0 [ 174.862380][T17317] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 174.868278][T17317] RIP: 0033:0x7fefe2d128d9 [ 174.872685][T17317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.892929][T17317] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 174.901420][T17317] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fefe2d128d9 [ 174.909474][T17317] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007fefe2d6be76 [ 174.917875][T17317] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 174.926139][T17317] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 174.934101][T17317] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 174.942911][T17305] EXT4-fs (loop2): unsupported descriptor size 0 [ 174.967359][T17304] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 174.979880][T17304] EXT4-fs (loop1): get root inode failed [ 174.985564][T17304] EXT4-fs (loop1): mount failed 16:53:42 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 2) 16:53:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 14) 16:53:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, 0x0, 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 175.275550][T17348] loop2: detected capacity change from 0 to 4096 [ 175.284727][T17347] FAULT_INJECTION: forcing a failure. [ 175.284727][T17347] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 175.298085][T17347] CPU: 0 PID: 17347 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 175.304607][T17348] EXT4-fs (loop2): unsupported descriptor size 0 [ 175.306843][T17347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:53:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 175.306855][T17347] Call Trace: [ 175.306861][T17347] dump_stack_lvl+0xd6/0x122 [ 175.306885][T17347] dump_stack+0x11/0x1b [ 175.306904][T17347] should_fail+0x23c/0x250 [ 175.336121][T17355] FAULT_INJECTION: forcing a failure. [ 175.336121][T17355] name failslab, interval 1, probability 0, space 0, times 0 [ 175.336429][T17347] should_fail_usercopy+0x16/0x20 [ 175.336452][T17347] _copy_from_user+0x1c/0xd0 [ 175.363902][T17347] __se_sys_memfd_create+0x137/0x390 [ 175.369306][T17347] __x64_sys_memfd_create+0x2d/0x40 [ 175.374793][T17347] do_syscall_64+0x44/0xa0 [ 175.380485][T17347] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 175.386655][T17347] RIP: 0033:0x7fefe2d128d9 [ 175.391153][T17347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 175.411476][T17347] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 175.419877][T17347] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fefe2d128d9 [ 175.427975][T17347] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007fefe2d6be76 [ 175.436167][T17347] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 175.444305][T17347] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 175.452880][T17347] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 175.461017][T17355] CPU: 1 PID: 17355 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 175.470328][T17355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.480616][T17355] Call Trace: [ 175.483887][T17355] dump_stack_lvl+0xd6/0x122 [ 175.488914][T17355] dump_stack+0x11/0x1b [ 175.493072][T17355] should_fail+0x23c/0x250 [ 175.498795][T17355] ? getname_flags+0x84/0x3f0 [ 175.503478][T17355] __should_failslab+0x81/0x90 [ 175.508374][T17355] should_failslab+0x5/0x20 [ 175.512992][T17355] kmem_cache_alloc+0x4f/0x300 [ 175.517867][T17355] getname_flags+0x84/0x3f0 [ 175.522370][T17355] getname+0x15/0x20 16:53:42 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 3) 16:53:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) [ 175.526351][T17355] do_sys_openat2+0x6d/0x2b0 [ 175.530976][T17355] __x64_sys_openat+0xef/0x110 [ 175.535782][T17355] do_syscall_64+0x44/0xa0 [ 175.540250][T17355] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 175.546231][T17355] RIP: 0033:0x7fd846a087f4 [ 175.550641][T17355] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 175.571029][T17355] RSP: 002b:00007fd8447cced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 175.579440][T17355] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a087f4 [ 175.579515][T17370] FAULT_INJECTION: forcing a failure. [ 175.579515][T17370] name failslab, interval 1, probability 0, space 0, times 0 [ 175.587497][T17355] RDX: 0000000000000002 RSI: 00007fd8447cd000 RDI: 00000000ffffff9c [ 175.587514][T17355] RBP: 00007fd8447cd000 R08: 0000000000000000 R09: ffffffffffffffff [ 175.587525][T17355] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 16:53:43 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 15) 16:53:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280), 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 175.587536][T17355] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 175.633361][T17370] CPU: 0 PID: 17370 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 175.642325][T17370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.652883][T17370] Call Trace: [ 175.657421][T17370] dump_stack_lvl+0xd6/0x122 [ 175.662109][T17370] dump_stack+0x11/0x1b [ 175.666441][T17370] should_fail+0x23c/0x250 [ 175.671081][T17370] ? shmem_alloc_inode+0x22/0x30 [ 175.676166][T17370] __should_failslab+0x81/0x90 [ 175.681026][T17370] ? shmem_match+0xa0/0xa0 [ 175.685566][T17370] should_failslab+0x5/0x20 [ 175.690272][T17370] kmem_cache_alloc+0x4f/0x300 [ 175.695231][T17370] ? shmem_match+0xa0/0xa0 [ 175.700131][T17370] shmem_alloc_inode+0x22/0x30 [ 175.705066][T17370] new_inode_pseudo+0x38/0x1c0 [ 175.709843][T17370] new_inode+0x21/0x120 [ 175.714249][T17370] shmem_get_inode+0xb7/0x4a0 [ 175.719215][T17370] __shmem_file_setup+0xf1/0x1d0 16:53:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 175.724163][T17370] shmem_file_setup+0x37/0x40 [ 175.728993][T17370] __se_sys_memfd_create+0x1eb/0x390 [ 175.734280][T17370] __x64_sys_memfd_create+0x2d/0x40 [ 175.739659][T17370] do_syscall_64+0x44/0xa0 [ 175.744082][T17370] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 175.750130][T17370] RIP: 0033:0x7fefe2d128d9 [ 175.754552][T17370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 175.774461][T17370] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 175.780814][T17384] FAULT_INJECTION: forcing a failure. [ 175.780814][T17384] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 175.783132][T17370] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fefe2d128d9 [ 175.783145][T17370] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007fefe2d6be76 [ 175.783158][T17370] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 175.783168][T17370] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 175.829099][T17370] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 175.837163][T17384] CPU: 1 PID: 17384 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 175.846616][T17384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.856690][T17384] Call Trace: [ 175.859966][T17384] dump_stack_lvl+0xd6/0x122 [ 175.864735][T17384] dump_stack+0x11/0x1b [ 175.869262][T17384] should_fail+0x23c/0x250 [ 175.873947][T17384] should_fail_usercopy+0x16/0x20 [ 175.878992][T17384] strncpy_from_user+0x21/0x250 [ 175.884029][T17384] getname_flags+0xb8/0x3f0 [ 175.888864][T17384] getname+0x15/0x20 [ 175.892947][T17384] do_sys_openat2+0x6d/0x2b0 [ 175.897527][T17384] __x64_sys_openat+0xef/0x110 [ 175.902373][T17384] do_syscall_64+0x44/0xa0 [ 175.906895][T17384] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 175.912893][T17384] RIP: 0033:0x7fd846a087f4 [ 175.917443][T17384] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 175.937651][T17384] RSP: 002b:00007fd8447cced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 175.946218][T17384] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a087f4 [ 175.954381][T17384] RDX: 0000000000000002 RSI: 00007fd8447cd000 RDI: 00000000ffffff9c [ 175.962535][T17384] RBP: 00007fd8447cd000 R08: 0000000000000000 R09: ffffffffffffffff [ 175.970677][T17384] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 16:53:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 4) 16:53:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280), 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 16) [ 175.978819][T17384] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 176.039986][T17405] FAULT_INJECTION: forcing a failure. [ 176.039986][T17405] name failslab, interval 1, probability 0, space 0, times 0 [ 176.049366][T17408] FAULT_INJECTION: forcing a failure. [ 176.049366][T17408] name failslab, interval 1, probability 0, space 0, times 0 [ 176.053330][T17405] CPU: 0 PID: 17405 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 176.074879][T17405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.085029][T17405] Call Trace: [ 176.088656][T17405] dump_stack_lvl+0xd6/0x122 [ 176.093236][T17405] dump_stack+0x11/0x1b [ 176.097377][T17405] should_fail+0x23c/0x250 [ 176.101785][T17405] ? __alloc_file+0x2e/0x1a0 [ 176.106372][T17405] __should_failslab+0x81/0x90 [ 176.111153][T17405] should_failslab+0x5/0x20 [ 176.115710][T17405] kmem_cache_alloc+0x4f/0x300 [ 176.120459][T17405] __alloc_file+0x2e/0x1a0 [ 176.125043][T17405] alloc_empty_file+0xcd/0x1c0 [ 176.129992][T17405] path_openat+0x6a/0x1ec0 [ 176.134395][T17405] ? copy_page_from_iter_atomic+0x44b/0xbb0 [ 176.140800][T17405] ? set_page_dirty+0xf4/0x1a0 [ 176.145565][T17405] ? shmem_write_end+0x37d/0x3d0 [ 176.150487][T17405] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 176.156727][T17405] ? generic_perform_write+0x377/0x3e0 [ 176.162172][T17405] do_filp_open+0x105/0x220 [ 176.166700][T17405] do_sys_openat2+0xb5/0x2b0 [ 176.171276][T17405] __x64_sys_openat+0xef/0x110 [ 176.176038][T17405] do_syscall_64+0x44/0xa0 [ 176.180578][T17405] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 176.186665][T17405] RIP: 0033:0x7fd846a087f4 [ 176.191081][T17405] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 176.211304][T17405] RSP: 002b:00007fd8447cced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 176.219806][T17405] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a087f4 [ 176.227829][T17405] RDX: 0000000000000002 RSI: 00007fd8447cd000 RDI: 00000000ffffff9c [ 176.235869][T17405] RBP: 00007fd8447cd000 R08: 0000000000000000 R09: ffffffffffffffff [ 176.244010][T17405] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 176.251981][T17405] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 176.260210][T17408] CPU: 1 PID: 17408 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 176.261823][T17409] loop2: detected capacity change from 0 to 4096 [ 176.268974][T17408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.268987][T17408] Call Trace: [ 176.268993][T17408] dump_stack_lvl+0xd6/0x122 [ 176.293667][T17408] dump_stack+0x11/0x1b [ 176.297822][T17408] should_fail+0x23c/0x250 [ 176.302244][T17408] ? security_inode_alloc+0x30/0x180 [ 176.303928][T17411] FAULT_INJECTION: forcing a failure. [ 176.303928][T17411] name failslab, interval 1, probability 0, space 0, times 0 [ 176.307567][T17408] __should_failslab+0x81/0x90 [ 176.307594][T17408] should_failslab+0x5/0x20 [ 176.307614][T17408] kmem_cache_alloc+0x4f/0x300 [ 176.334881][T17408] security_inode_alloc+0x30/0x180 [ 176.340168][T17408] inode_init_always+0x20b/0x430 [ 176.345598][T17408] ? shmem_match+0xa0/0xa0 [ 176.350085][T17408] new_inode_pseudo+0x73/0x1c0 [ 176.354953][T17408] new_inode+0x21/0x120 [ 176.359257][T17408] shmem_get_inode+0xb7/0x4a0 [ 176.364070][T17408] __shmem_file_setup+0xf1/0x1d0 [ 176.369125][T17408] shmem_file_setup+0x37/0x40 [ 176.373809][T17408] __se_sys_memfd_create+0x1eb/0x390 [ 176.379266][T17408] __x64_sys_memfd_create+0x2d/0x40 [ 176.384557][T17408] do_syscall_64+0x44/0xa0 [ 176.388981][T17408] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 176.394912][T17408] RIP: 0033:0x7fefe2d128d9 [ 176.399402][T17408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 176.419086][T17408] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 176.427714][T17408] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fefe2d128d9 16:53:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 17) [ 176.435667][T17408] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007fefe2d6be76 [ 176.443620][T17408] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 176.451723][T17408] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 176.460033][T17408] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 176.468079][T17411] CPU: 0 PID: 17411 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 176.476841][T17411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.486900][T17411] Call Trace: [ 176.490375][T17411] dump_stack_lvl+0xd6/0x122 [ 176.495139][T17411] dump_stack+0x11/0x1b [ 176.499553][T17411] should_fail+0x23c/0x250 [ 176.503973][T17411] ? security_file_alloc+0x30/0x190 [ 176.509180][T17411] __should_failslab+0x81/0x90 [ 176.514047][T17411] should_failslab+0x5/0x20 [ 176.518553][T17411] kmem_cache_alloc+0x4f/0x300 [ 176.523350][T17411] security_file_alloc+0x30/0x190 [ 176.528557][T17411] __alloc_file+0x83/0x1a0 [ 176.533067][T17411] alloc_empty_file+0xcd/0x1c0 [ 176.537921][T17411] path_openat+0x6a/0x1ec0 [ 176.542342][T17411] ? copy_page_from_iter_atomic+0x44b/0xbb0 [ 176.548661][T17411] ? set_page_dirty+0xf4/0x1a0 [ 176.553485][T17411] ? shmem_write_end+0x37d/0x3d0 [ 176.558489][T17411] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 176.564717][T17411] ? generic_perform_write+0x377/0x3e0 [ 176.570445][T17411] do_filp_open+0x105/0x220 [ 176.575294][T17411] do_sys_openat2+0xb5/0x2b0 [ 176.579870][T17411] __x64_sys_openat+0xef/0x110 [ 176.584619][T17411] do_syscall_64+0x44/0xa0 [ 176.589024][T17411] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 176.594907][T17411] RIP: 0033:0x7fd846a087f4 [ 176.599389][T17411] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 176.619773][T17411] RSP: 002b:00007fd8447cced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 176.628165][T17411] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a087f4 16:53:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 5) [ 176.636390][T17411] RDX: 0000000000000002 RSI: 00007fd8447cd000 RDI: 00000000ffffff9c [ 176.644876][T17411] RBP: 00007fd8447cd000 R08: 0000000000000000 R09: ffffffffffffffff [ 176.653015][T17411] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 176.660977][T17411] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 16:53:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 18) [ 176.701462][T17409] EXT4-fs (loop2): unsupported descriptor size 0 [ 176.715390][T17426] FAULT_INJECTION: forcing a failure. [ 176.715390][T17426] name failslab, interval 1, probability 0, space 0, times 0 [ 176.728607][T17426] CPU: 1 PID: 17426 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 176.737373][T17426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.747423][T17426] Call Trace: 16:53:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 176.750698][T17426] dump_stack_lvl+0xd6/0x122 [ 176.755307][T17426] dump_stack+0x11/0x1b [ 176.759505][T17426] should_fail+0x23c/0x250 [ 176.764075][T17426] ? __d_alloc+0x36/0x370 [ 176.768517][T17426] __should_failslab+0x81/0x90 [ 176.773378][T17426] should_failslab+0x5/0x20 [ 176.777938][T17426] kmem_cache_alloc+0x4f/0x300 [ 176.779512][T17432] FAULT_INJECTION: forcing a failure. [ 176.779512][T17432] name failslab, interval 1, probability 0, space 0, times 0 [ 176.782712][T17426] ? security_inode_alloc+0x138/0x180 [ 176.782739][T17426] ? __init_rwsem+0x59/0x70 [ 176.805487][T17426] __d_alloc+0x36/0x370 [ 176.809751][T17426] d_alloc_pseudo+0x1a/0x50 [ 176.814750][T17426] alloc_file_pseudo+0x77/0x150 [ 176.819609][T17426] __shmem_file_setup+0x14c/0x1d0 [ 176.824620][T17426] shmem_file_setup+0x37/0x40 [ 176.829288][T17426] __se_sys_memfd_create+0x1eb/0x390 [ 176.834568][T17426] __x64_sys_memfd_create+0x2d/0x40 [ 176.840098][T17426] do_syscall_64+0x44/0xa0 [ 176.844506][T17426] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 176.850405][T17426] RIP: 0033:0x7fefe2d128d9 [ 176.855069][T17426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 176.875207][T17426] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 176.883701][T17426] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fefe2d128d9 [ 176.892295][T17426] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007fefe2d6be76 [ 176.900381][T17426] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 176.909185][T17426] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 176.917140][T17426] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 176.925098][T17432] CPU: 0 PID: 17432 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 176.934057][T17432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.944187][T17432] Call Trace: 16:53:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 6) [ 176.948433][T17432] dump_stack_lvl+0xd6/0x122 [ 176.953328][T17432] dump_stack+0x11/0x1b [ 176.957502][T17432] should_fail+0x23c/0x250 [ 176.963137][T17432] ? kzalloc+0x16/0x20 [ 176.967215][T17432] __should_failslab+0x81/0x90 [ 176.972289][T17432] should_failslab+0x5/0x20 [ 176.976872][T17432] __kmalloc+0x6f/0x350 [ 176.981027][T17432] ? _atomic_dec_and_lock+0x60/0xd0 [ 176.986758][T17432] kzalloc+0x16/0x20 [ 176.991070][T17432] alloc_workqueue+0x12f/0xad0 [ 176.996011][T17432] ? disk_unblock_events+0x35/0x40 [ 177.001293][T17432] ? bd_prepare_to_claim+0x1e6/0x270 [ 177.006889][T17432] ? loop_attr_do_show_dio+0x70/0x70 [ 177.012182][T17432] ? loop_set_status_from_info+0x35e/0x3a0 [ 177.018022][T17432] loop_configure+0x681/0xeb0 [ 177.021247][T17443] FAULT_INJECTION: forcing a failure. [ 177.021247][T17443] name failslab, interval 1, probability 0, space 0, times 0 [ 177.022789][T17432] lo_ioctl+0x618/0x13e0 [ 177.039655][T17432] ? path_openat+0x18d4/0x1ec0 [ 177.044603][T17432] ? blkdev_common_ioctl+0x438/0x1110 [ 177.049983][T17432] ? selinux_file_ioctl+0x981/0xa10 [ 177.060733][T17432] ? lo_release+0x120/0x120 [ 177.065535][T17432] blkdev_ioctl+0x1d0/0x3f0 [ 177.070027][T17432] block_ioctl+0x6e/0x80 [ 177.074261][T17432] ? blkdev_iopoll+0x80/0x80 [ 177.078934][T17432] __se_sys_ioctl+0xcb/0x140 [ 177.083778][T17432] __x64_sys_ioctl+0x3f/0x50 [ 177.088746][T17432] do_syscall_64+0x44/0xa0 [ 177.093158][T17432] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 177.099052][T17432] RIP: 0033:0x7fd846a55697 [ 177.103456][T17432] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.123440][T17432] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 177.132008][T17432] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 177.139979][T17432] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 177.147942][T17432] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 177.155915][T17432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 177.164046][T17432] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 177.172010][T17443] CPU: 1 PID: 17443 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 177.181119][T17443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.191178][T17443] Call Trace: [ 177.194533][T17443] dump_stack_lvl+0xd6/0x122 [ 177.199135][T17443] dump_stack+0x11/0x1b [ 177.203390][T17443] should_fail+0x23c/0x250 [ 177.207828][T17443] ? __alloc_file+0x2e/0x1a0 [ 177.212402][T17443] __should_failslab+0x81/0x90 [ 177.217160][T17443] should_failslab+0x5/0x20 [ 177.221925][T17443] kmem_cache_alloc+0x4f/0x300 [ 177.226679][T17443] __alloc_file+0x2e/0x1a0 [ 177.231161][T17443] alloc_empty_file+0xcd/0x1c0 [ 177.236216][T17443] alloc_file+0x3a/0x280 [ 177.240795][T17443] alloc_file_pseudo+0xfa/0x150 [ 177.245649][T17443] __shmem_file_setup+0x14c/0x1d0 [ 177.250655][T17443] shmem_file_setup+0x37/0x40 [ 177.255321][T17443] __se_sys_memfd_create+0x1eb/0x390 [ 177.261055][T17443] __x64_sys_memfd_create+0x2d/0x40 [ 177.266495][T17443] do_syscall_64+0x44/0xa0 [ 177.270963][T17443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 177.278082][T17443] RIP: 0033:0x7fefe2d128d9 [ 177.282723][T17443] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.302893][T17443] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 177.311381][T17443] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fefe2d128d9 [ 177.319878][T17443] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007fefe2d6be76 [ 177.328029][T17443] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 177.336003][T17443] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 177.343955][T17443] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 16:53:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280), 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 19) 16:53:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 7) [ 177.420116][T17455] FAULT_INJECTION: forcing a failure. [ 177.420116][T17455] name failslab, interval 1, probability 0, space 0, times 0 [ 177.433907][T17455] CPU: 0 PID: 17455 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 177.442432][T17462] FAULT_INJECTION: forcing a failure. [ 177.442432][T17462] name failslab, interval 1, probability 0, space 0, times 0 [ 177.443438][T17455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.443450][T17455] Call Trace: [ 177.443457][T17455] dump_stack_lvl+0xd6/0x122 [ 177.443479][T17455] dump_stack+0x11/0x1b [ 177.479377][T17455] should_fail+0x23c/0x250 [ 177.483956][T17455] __should_failslab+0x81/0x90 [ 177.488798][T17455] ? alloc_workqueue+0x15d/0xad0 [ 177.493732][T17455] should_failslab+0x5/0x20 [ 177.499003][T17455] kmem_cache_alloc_trace+0x52/0x320 [ 177.504276][T17455] alloc_workqueue+0x15d/0xad0 [ 177.509041][T17455] ? disk_unblock_events+0x35/0x40 [ 177.514162][T17455] ? bd_prepare_to_claim+0x1e6/0x270 [ 177.519627][T17455] ? loop_attr_do_show_dio+0x70/0x70 [ 177.525262][T17455] ? loop_set_status_from_info+0x35e/0x3a0 [ 177.531183][T17455] loop_configure+0x681/0xeb0 [ 177.535862][T17455] lo_ioctl+0x618/0x13e0 [ 177.541388][T17455] ? path_openat+0x18d4/0x1ec0 [ 177.546190][T17455] ? blkdev_common_ioctl+0x438/0x1110 [ 177.551669][T17455] ? selinux_file_ioctl+0x981/0xa10 [ 177.557042][T17455] ? lo_release+0x120/0x120 [ 177.562075][T17455] blkdev_ioctl+0x1d0/0x3f0 [ 177.566734][T17455] block_ioctl+0x6e/0x80 [ 177.571045][T17455] ? blkdev_iopoll+0x80/0x80 [ 177.575703][T17455] __se_sys_ioctl+0xcb/0x140 [ 177.580278][T17455] __x64_sys_ioctl+0x3f/0x50 [ 177.584873][T17455] do_syscall_64+0x44/0xa0 [ 177.589281][T17455] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 177.595377][T17455] RIP: 0033:0x7fd846a55697 [ 177.599785][T17455] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.620085][T17455] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 177.628486][T17455] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 177.636629][T17455] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 177.644738][T17455] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 177.652692][T17455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 177.660770][T17455] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 177.669077][T17462] CPU: 1 PID: 17462 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 177.678014][T17462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.681010][T17459] loop2: detected capacity change from 0 to 4096 [ 177.689322][T17462] Call Trace: [ 177.689333][T17462] dump_stack_lvl+0xd6/0x122 [ 177.704208][T17462] dump_stack+0x11/0x1b [ 177.708364][T17462] should_fail+0x23c/0x250 [ 177.712915][T17462] ? security_file_alloc+0x30/0x190 [ 177.718522][T17462] __should_failslab+0x81/0x90 [ 177.723290][T17462] should_failslab+0x5/0x20 [ 177.727955][T17462] kmem_cache_alloc+0x4f/0x300 [ 177.732813][T17462] security_file_alloc+0x30/0x190 [ 177.737953][T17462] __alloc_file+0x83/0x1a0 [ 177.742501][T17462] alloc_empty_file+0xcd/0x1c0 [ 177.747353][T17462] alloc_file+0x3a/0x280 [ 177.751609][T17462] alloc_file_pseudo+0xfa/0x150 [ 177.756654][T17462] __shmem_file_setup+0x14c/0x1d0 [ 177.761844][T17462] shmem_file_setup+0x37/0x40 [ 177.766506][T17462] __se_sys_memfd_create+0x1eb/0x390 [ 177.771952][T17462] __x64_sys_memfd_create+0x2d/0x40 [ 177.777139][T17462] do_syscall_64+0x44/0xa0 [ 177.781822][T17462] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 177.787714][T17462] RIP: 0033:0x7fefe2d128d9 [ 177.792218][T17462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.812004][T17462] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 16:53:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) [ 177.820407][T17462] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fefe2d128d9 [ 177.828749][T17462] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007fefe2d6be76 [ 177.836710][T17462] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 177.844973][T17462] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 177.852958][T17462] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 16:53:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 20) 16:53:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 8) [ 177.872788][T17459] EXT4-fs (loop2): unsupported descriptor size 0 [ 177.923679][T17481] FAULT_INJECTION: forcing a failure. [ 177.923679][T17481] name failslab, interval 1, probability 0, space 0, times 0 [ 177.937080][T17481] CPU: 1 PID: 17481 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 177.946100][T17481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.956411][T17481] Call Trace: [ 177.959776][T17481] dump_stack_lvl+0xd6/0x122 [ 177.964638][T17481] dump_stack+0x11/0x1b [ 177.968800][T17481] should_fail+0x23c/0x250 16:53:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{0x0}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 177.973257][T17481] ? kzalloc+0x16/0x20 [ 177.977621][T17481] __should_failslab+0x81/0x90 [ 177.982575][T17481] should_failslab+0x5/0x20 [ 177.987223][T17481] __kmalloc+0x6f/0x350 [ 177.991427][T17481] ? number+0xa13/0xb60 [ 177.995888][T17481] kzalloc+0x16/0x20 [ 177.999799][T17481] apply_wqattrs_prepare+0x3a/0x630 [ 178.005182][T17481] ? vsnprintf+0xe8f/0xed0 [ 178.009787][T17481] apply_workqueue_attrs+0x9e/0x100 [ 178.015128][T17481] alloc_workqueue+0x777/0xad0 [ 178.020027][T17481] ? disk_unblock_events+0x35/0x40 [ 178.024130][T17483] FAULT_INJECTION: forcing a failure. [ 178.024130][T17483] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 178.025264][T17481] ? bd_prepare_to_claim+0x1e6/0x270 [ 178.025295][T17481] ? loop_attr_do_show_dio+0x70/0x70 [ 178.049391][T17481] ? loop_set_status_from_info+0x35e/0x3a0 [ 178.055201][T17481] loop_configure+0x681/0xeb0 [ 178.060026][T17481] lo_ioctl+0x618/0x13e0 [ 178.064257][T17481] ? path_openat+0x18d4/0x1ec0 [ 178.069033][T17481] ? blkdev_common_ioctl+0x438/0x1110 [ 178.074460][T17481] ? selinux_file_ioctl+0x981/0xa10 [ 178.079693][T17481] ? lo_release+0x120/0x120 [ 178.084188][T17481] blkdev_ioctl+0x1d0/0x3f0 [ 178.088712][T17481] block_ioctl+0x6e/0x80 [ 178.092936][T17481] ? blkdev_iopoll+0x80/0x80 [ 178.097710][T17481] __se_sys_ioctl+0xcb/0x140 [ 178.102426][T17481] __x64_sys_ioctl+0x3f/0x50 [ 178.107377][T17481] do_syscall_64+0x44/0xa0 [ 178.111866][T17481] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 178.117848][T17481] RIP: 0033:0x7fd846a55697 [ 178.122342][T17481] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 178.142021][T17481] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 178.150856][T17481] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 178.159180][T17481] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 178.167820][T17481] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 178.175780][T17481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 178.183949][T17481] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 178.191949][T17483] CPU: 0 PID: 17483 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 178.200970][T17483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.211081][T17483] Call Trace: [ 178.214350][T17483] dump_stack_lvl+0xd6/0x122 [ 178.215412][T17492] loop2: detected capacity change from 0 to 4096 [ 178.219038][T17483] dump_stack+0x11/0x1b [ 178.219060][T17483] should_fail+0x23c/0x250 [ 178.219078][T17483] __alloc_pages+0x102/0x320 [ 178.239204][T17483] alloc_pages_vma+0x5ee/0x770 [ 178.244507][T17483] shmem_getpage_gfp+0x96d/0x13d0 [ 178.249850][T17483] ? policydb_context_isvalid+0x135/0x230 [ 178.255678][T17483] shmem_write_begin+0x7e/0x100 [ 178.260625][T17483] generic_perform_write+0x1b8/0x3e0 [ 178.266091][T17483] __generic_file_write_iter+0x174/0x310 [ 178.271751][T17483] ? generic_write_checks+0x250/0x290 [ 178.277157][T17483] generic_file_write_iter+0x75/0x130 [ 178.282590][T17483] vfs_write+0x7bc/0x900 [ 178.287384][T17483] __x64_sys_pwrite64+0xf5/0x150 [ 178.292313][T17483] do_syscall_64+0x44/0xa0 [ 178.296802][T17483] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 178.302683][T17483] RIP: 0033:0x7fefe2cc58a7 16:53:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 21) [ 178.307275][T17483] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 178.326896][T17483] RSP: 002b:00007fefe0a89f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 178.335352][T17483] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2cc58a7 [ 178.343302][T17483] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 178.351302][T17483] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 178.359434][T17483] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 178.367445][T17483] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 178.384245][T17483] loop4: detected capacity change from 0 to 4096 [ 178.401782][T17483] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 178.406212][T17508] FAULT_INJECTION: forcing a failure. [ 178.406212][T17508] name failslab, interval 1, probability 0, space 0, times 0 [ 178.421458][T17508] CPU: 1 PID: 17508 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 16:53:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 178.422874][T17492] EXT4-fs (loop2): unsupported descriptor size 0 [ 178.430217][T17508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.430231][T17508] Call Trace: [ 178.430239][T17508] dump_stack_lvl+0xd6/0x122 [ 178.430263][T17508] dump_stack+0x11/0x1b [ 178.430281][T17508] should_fail+0x23c/0x250 [ 178.463357][T17508] __should_failslab+0x81/0x90 [ 178.468249][T17508] ? apply_wqattrs_prepare+0x5f/0x630 [ 178.473704][T17508] should_failslab+0x5/0x20 [ 178.478215][T17508] kmem_cache_alloc_trace+0x52/0x320 16:53:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 178.483630][T17508] apply_wqattrs_prepare+0x5f/0x630 [ 178.488823][T17508] ? vsnprintf+0xe8f/0xed0 [ 178.493456][T17508] apply_workqueue_attrs+0x9e/0x100 [ 178.498887][T17508] alloc_workqueue+0x777/0xad0 [ 178.503832][T17508] ? disk_unblock_events+0x35/0x40 [ 178.508997][T17508] ? bd_prepare_to_claim+0x1e6/0x270 [ 178.514368][T17508] ? loop_attr_do_show_dio+0x70/0x70 [ 178.519661][T17508] ? loop_set_status_from_info+0x35e/0x3a0 [ 178.525589][T17508] loop_configure+0x681/0xeb0 [ 178.530277][T17508] lo_ioctl+0x618/0x13e0 16:53:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 178.534711][T17508] ? path_openat+0x18d4/0x1ec0 [ 178.539666][T17508] ? blkdev_common_ioctl+0x438/0x1110 [ 178.545139][T17508] ? selinux_file_ioctl+0x981/0xa10 [ 178.550615][T17508] ? lo_release+0x120/0x120 [ 178.555215][T17508] blkdev_ioctl+0x1d0/0x3f0 [ 178.559723][T17508] block_ioctl+0x6e/0x80 [ 178.563968][T17508] ? blkdev_iopoll+0x80/0x80 [ 178.568552][T17508] __se_sys_ioctl+0xcb/0x140 [ 178.573239][T17508] __x64_sys_ioctl+0x3f/0x50 [ 178.577827][T17508] do_syscall_64+0x44/0xa0 [ 178.582297][T17508] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 178.588430][T17508] RIP: 0033:0x7fd846a55697 [ 178.593073][T17508] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 178.613213][T17508] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 178.622528][T17508] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 178.630980][T17508] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 178.638975][T17508] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 178.647220][T17508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 178.655783][T17508] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 16:53:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{0x0}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 9) 16:53:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 22) [ 178.785177][T17546] loop2: detected capacity change from 0 to 4096 [ 178.795035][T17548] FAULT_INJECTION: forcing a failure. [ 178.795035][T17548] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 178.808694][T17548] CPU: 0 PID: 17548 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 178.809693][T17546] EXT4-fs (loop2): unsupported descriptor size 0 [ 178.817562][T17548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.817576][T17548] Call Trace: [ 178.817583][T17548] dump_stack_lvl+0xd6/0x122 [ 178.817607][T17548] dump_stack+0x11/0x1b [ 178.817625][T17548] should_fail+0x23c/0x250 [ 178.824550][T17550] FAULT_INJECTION: forcing a failure. [ 178.824550][T17550] name failslab, interval 1, probability 0, space 0, times 0 [ 178.837650][T17548] should_fail_usercopy+0x16/0x20 [ 178.837691][T17548] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 178.878334][T17548] ? shmem_write_begin+0x7e/0x100 [ 178.883623][T17548] generic_perform_write+0x201/0x3e0 [ 178.888912][T17548] __generic_file_write_iter+0x174/0x310 [ 178.894883][T17548] ? generic_write_checks+0x250/0x290 [ 178.900415][T17548] generic_file_write_iter+0x75/0x130 [ 178.905943][T17548] vfs_write+0x7bc/0x900 [ 178.910441][T17548] __x64_sys_pwrite64+0xf5/0x150 [ 178.915594][T17548] do_syscall_64+0x44/0xa0 [ 178.920002][T17548] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 178.925922][T17548] RIP: 0033:0x7fefe2cc58a7 [ 178.930598][T17548] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 178.950301][T17548] RSP: 002b:00007fefe0a89f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 178.959043][T17548] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2cc58a7 [ 178.967359][T17548] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 178.975586][T17548] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff 16:53:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 178.983887][T17548] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 178.992849][T17548] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 179.000884][T17550] CPU: 1 PID: 17550 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 179.009822][T17550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.020228][T17550] Call Trace: [ 179.023509][T17550] dump_stack_lvl+0xd6/0x122 [ 179.028175][T17550] dump_stack+0x11/0x1b 16:53:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 179.032333][T17550] should_fail+0x23c/0x250 [ 179.036759][T17550] __should_failslab+0x81/0x90 [ 179.041653][T17550] ? apply_wqattrs_prepare+0xbe/0x630 [ 179.047023][T17550] should_failslab+0x5/0x20 [ 179.051528][T17550] kmem_cache_alloc_trace+0x52/0x320 [ 179.056818][T17550] ? apply_wqattrs_prepare+0x5f/0x630 [ 179.062221][T17550] apply_wqattrs_prepare+0xbe/0x630 [ 179.067635][T17550] ? vsnprintf+0xe8f/0xed0 [ 179.072113][T17550] apply_workqueue_attrs+0x9e/0x100 [ 179.077587][T17550] alloc_workqueue+0x777/0xad0 16:53:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{0x0}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 179.082386][T17550] ? disk_unblock_events+0x35/0x40 [ 179.087505][T17550] ? bd_prepare_to_claim+0x1e6/0x270 [ 179.093121][T17550] ? loop_attr_do_show_dio+0x70/0x70 [ 179.098455][T17550] ? loop_set_status_from_info+0x35e/0x3a0 [ 179.104823][T17550] loop_configure+0x681/0xeb0 [ 179.109533][T17550] lo_ioctl+0x618/0x13e0 [ 179.113871][T17550] ? path_openat+0x18d4/0x1ec0 [ 179.118923][T17550] ? blkdev_common_ioctl+0x438/0x1110 [ 179.124306][T17550] ? selinux_file_ioctl+0x981/0xa10 [ 179.129700][T17550] ? lo_release+0x120/0x120 [ 179.134409][T17550] blkdev_ioctl+0x1d0/0x3f0 [ 179.139008][T17550] block_ioctl+0x6e/0x80 [ 179.143232][T17550] ? blkdev_iopoll+0x80/0x80 [ 179.147907][T17550] __se_sys_ioctl+0xcb/0x140 [ 179.152476][T17550] __x64_sys_ioctl+0x3f/0x50 [ 179.157099][T17550] do_syscall_64+0x44/0xa0 [ 179.162436][T17550] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 179.168451][T17550] RIP: 0033:0x7fd846a55697 16:53:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 179.172847][T17550] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.192545][T17550] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 179.200970][T17550] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 179.208932][T17550] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 179.216989][T17550] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 179.225340][T17550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 16:53:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 179.233327][T17550] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 179.242060][T17548] loop4: detected capacity change from 0 to 4096 16:53:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 23) [ 179.279576][T17548] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 179.313712][T17589] FAULT_INJECTION: forcing a failure. [ 179.313712][T17589] name failslab, interval 1, probability 0, space 0, times 0 [ 179.326718][T17589] CPU: 1 PID: 17589 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 179.335585][T17589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.346296][T17589] Call Trace: [ 179.349870][T17589] dump_stack_lvl+0xd6/0x122 [ 179.355431][T17589] dump_stack+0x11/0x1b [ 179.360480][T17589] should_fail+0x23c/0x250 [ 179.364925][T17589] __should_failslab+0x81/0x90 [ 179.370506][T17589] should_failslab+0x5/0x20 [ 179.374995][T17589] kmem_cache_alloc_node+0x61/0x2c0 [ 179.380178][T17589] ? alloc_unbound_pwq+0x3e6/0x780 [ 179.385667][T17589] alloc_unbound_pwq+0x3e6/0x780 [ 179.390776][T17589] apply_wqattrs_prepare+0x1ed/0x630 [ 179.396218][T17589] ? vsnprintf+0xe8f/0xed0 [ 179.400820][T17589] apply_workqueue_attrs+0x9e/0x100 [ 179.406176][T17589] alloc_workqueue+0x777/0xad0 [ 179.411242][T17589] ? disk_unblock_events+0x35/0x40 [ 179.416426][T17589] ? bd_prepare_to_claim+0x1e6/0x270 [ 179.421897][T17589] ? loop_attr_do_show_dio+0x70/0x70 [ 179.427394][T17589] ? loop_set_status_from_info+0x35e/0x3a0 [ 179.433433][T17589] loop_configure+0x681/0xeb0 [ 179.438790][T17589] lo_ioctl+0x618/0x13e0 [ 179.443105][T17589] ? path_openat+0x18d4/0x1ec0 [ 179.448040][T17589] ? blkdev_common_ioctl+0x438/0x1110 [ 179.454291][T17589] ? selinux_file_ioctl+0x981/0xa10 [ 179.459835][T17589] ? lo_release+0x120/0x120 [ 179.464607][T17589] blkdev_ioctl+0x1d0/0x3f0 [ 179.469089][T17589] block_ioctl+0x6e/0x80 [ 179.473497][T17589] ? blkdev_iopoll+0x80/0x80 [ 179.478066][T17589] __se_sys_ioctl+0xcb/0x140 [ 179.482696][T17589] __x64_sys_ioctl+0x3f/0x50 [ 179.487398][T17589] do_syscall_64+0x44/0xa0 [ 179.491905][T17589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 179.498176][T17589] RIP: 0033:0x7fd846a55697 [ 179.502664][T17589] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.522548][T17589] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 179.531291][T17589] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 179.539460][T17589] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 179.547655][T17589] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 179.555942][T17589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 179.564159][T17589] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 16:53:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 10) 16:53:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 24) [ 179.644939][T17607] loop2: detected capacity change from 0 to 4096 [ 179.651805][T17609] FAULT_INJECTION: forcing a failure. [ 179.651805][T17609] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 179.665192][T17609] CPU: 1 PID: 17609 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 179.674213][T17609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.684570][T17609] Call Trace: [ 179.687966][T17609] dump_stack_lvl+0xd6/0x122 [ 179.692704][T17609] dump_stack+0x11/0x1b [ 179.696871][T17609] should_fail+0x23c/0x250 [ 179.701386][T17609] should_fail_usercopy+0x16/0x20 [ 179.706534][T17609] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 179.712260][T17609] ? shmem_write_begin+0x7e/0x100 [ 179.717336][T17609] generic_perform_write+0x201/0x3e0 [ 179.723078][T17609] __generic_file_write_iter+0x174/0x310 [ 179.728768][T17609] ? generic_write_checks+0x250/0x290 [ 179.734185][T17609] generic_file_write_iter+0x75/0x130 [ 179.739619][T17609] vfs_write+0x7bc/0x900 [ 179.743936][T17609] __x64_sys_pwrite64+0xf5/0x150 [ 179.748995][T17609] do_syscall_64+0x44/0xa0 [ 179.753406][T17609] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 179.759301][T17609] RIP: 0033:0x7fefe2cc58a7 [ 179.763785][T17609] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 179.783800][T17609] RSP: 002b:00007fefe0a89f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 179.793577][T17609] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2cc58a7 [ 179.802229][T17609] RDX: 000000000000001f RSI: 0000000020010100 RDI: 0000000000000004 [ 179.810257][T17609] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 179.818226][T17609] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000004 [ 179.826180][T17609] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 179.835987][T17607] EXT4-fs (loop2): unsupported descriptor size 0 [ 179.839738][T17616] FAULT_INJECTION: forcing a failure. [ 179.839738][T17616] name failslab, interval 1, probability 0, space 0, times 0 [ 179.845226][T17609] loop4: detected capacity change from 0 to 4096 [ 179.855294][T17616] CPU: 1 PID: 17616 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 179.870661][T17616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.880761][T17616] Call Trace: [ 179.883380][T17609] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:53:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 11) 16:53:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, 0x0, 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 179.884048][T17616] dump_stack_lvl+0xd6/0x122 [ 179.900843][T17616] dump_stack+0x11/0x1b [ 179.905020][T17616] should_fail+0x23c/0x250 [ 179.909818][T17616] __should_failslab+0x81/0x90 [ 179.914595][T17616] ? kobject_uevent_env+0x1a7/0xc40 [ 179.919855][T17616] should_failslab+0x5/0x20 [ 179.924451][T17616] kmem_cache_alloc_trace+0x52/0x320 [ 179.929787][T17616] ? pwq_adjust_max_active+0x491/0x4b0 [ 179.935259][T17616] ? dev_uevent_filter+0x70/0x70 [ 179.940518][T17616] kobject_uevent_env+0x1a7/0xc40 [ 179.945551][T17616] ? __list_add_valid+0x28/0x90 [ 179.950408][T17616] ? alloc_workqueue+0xa18/0xad0 [ 179.955579][T17616] disk_force_media_change+0xe3/0x170 [ 179.961088][T17616] loop_configure+0x6c0/0xeb0 [ 179.965848][T17616] lo_ioctl+0x618/0x13e0 [ 179.970093][T17616] ? path_openat+0x18d4/0x1ec0 [ 179.975027][T17616] ? blkdev_common_ioctl+0x438/0x1110 [ 179.980756][T17616] ? selinux_file_ioctl+0x981/0xa10 [ 179.985946][T17616] ? lo_release+0x120/0x120 [ 179.990437][T17616] blkdev_ioctl+0x1d0/0x3f0 [ 179.994920][T17616] block_ioctl+0x6e/0x80 [ 179.999198][T17616] ? blkdev_iopoll+0x80/0x80 [ 180.003892][T17616] __se_sys_ioctl+0xcb/0x140 [ 180.008485][T17616] __x64_sys_ioctl+0x3f/0x50 [ 180.013218][T17616] do_syscall_64+0x44/0xa0 [ 180.017630][T17616] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 180.023619][T17616] RIP: 0033:0x7fd846a55697 [ 180.028283][T17616] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 180.048333][T17616] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 180.056771][T17616] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 180.064817][T17616] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 180.072781][T17616] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 180.080737][T17616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 16:53:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, 0x0, 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 180.088790][T17616] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 180.103646][T17616] loop1: detected capacity change from 0 to 4096 [ 180.124611][T17616] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 180.137172][T17616] EXT4-fs (loop1): get root inode failed 16:53:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 180.143105][T17616] EXT4-fs (loop1): mount failed [ 180.167386][T17649] FAULT_INJECTION: forcing a failure. [ 180.167386][T17649] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 180.180658][T17649] CPU: 0 PID: 17649 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 180.189489][T17649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.199801][T17649] Call Trace: [ 180.203151][T17649] dump_stack_lvl+0xd6/0x122 [ 180.207861][T17649] dump_stack+0x11/0x1b [ 180.212005][T17657] loop2: detected capacity change from 0 to 4096 [ 180.212021][T17649] should_fail+0x23c/0x250 [ 180.212041][T17649] __alloc_pages+0x102/0x320 [ 180.221573][T17657] EXT4-fs (loop2): unsupported descriptor size 0 [ 180.222927][T17649] alloc_pages_vma+0x5ee/0x770 [ 180.222957][T17649] shmem_getpage_gfp+0x96d/0x13d0 [ 180.243804][T17649] ? policydb_context_isvalid+0x135/0x230 [ 180.249601][T17649] shmem_write_begin+0x7e/0x100 [ 180.254476][T17649] generic_perform_write+0x1b8/0x3e0 [ 180.260035][T17649] __generic_file_write_iter+0x174/0x310 [ 180.265660][T17649] ? generic_write_checks+0x250/0x290 [ 180.271096][T17649] generic_file_write_iter+0x75/0x130 [ 180.276472][T17649] vfs_write+0x7bc/0x900 [ 180.280722][T17649] __x64_sys_pwrite64+0xf5/0x150 [ 180.286021][T17649] do_syscall_64+0x44/0xa0 [ 180.290663][T17649] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 180.296616][T17649] RIP: 0033:0x7fefe2cc58a7 [ 180.301026][T17649] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 180.320787][T17649] RSP: 002b:00007fefe0a89f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 180.329529][T17649] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2cc58a7 [ 180.337503][T17649] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000004 16:53:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, 0x0, 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 180.345578][T17649] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 180.353709][T17649] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 180.362614][T17649] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 180.371583][T17649] loop4: detected capacity change from 0 to 4096 16:53:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 25) [ 180.406627][T17649] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 180.416435][T17649] EXT4-fs (loop4): group descriptors corrupted! [ 180.456720][T17679] FAULT_INJECTION: forcing a failure. [ 180.456720][T17679] name failslab, interval 1, probability 0, space 0, times 0 [ 180.469710][T17679] CPU: 0 PID: 17679 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 180.479077][T17679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.489119][T17679] Call Trace: [ 180.492624][T17679] dump_stack_lvl+0xd6/0x122 [ 180.497217][T17679] dump_stack+0x11/0x1b [ 180.501437][T17679] should_fail+0x23c/0x250 16:53:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 180.505986][T17679] ? kzalloc+0x1d/0x30 [ 180.510043][T17679] __should_failslab+0x81/0x90 [ 180.514820][T17679] should_failslab+0x5/0x20 [ 180.519330][T17679] __kmalloc+0x6f/0x350 [ 180.523576][T17679] kzalloc+0x1d/0x30 [ 180.527664][T17679] kobject_get_path+0x7c/0x110 [ 180.532493][T17679] kobject_uevent_env+0x1be/0xc40 [ 180.537675][T17679] ? __list_add_valid+0x28/0x90 [ 180.542607][T17679] ? alloc_workqueue+0xa18/0xad0 [ 180.547585][T17679] disk_force_media_change+0xe3/0x170 [ 180.553233][T17679] loop_configure+0x6c0/0xeb0 [ 180.556899][T17687] loop2: detected capacity change from 0 to 4096 [ 180.558132][T17679] lo_ioctl+0x618/0x13e0 [ 180.558158][T17679] ? path_openat+0x18d4/0x1ec0 [ 180.558183][T17679] ? blkdev_common_ioctl+0x438/0x1110 [ 180.558202][T17679] ? selinux_file_ioctl+0x981/0xa10 [ 180.584230][T17679] ? lo_release+0x120/0x120 [ 180.588772][T17679] blkdev_ioctl+0x1d0/0x3f0 [ 180.593257][T17679] block_ioctl+0x6e/0x80 [ 180.597482][T17679] ? blkdev_iopoll+0x80/0x80 [ 180.602120][T17679] __se_sys_ioctl+0xcb/0x140 [ 180.606862][T17679] __x64_sys_ioctl+0x3f/0x50 [ 180.611576][T17679] do_syscall_64+0x44/0xa0 [ 180.615992][T17679] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 180.622015][T17679] RIP: 0033:0x7fd846a55697 [ 180.626721][T17679] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 180.647956][T17679] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 180.656361][T17679] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 180.664317][T17679] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 180.672446][T17679] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 180.680403][T17679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 180.688879][T17679] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 16:53:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 12) 16:53:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 180.707335][T17687] EXT4-fs (loop2): unsupported descriptor size 0 [ 180.714536][T17679] loop1: detected capacity change from 0 to 4096 [ 180.762205][T17679] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 180.768014][T17707] FAULT_INJECTION: forcing a failure. [ 180.768014][T17707] name failslab, interval 1, probability 0, space 0, times 0 [ 180.785357][T17679] EXT4-fs (loop1): get root inode failed [ 180.787075][T17707] CPU: 0 PID: 17707 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 180.787096][T17707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:53:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280), 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 180.792720][T17679] EXT4-fs (loop1): mount failed [ 180.801900][T17707] Call Trace: [ 180.801916][T17707] dump_stack_lvl+0xd6/0x122 [ 180.801940][T17707] dump_stack+0x11/0x1b [ 180.830351][T17707] should_fail+0x23c/0x250 [ 180.835118][T17707] ? xas_create+0x3fb/0xb30 [ 180.839617][T17707] __should_failslab+0x81/0x90 [ 180.844363][T17707] should_failslab+0x5/0x20 [ 180.848843][T17707] kmem_cache_alloc+0x4f/0x300 [ 180.853936][T17707] xas_create+0x3fb/0xb30 [ 180.858535][T17707] ? get_page_from_freelist+0x510/0x830 [ 180.865262][T17707] xas_create_range+0x146/0x360 [ 180.870153][T17707] shmem_add_to_page_cache+0x3bd/0x660 [ 180.875826][T17707] shmem_getpage_gfp+0xba5/0x13d0 [ 180.880880][T17707] ? policydb_context_isvalid+0x135/0x230 [ 180.886683][T17707] shmem_write_begin+0x7e/0x100 [ 180.891589][T17707] generic_perform_write+0x1b8/0x3e0 [ 180.896882][T17707] __generic_file_write_iter+0x174/0x310 [ 180.902637][T17707] ? generic_write_checks+0x250/0x290 16:53:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280), 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 180.908023][T17707] generic_file_write_iter+0x75/0x130 [ 180.913664][T17707] vfs_write+0x7bc/0x900 [ 180.918069][T17707] __x64_sys_pwrite64+0xf5/0x150 [ 180.923068][T17707] do_syscall_64+0x44/0xa0 [ 180.927467][T17707] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 180.933464][T17707] RIP: 0033:0x7fefe2cc58a7 [ 180.938209][T17707] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 180.957883][T17707] RSP: 002b:00007fefe0a89f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 180.966314][T17707] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2cc58a7 [ 180.974382][T17707] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000004 [ 180.982445][T17707] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 180.990482][T17707] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 180.999251][T17707] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 16:53:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 26) [ 181.011824][T17707] loop4: detected capacity change from 0 to 4096 [ 181.025836][T17724] loop2: detected capacity change from 0 to 4096 [ 181.059303][T17733] FAULT_INJECTION: forcing a failure. [ 181.059303][T17733] name failslab, interval 1, probability 0, space 0, times 0 [ 181.072097][T17733] CPU: 1 PID: 17733 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 181.077500][T17724] EXT4-fs (loop2): unsupported descriptor size 0 [ 181.080855][T17733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.097670][T17733] Call Trace: [ 181.101033][T17733] dump_stack_lvl+0xd6/0x122 16:53:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 13) [ 181.105681][T17733] dump_stack+0x11/0x1b [ 181.109846][T17733] should_fail+0x23c/0x250 [ 181.111442][T17707] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 181.114264][T17733] __should_failslab+0x81/0x90 [ 181.114288][T17733] should_failslab+0x5/0x20 [ 181.135714][T17733] kmem_cache_alloc_node+0x61/0x2c0 [ 181.140995][T17733] ? __alloc_skb+0xed/0x420 [ 181.145517][T17733] __alloc_skb+0xed/0x420 [ 181.150767][T17733] alloc_uevent_skb+0x5b/0x120 [ 181.155555][T17733] kobject_uevent_env+0x863/0xc40 [ 181.160569][T17733] disk_force_media_change+0xe3/0x170 [ 181.166070][T17733] loop_configure+0x6c0/0xeb0 [ 181.170828][T17733] lo_ioctl+0x618/0x13e0 [ 181.175123][T17733] ? path_openat+0x18d4/0x1ec0 [ 181.179945][T17733] ? blkdev_common_ioctl+0x438/0x1110 [ 181.185311][T17733] ? selinux_file_ioctl+0x981/0xa10 [ 181.190492][T17733] ? lo_release+0x120/0x120 [ 181.195102][T17733] blkdev_ioctl+0x1d0/0x3f0 [ 181.199617][T17733] block_ioctl+0x6e/0x80 [ 181.203852][T17733] ? blkdev_iopoll+0x80/0x80 [ 181.208451][T17733] __se_sys_ioctl+0xcb/0x140 [ 181.213128][T17733] __x64_sys_ioctl+0x3f/0x50 [ 181.217783][T17733] do_syscall_64+0x44/0xa0 [ 181.222214][T17733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 181.228236][T17733] RIP: 0033:0x7fd846a55697 [ 181.232725][T17733] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 181.252725][T17733] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 181.261223][T17733] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 181.269196][T17733] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 181.277344][T17733] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 181.285387][T17733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 181.293337][T17733] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 181.302104][T17733] loop1: detected capacity change from 0 to 4096 16:53:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280), 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 181.312327][T17733] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 181.325447][T17733] EXT4-fs (loop1): get root inode failed [ 181.331280][T17733] EXT4-fs (loop1): mount failed [ 181.373687][T17756] FAULT_INJECTION: forcing a failure. [ 181.373687][T17756] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 181.386540][T17758] loop2: detected capacity change from 0 to 4096 [ 181.387200][T17756] CPU: 1 PID: 17756 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 181.402552][T17756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.413191][T17756] Call Trace: [ 181.416459][T17756] dump_stack_lvl+0xd6/0x122 [ 181.421235][T17756] dump_stack+0x11/0x1b [ 181.425384][T17756] should_fail+0x23c/0x250 [ 181.429887][T17756] should_fail_usercopy+0x16/0x20 [ 181.434895][T17756] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 181.440719][T17756] ? shmem_write_begin+0x7e/0x100 [ 181.445725][T17756] generic_perform_write+0x201/0x3e0 [ 181.451124][T17756] __generic_file_write_iter+0x174/0x310 [ 181.456929][T17756] ? generic_write_checks+0x250/0x290 [ 181.462620][T17756] generic_file_write_iter+0x75/0x130 [ 181.467980][T17756] vfs_write+0x7bc/0x900 [ 181.472314][T17756] __x64_sys_pwrite64+0xf5/0x150 [ 181.477258][T17756] do_syscall_64+0x44/0xa0 [ 181.481680][T17756] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 181.487601][T17756] RIP: 0033:0x7fefe2cc58a7 [ 181.492001][T17756] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 181.512126][T17756] RSP: 002b:00007fefe0a89f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 181.521087][T17756] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2cc58a7 [ 181.529154][T17756] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000004 [ 181.537557][T17756] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 181.545526][T17756] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 181.553592][T17756] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 16:53:49 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 27) 16:53:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 14) [ 181.578329][T17758] EXT4-fs (loop2): unsupported descriptor size 0 [ 181.584401][T17756] loop4: detected capacity change from 0 to 4096 [ 181.607350][T17756] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:53:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{0x0}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 181.647707][T17779] FAULT_INJECTION: forcing a failure. [ 181.647707][T17779] name failslab, interval 1, probability 0, space 0, times 0 [ 181.660617][T17779] CPU: 1 PID: 17779 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 181.669376][T17779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.679574][T17779] Call Trace: [ 181.682893][T17779] dump_stack_lvl+0xd6/0x122 [ 181.687484][T17779] dump_stack+0x11/0x1b [ 181.692465][T17779] should_fail+0x23c/0x250 [ 181.696986][T17779] __should_failslab+0x81/0x90 [ 181.702095][T17779] should_failslab+0x5/0x20 [ 181.706679][T17779] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 181.712395][T17779] ? __kmalloc_node_track_caller+0x30/0x40 [ 181.718371][T17779] __kmalloc_node_track_caller+0x30/0x40 [ 181.724305][T17779] ? alloc_uevent_skb+0x5b/0x120 [ 181.729471][T17779] __alloc_skb+0x187/0x420 [ 181.733961][T17779] alloc_uevent_skb+0x5b/0x120 [ 181.738975][T17779] kobject_uevent_env+0x863/0xc40 16:53:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{0x0}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 181.744200][T17779] disk_force_media_change+0xe3/0x170 [ 181.749737][T17779] loop_configure+0x6c0/0xeb0 [ 181.754454][T17779] lo_ioctl+0x618/0x13e0 [ 181.758951][T17779] ? path_openat+0x18d4/0x1ec0 [ 181.763741][T17779] ? blkdev_common_ioctl+0x438/0x1110 [ 181.769178][T17779] ? selinux_file_ioctl+0x981/0xa10 [ 181.774555][T17779] ? lo_release+0x120/0x120 [ 181.779062][T17779] blkdev_ioctl+0x1d0/0x3f0 [ 181.783608][T17779] block_ioctl+0x6e/0x80 [ 181.787851][T17779] ? blkdev_iopoll+0x80/0x80 [ 181.792486][T17779] __se_sys_ioctl+0xcb/0x140 [ 181.797071][T17779] __x64_sys_ioctl+0x3f/0x50 [ 181.801904][T17779] do_syscall_64+0x44/0xa0 [ 181.806338][T17779] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 181.812546][T17779] RIP: 0033:0x7fd846a55697 [ 181.817399][T17779] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 181.838171][T17779] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 181.846800][T17779] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 181.854758][T17779] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 181.863158][T17779] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 181.871306][T17779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 181.879261][T17779] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 16:53:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{0x0}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 181.893307][T17779] loop1: detected capacity change from 0 to 4096 [ 181.894434][T17781] loop2: detected capacity change from 0 to 4096 [ 181.909050][T17781] EXT4-fs (loop2): unsupported descriptor size 0 [ 181.923239][T17779] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 181.938159][T17803] FAULT_INJECTION: forcing a failure. [ 181.938159][T17803] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 181.951701][T17803] CPU: 1 PID: 17803 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 181.961011][T17803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.971487][T17803] Call Trace: [ 181.973911][T17779] EXT4-fs (loop1): get root inode failed [ 181.974799][T17803] dump_stack_lvl+0xd6/0x122 [ 181.974825][T17803] dump_stack+0x11/0x1b [ 181.980925][T17779] EXT4-fs (loop1): mount failed [ 181.985644][T17803] should_fail+0x23c/0x250 16:53:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 181.999355][T17803] __alloc_pages+0x102/0x320 [ 182.004079][T17803] alloc_pages_vma+0x5ee/0x770 [ 182.008978][T17803] shmem_getpage_gfp+0x96d/0x13d0 [ 182.014111][T17803] ? policydb_context_isvalid+0x135/0x230 [ 182.019954][T17803] shmem_write_begin+0x7e/0x100 [ 182.024940][T17803] generic_perform_write+0x1b8/0x3e0 [ 182.030247][T17803] __generic_file_write_iter+0x174/0x310 [ 182.035965][T17803] ? generic_write_checks+0x250/0x290 [ 182.041445][T17803] generic_file_write_iter+0x75/0x130 [ 182.046898][T17803] vfs_write+0x7bc/0x900 [ 182.051151][T17803] __x64_sys_pwrite64+0xf5/0x150 [ 182.056456][T17803] do_syscall_64+0x44/0xa0 [ 182.061684][T17803] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.067957][T17803] RIP: 0033:0x7fefe2cc58a7 [ 182.072538][T17803] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 16:53:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 182.093317][T17803] RSP: 002b:00007fefe0a89f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 182.101842][T17803] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2cc58a7 [ 182.110077][T17803] RDX: 000000000000001d RSI: 0000000020012600 RDI: 0000000000000004 [ 182.118140][T17803] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 182.126332][T17803] R10: 0000000000004400 R11: 0000000000000293 R12: 0000000000000004 [ 182.134307][T17803] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 182.142845][T17803] loop4: detected capacity change from 0 to 4096 16:53:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 28) [ 182.165665][T17803] EXT4-fs error (device loop4): ext4_fill_super:4816: inode #2: comm syz-executor.4: iget: root inode unallocated [ 182.181579][T17803] EXT4-fs (loop4): get root inode failed [ 182.187387][T17803] EXT4-fs (loop4): mount failed [ 182.206348][T17826] loop2: detected capacity change from 0 to 4096 16:53:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 182.226144][T17826] EXT4-fs (loop2): unsupported descriptor size 0 [ 182.238250][T17834] FAULT_INJECTION: forcing a failure. [ 182.238250][T17834] name failslab, interval 1, probability 0, space 0, times 0 [ 182.251243][T17834] CPU: 1 PID: 17834 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 182.260256][T17834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.271366][T17834] Call Trace: [ 182.274895][T17834] dump_stack_lvl+0xd6/0x122 [ 182.279498][T17834] dump_stack+0x11/0x1b [ 182.283652][T17834] should_fail+0x23c/0x250 [ 182.288484][T17834] ? skb_clone+0x12c/0x1f0 [ 182.292884][T17834] __should_failslab+0x81/0x90 [ 182.297758][T17834] should_failslab+0x5/0x20 [ 182.302245][T17834] kmem_cache_alloc+0x4f/0x300 [ 182.307049][T17834] skb_clone+0x12c/0x1f0 [ 182.311286][T17834] netlink_broadcast_filtered+0x4fd/0xb60 [ 182.317191][T17834] ? skb_put+0xb9/0xf0 [ 182.321284][T17834] netlink_broadcast+0x35/0x50 [ 182.326231][T17834] kobject_uevent_env+0x8c9/0xc40 [ 182.331519][T17834] disk_force_media_change+0xe3/0x170 [ 182.337060][T17834] loop_configure+0x6c0/0xeb0 [ 182.341722][T17834] lo_ioctl+0x618/0x13e0 [ 182.345945][T17834] ? path_openat+0x18d4/0x1ec0 [ 182.351194][T17834] ? blkdev_common_ioctl+0x438/0x1110 [ 182.356547][T17834] ? selinux_file_ioctl+0x981/0xa10 [ 182.361749][T17834] ? lo_release+0x120/0x120 [ 182.366245][T17834] blkdev_ioctl+0x1d0/0x3f0 [ 182.370736][T17834] block_ioctl+0x6e/0x80 [ 182.374980][T17834] ? blkdev_iopoll+0x80/0x80 [ 182.379553][T17834] __se_sys_ioctl+0xcb/0x140 [ 182.384237][T17834] __x64_sys_ioctl+0x3f/0x50 [ 182.389020][T17834] do_syscall_64+0x44/0xa0 [ 182.393688][T17834] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.400390][T17834] RIP: 0033:0x7fd846a55697 [ 182.404786][T17834] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 16:53:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 182.424817][T17834] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 182.433364][T17834] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 182.441469][T17834] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 182.449449][T17834] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 182.457572][T17834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 182.465746][T17834] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 182.475615][T17834] loop1: detected capacity change from 0 to 4096 16:53:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 15) 16:53:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 182.515402][T17834] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 182.522985][T17846] loop2: detected capacity change from 0 to 4096 [ 182.537809][T17834] EXT4-fs (loop1): get root inode failed [ 182.543787][T17834] EXT4-fs (loop1): mount failed [ 182.544576][T17852] FAULT_INJECTION: forcing a failure. [ 182.544576][T17852] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 182.561980][T17852] CPU: 0 PID: 17852 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 182.570740][T17852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.581119][T17852] Call Trace: [ 182.584753][T17852] dump_stack_lvl+0xd6/0x122 [ 182.589367][T17852] dump_stack+0x11/0x1b [ 182.593509][T17852] should_fail+0x23c/0x250 [ 182.597909][T17852] should_fail_usercopy+0x16/0x20 [ 182.602934][T17852] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 182.608859][T17852] ? shmem_write_begin+0x7e/0x100 [ 182.613879][T17852] generic_perform_write+0x201/0x3e0 [ 182.619369][T17852] __generic_file_write_iter+0x174/0x310 [ 182.625000][T17852] ? generic_write_checks+0x250/0x290 [ 182.630453][T17852] generic_file_write_iter+0x75/0x130 [ 182.636356][T17852] vfs_write+0x7bc/0x900 [ 182.640638][T17852] __x64_sys_pwrite64+0xf5/0x150 [ 182.645620][T17852] do_syscall_64+0x44/0xa0 [ 182.650116][T17852] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.656063][T17852] RIP: 0033:0x7fefe2cc58a7 [ 182.660472][T17852] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 182.680318][T17852] RSP: 002b:00007fefe0a89f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 182.688709][T17852] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2cc58a7 [ 182.696835][T17852] RDX: 000000000000001d RSI: 0000000020012600 RDI: 0000000000000004 [ 182.704916][T17852] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff 16:53:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 29) [ 182.712961][T17852] R10: 0000000000004400 R11: 0000000000000293 R12: 0000000000000004 [ 182.720912][T17852] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 182.747789][T17852] loop4: detected capacity change from 0 to 4096 [ 182.754142][T17846] EXT4-fs (loop2): unsupported descriptor size 0 16:53:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 16) [ 182.770020][T17852] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 182.773361][T17866] FAULT_INJECTION: forcing a failure. [ 182.773361][T17866] name failslab, interval 1, probability 0, space 0, times 0 [ 182.793639][T17866] CPU: 0 PID: 17866 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 182.802541][T17866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.812599][T17866] Call Trace: [ 182.815933][T17866] dump_stack_lvl+0xd6/0x122 [ 182.820531][T17866] dump_stack+0x11/0x1b [ 182.824887][T17866] should_fail+0x23c/0x250 [ 182.829330][T17866] __should_failslab+0x81/0x90 [ 182.834262][T17866] ? call_usermodehelper_setup+0x71/0x190 [ 182.840039][T17866] should_failslab+0x5/0x20 [ 182.844535][T17866] kmem_cache_alloc_trace+0x52/0x320 [ 182.849984][T17866] call_usermodehelper_setup+0x71/0x190 [ 182.855763][T17866] ? add_uevent_var+0x1d0/0x1d0 [ 182.860598][T17866] kobject_uevent_env+0xb29/0xc40 16:53:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 182.865719][T17866] disk_force_media_change+0xe3/0x170 [ 182.871170][T17866] loop_configure+0x6c0/0xeb0 [ 182.875956][T17866] lo_ioctl+0x618/0x13e0 [ 182.880286][T17866] ? path_openat+0x18d4/0x1ec0 [ 182.885253][T17866] ? blkdev_common_ioctl+0x438/0x1110 [ 182.890607][T17866] ? selinux_file_ioctl+0x981/0xa10 [ 182.895792][T17866] ? lo_release+0x120/0x120 [ 182.900295][T17866] blkdev_ioctl+0x1d0/0x3f0 [ 182.904788][T17866] block_ioctl+0x6e/0x80 [ 182.909093][T17866] ? blkdev_iopoll+0x80/0x80 [ 182.913660][T17866] __se_sys_ioctl+0xcb/0x140 [ 182.918322][T17866] __x64_sys_ioctl+0x3f/0x50 [ 182.922929][T17866] do_syscall_64+0x44/0xa0 [ 182.927552][T17866] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.933464][T17866] RIP: 0033:0x7fd846a55697 [ 182.937879][T17866] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 182.958150][T17866] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 182.966549][T17866] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 182.974508][T17866] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 182.982468][T17866] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 182.990518][T17866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 182.998466][T17866] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 183.006757][T17866] loop1: detected capacity change from 0 to 4096 [ 183.019013][T17866] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 183.031374][T17866] EXT4-fs (loop1): get root inode failed [ 183.037125][T17866] EXT4-fs (loop1): mount failed [ 183.054158][T17885] FAULT_INJECTION: forcing a failure. [ 183.054158][T17885] name failslab, interval 1, probability 0, space 0, times 0 [ 183.066908][T17885] CPU: 0 PID: 17885 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 183.075943][T17885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.084747][T17887] loop2: detected capacity change from 0 to 4096 [ 183.086162][T17885] Call Trace: [ 183.086170][T17885] dump_stack_lvl+0xd6/0x122 [ 183.086196][T17885] dump_stack+0x11/0x1b [ 183.104581][T17885] should_fail+0x23c/0x250 [ 183.108992][T17885] ? getname_flags+0x84/0x3f0 [ 183.113722][T17885] __should_failslab+0x81/0x90 [ 183.118525][T17885] should_failslab+0x5/0x20 [ 183.123028][T17885] kmem_cache_alloc+0x4f/0x300 [ 183.127949][T17885] getname_flags+0x84/0x3f0 [ 183.132455][T17885] getname+0x15/0x20 [ 183.136503][T17885] do_sys_openat2+0x6d/0x2b0 [ 183.141469][T17885] __x64_sys_openat+0xef/0x110 [ 183.146302][T17885] do_syscall_64+0x44/0xa0 [ 183.150708][T17885] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 183.157026][T17885] RIP: 0033:0x7fefe2cc57f4 [ 183.161433][T17885] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 183.182047][T17885] RSP: 002b:00007fefe0a89ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 183.190467][T17885] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2cc57f4 [ 183.198936][T17885] RDX: 0000000000000002 RSI: 00007fefe0a8a000 RDI: 00000000ffffff9c [ 183.206907][T17885] RBP: 00007fefe0a8a000 R08: 0000000000000000 R09: ffffffffffffffff 16:53:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 17) 16:53:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 30) 16:53:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 183.214870][T17885] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 183.223191][T17885] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 183.243219][T17887] EXT4-fs (loop2): unsupported descriptor size 0 16:53:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 183.306384][T17902] FAULT_INJECTION: forcing a failure. [ 183.306384][T17902] name failslab, interval 1, probability 0, space 0, times 0 [ 183.319321][T17902] CPU: 0 PID: 17902 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 183.328218][T17902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.338356][T17902] Call Trace: [ 183.342160][T17902] dump_stack_lvl+0xd6/0x122 [ 183.346964][T17902] dump_stack+0x11/0x1b [ 183.351250][T17902] should_fail+0x23c/0x250 16:53:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 183.355671][T17902] ? __kernfs_new_node+0x6a/0x330 [ 183.360786][T17902] __should_failslab+0x81/0x90 [ 183.365626][T17902] should_failslab+0x5/0x20 [ 183.370271][T17902] kmem_cache_alloc+0x4f/0x300 [ 183.375043][T17902] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 183.381055][T17902] __kernfs_new_node+0x6a/0x330 [ 183.385934][T17902] ? ___cache_free+0x3c/0x300 [ 183.390616][T17902] ? kfree+0xf8/0x1d0 [ 183.394683][T17902] kernfs_create_dir_ns+0x5e/0x140 [ 183.399802][T17902] internal_create_group+0x148/0x860 [ 183.405179][T17902] ? __invalidate_device+0xb0/0xc0 [ 183.410291][T17902] ? set_disk_ro+0x73/0x110 [ 183.414194][T17911] FAULT_INJECTION: forcing a failure. [ 183.414194][T17911] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 183.414794][T17902] sysfs_create_group+0x1b/0x20 [ 183.414818][T17902] loop_configure+0xbcd/0xeb0 [ 183.438206][T17902] lo_ioctl+0x618/0x13e0 [ 183.442453][T17902] ? path_openat+0x18d4/0x1ec0 [ 183.447555][T17902] ? blkdev_common_ioctl+0x438/0x1110 [ 183.452941][T17902] ? selinux_file_ioctl+0x981/0xa10 [ 183.458140][T17902] ? lo_release+0x120/0x120 [ 183.462724][T17902] blkdev_ioctl+0x1d0/0x3f0 [ 183.467254][T17902] block_ioctl+0x6e/0x80 [ 183.471489][T17902] ? blkdev_iopoll+0x80/0x80 [ 183.476137][T17902] __se_sys_ioctl+0xcb/0x140 [ 183.480924][T17902] __x64_sys_ioctl+0x3f/0x50 [ 183.485591][T17902] do_syscall_64+0x44/0xa0 [ 183.490069][T17902] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 183.496152][T17902] RIP: 0033:0x7fd846a55697 [ 183.500677][T17902] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 183.520492][T17902] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 183.528903][T17902] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 183.537038][T17902] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 183.545165][T17902] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 183.553134][T17902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 183.561086][T17902] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 183.569046][T17911] CPU: 1 PID: 17911 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 183.569088][T17902] loop1: detected capacity change from 0 to 4096 [ 183.577987][T17911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.578001][T17911] Call Trace: [ 183.578008][T17911] dump_stack_lvl+0xd6/0x122 [ 183.602561][T17911] dump_stack+0x11/0x1b [ 183.606702][T17911] should_fail+0x23c/0x250 [ 183.611129][T17911] should_fail_usercopy+0x16/0x20 [ 183.616158][T17911] strncpy_from_user+0x21/0x250 [ 183.621492][T17911] getname_flags+0xb8/0x3f0 [ 183.626229][T17911] getname+0x15/0x20 [ 183.630437][T17911] do_sys_openat2+0x6d/0x2b0 [ 183.635144][T17911] __x64_sys_openat+0xef/0x110 [ 183.640127][T17911] do_syscall_64+0x44/0xa0 [ 183.644590][T17911] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 183.651201][T17911] RIP: 0033:0x7fefe2cc57f4 [ 183.656233][T17911] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 183.677415][T17911] RSP: 002b:00007fefe0a89ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 183.686106][T17911] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2cc57f4 [ 183.694319][T17911] RDX: 0000000000000002 RSI: 00007fefe0a8a000 RDI: 00000000ffffff9c 16:53:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 183.702422][T17911] RBP: 00007fefe0a8a000 R08: 0000000000000000 R09: ffffffffffffffff [ 183.710583][T17911] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 183.718856][T17911] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:53:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 183.755583][T17902] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 183.771533][T17935] loop2: detected capacity change from 0 to 4096 [ 183.786411][T17902] EXT4-fs (loop1): get root inode failed [ 183.792280][T17902] EXT4-fs (loop1): mount failed 16:53:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 18) [ 183.800955][T17935] EXT4-fs (loop2): unsupported descriptor size 0 [ 183.829781][T17947] FAULT_INJECTION: forcing a failure. [ 183.829781][T17947] name failslab, interval 1, probability 0, space 0, times 0 [ 183.842905][T17947] CPU: 0 PID: 17947 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 183.851894][T17947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.862023][T17947] Call Trace: [ 183.865303][T17947] dump_stack_lvl+0xd6/0x122 [ 183.869981][T17947] dump_stack+0x11/0x1b [ 183.874145][T17947] should_fail+0x23c/0x250 [ 183.878681][T17947] ? __alloc_file+0x2e/0x1a0 [ 183.883589][T17947] __should_failslab+0x81/0x90 [ 183.888427][T17947] should_failslab+0x5/0x20 [ 183.893094][T17947] kmem_cache_alloc+0x4f/0x300 [ 183.897870][T17947] __alloc_file+0x2e/0x1a0 [ 183.902948][T17947] alloc_empty_file+0xcd/0x1c0 [ 183.907730][T17947] path_openat+0x6a/0x1ec0 [ 183.912513][T17947] ? copy_page_from_iter_atomic+0x44b/0xbb0 [ 183.918483][T17947] ? set_page_dirty+0xf4/0x1a0 [ 183.923239][T17947] ? shmem_write_end+0x37d/0x3d0 [ 183.928256][T17947] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 183.934812][T17947] ? generic_perform_write+0x377/0x3e0 [ 183.940493][T17947] do_filp_open+0x105/0x220 [ 183.945167][T17947] do_sys_openat2+0xb5/0x2b0 [ 183.949805][T17947] __x64_sys_openat+0xef/0x110 [ 183.954640][T17947] do_syscall_64+0x44/0xa0 [ 183.959380][T17947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 183.965586][T17947] RIP: 0033:0x7fefe2cc57f4 [ 183.969996][T17947] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 183.989963][T17947] RSP: 002b:00007fefe0a89ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 183.998463][T17947] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2cc57f4 [ 184.006436][T17947] RDX: 0000000000000002 RSI: 00007fefe0a8a000 RDI: 00000000ffffff9c [ 184.014565][T17947] RBP: 00007fefe0a8a000 R08: 0000000000000000 R09: ffffffffffffffff [ 184.022717][T17947] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 16:53:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 31) 16:53:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 19) [ 184.030781][T17947] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:53:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 184.099603][T17961] FAULT_INJECTION: forcing a failure. [ 184.099603][T17961] name failslab, interval 1, probability 0, space 0, times 0 [ 184.109442][T17969] FAULT_INJECTION: forcing a failure. [ 184.109442][T17969] name failslab, interval 1, probability 0, space 0, times 0 [ 184.112693][T17961] CPU: 0 PID: 17961 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 184.134419][T17961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.144770][T17961] Call Trace: [ 184.148046][T17961] dump_stack_lvl+0xd6/0x122 [ 184.152798][T17961] dump_stack+0x11/0x1b [ 184.156952][T17961] should_fail+0x23c/0x250 [ 184.161363][T17961] ? radix_tree_node_alloc+0x154/0x1f0 [ 184.166901][T17961] __should_failslab+0x81/0x90 [ 184.171717][T17961] should_failslab+0x5/0x20 [ 184.176311][T17961] kmem_cache_alloc+0x4f/0x300 [ 184.181084][T17961] ? __perf_event_task_sched_in+0x7e7/0x850 [ 184.186988][T17961] radix_tree_node_alloc+0x154/0x1f0 [ 184.192643][T17961] ? save_fpregs_to_fpstate+0xd8/0x110 [ 184.198189][T17961] idr_get_free+0x22a/0x5d0 [ 184.202864][T17961] ? try_to_wake_up+0x362/0x480 [ 184.207820][T17961] idr_alloc_cyclic+0xf4/0x2f0 [ 184.213107][T17961] __kernfs_new_node+0xb4/0x330 [ 184.218391][T17961] ? ___cache_free+0x3c/0x300 [ 184.223188][T17961] ? kfree+0xf8/0x1d0 [ 184.227247][T17961] kernfs_create_dir_ns+0x5e/0x140 [ 184.232448][T17961] internal_create_group+0x148/0x860 [ 184.237944][T17961] ? __invalidate_device+0xb0/0xc0 [ 184.243126][T17961] ? set_disk_ro+0x73/0x110 [ 184.247616][T17961] sysfs_create_group+0x1b/0x20 [ 184.252605][T17961] loop_configure+0xbcd/0xeb0 [ 184.257288][T17961] lo_ioctl+0x618/0x13e0 [ 184.261629][T17961] ? path_openat+0x18d4/0x1ec0 [ 184.266442][T17961] ? blkdev_common_ioctl+0x438/0x1110 [ 184.271815][T17961] ? selinux_file_ioctl+0x981/0xa10 [ 184.277082][T17961] ? lo_release+0x120/0x120 [ 184.281596][T17961] blkdev_ioctl+0x1d0/0x3f0 [ 184.286097][T17961] block_ioctl+0x6e/0x80 [ 184.290341][T17961] ? blkdev_iopoll+0x80/0x80 [ 184.295039][T17961] __se_sys_ioctl+0xcb/0x140 [ 184.299635][T17961] __x64_sys_ioctl+0x3f/0x50 [ 184.304280][T17961] do_syscall_64+0x44/0xa0 [ 184.308698][T17961] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 184.314708][T17961] RIP: 0033:0x7fd846a55697 [ 184.319132][T17961] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 184.339433][T17961] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 184.348031][T17961] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 184.356077][T17961] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 184.364048][T17961] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 184.372551][T17961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 184.380544][T17961] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 184.388685][T17969] CPU: 1 PID: 17969 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 184.397582][T17969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.408326][T17969] Call Trace: [ 184.411834][T17969] dump_stack_lvl+0xd6/0x122 [ 184.416582][T17969] dump_stack+0x11/0x1b [ 184.421245][T17969] should_fail+0x23c/0x250 [ 184.422387][T17961] loop1: detected capacity change from 0 to 4096 [ 184.425854][T17969] ? security_file_alloc+0x30/0x190 [ 184.425886][T17969] __should_failslab+0x81/0x90 [ 184.442411][T17969] should_failslab+0x5/0x20 [ 184.446930][T17969] kmem_cache_alloc+0x4f/0x300 [ 184.451682][T17969] security_file_alloc+0x30/0x190 [ 184.456782][T17969] __alloc_file+0x83/0x1a0 [ 184.461358][T17969] alloc_empty_file+0xcd/0x1c0 [ 184.466125][T17969] path_openat+0x6a/0x1ec0 [ 184.470785][T17969] ? copy_page_from_iter_atomic+0x44b/0xbb0 [ 184.476718][T17969] ? set_page_dirty+0xf4/0x1a0 [ 184.481478][T17969] ? shmem_write_end+0x37d/0x3d0 [ 184.487124][T17969] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 184.493398][T17969] ? generic_perform_write+0x377/0x3e0 [ 184.498933][T17969] do_filp_open+0x105/0x220 [ 184.503460][T17969] do_sys_openat2+0xb5/0x2b0 [ 184.508120][T17969] __x64_sys_openat+0xef/0x110 [ 184.512924][T17969] do_syscall_64+0x44/0xa0 [ 184.517486][T17969] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 184.523945][T17969] RIP: 0033:0x7fefe2cc57f4 [ 184.528850][T17969] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 184.549229][T17969] RSP: 002b:00007fefe0a89ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 184.557702][T17969] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2cc57f4 [ 184.566435][T17969] RDX: 0000000000000002 RSI: 00007fefe0a8a000 RDI: 00000000ffffff9c [ 184.574558][T17969] RBP: 00007fefe0a8a000 R08: 0000000000000000 R09: ffffffffffffffff [ 184.582596][T17969] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 184.590646][T17969] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:53:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 184.602855][T17971] loop2: detected capacity change from 0 to 4096 [ 184.615917][T17961] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 184.633616][T17961] EXT4-fs (loop1): get root inode failed [ 184.640284][T17961] EXT4-fs (loop1): mount failed 16:53:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 32) 16:53:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) [ 184.664189][T17971] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 16:53:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 20) 16:53:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) [ 184.716458][T17995] FAULT_INJECTION: forcing a failure. [ 184.716458][T17995] name failslab, interval 1, probability 0, space 0, times 0 [ 184.730031][T17995] CPU: 0 PID: 17995 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 184.738848][T17995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.749254][T17995] Call Trace: [ 184.752547][T17995] dump_stack_lvl+0xd6/0x122 [ 184.757334][T17995] dump_stack+0x11/0x1b [ 184.761498][T17995] should_fail+0x23c/0x250 [ 184.765932][T17995] ? __kernfs_new_node+0x6a/0x330 [ 184.770987][T17995] __should_failslab+0x81/0x90 [ 184.772963][T18004] FAULT_INJECTION: forcing a failure. [ 184.772963][T18004] name failslab, interval 1, probability 0, space 0, times 0 [ 184.775757][T17995] should_failslab+0x5/0x20 [ 184.793314][T17995] kmem_cache_alloc+0x4f/0x300 [ 184.798097][T17995] ? __down_write_common+0x42/0x830 [ 184.803378][T17995] __kernfs_new_node+0x6a/0x330 [ 184.808305][T17995] ? up_write+0x25/0xc0 [ 184.812543][T17995] kernfs_new_node+0x5b/0xd0 [ 184.817329][T17995] __kernfs_create_file+0x45/0x1a0 [ 184.822607][T17995] sysfs_add_file_mode_ns+0x1c1/0x250 [ 184.828139][T17995] internal_create_group+0x2f4/0x860 [ 184.833426][T17995] ? set_disk_ro+0x73/0x110 [ 184.837978][T17995] sysfs_create_group+0x1b/0x20 [ 184.842936][T17995] loop_configure+0xbcd/0xeb0 [ 184.847605][T17995] lo_ioctl+0x618/0x13e0 [ 184.852102][T17995] ? path_openat+0x18d4/0x1ec0 [ 184.856958][T17995] ? blkdev_common_ioctl+0x438/0x1110 [ 184.862446][T17995] ? selinux_file_ioctl+0x981/0xa10 [ 184.867908][T17995] ? lo_release+0x120/0x120 [ 184.872598][T17995] blkdev_ioctl+0x1d0/0x3f0 [ 184.877114][T17995] block_ioctl+0x6e/0x80 [ 184.881480][T17995] ? blkdev_iopoll+0x80/0x80 [ 184.886056][T17995] __se_sys_ioctl+0xcb/0x140 [ 184.890655][T17995] __x64_sys_ioctl+0x3f/0x50 [ 184.895589][T17995] do_syscall_64+0x44/0xa0 [ 184.900813][T17995] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 184.907055][T17995] RIP: 0033:0x7fd846a55697 [ 184.911491][T17995] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 184.932408][T17995] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 184.941294][T17995] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 184.949477][T17995] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 184.958175][T17995] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 184.966484][T17995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 184.974870][T17995] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 184.983098][T18004] CPU: 1 PID: 18004 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 184.991886][T18004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.002031][T18004] Call Trace: [ 185.005352][T18004] dump_stack_lvl+0xd6/0x122 [ 185.010036][T18004] dump_stack+0x11/0x1b 16:53:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 185.014201][T18004] should_fail+0x23c/0x250 [ 185.019146][T18004] ? kzalloc+0x16/0x20 [ 185.023477][T18004] __should_failslab+0x81/0x90 [ 185.028662][T18004] should_failslab+0x5/0x20 [ 185.030951][T17995] loop1: detected capacity change from 0 to 4096 [ 185.033443][T18004] __kmalloc+0x6f/0x350 [ 185.044904][T18004] ? _atomic_dec_and_lock+0x60/0xd0 [ 185.050290][T18004] kzalloc+0x16/0x20 [ 185.054210][T18004] alloc_workqueue+0x12f/0xad0 [ 185.059350][T18004] ? disk_unblock_events+0x35/0x40 16:53:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 185.065036][T18004] ? bd_prepare_to_claim+0x1e6/0x270 [ 185.070346][T18004] ? loop_attr_do_show_dio+0x70/0x70 [ 185.075696][T18004] ? loop_set_status_from_info+0x35e/0x3a0 [ 185.081533][T18004] loop_configure+0x681/0xeb0 [ 185.086241][T18004] lo_ioctl+0x618/0x13e0 [ 185.090565][T18004] ? path_openat+0x18d4/0x1ec0 [ 185.095375][T18004] ? blkdev_common_ioctl+0x438/0x1110 [ 185.101092][T18004] ? selinux_file_ioctl+0x981/0xa10 [ 185.106305][T18004] ? lo_release+0x120/0x120 [ 185.110882][T18004] blkdev_ioctl+0x1d0/0x3f0 16:53:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 185.115386][T18004] block_ioctl+0x6e/0x80 [ 185.119750][T18004] ? blkdev_iopoll+0x80/0x80 [ 185.124351][T18004] __se_sys_ioctl+0xcb/0x140 [ 185.128953][T18004] __x64_sys_ioctl+0x3f/0x50 [ 185.133763][T18004] do_syscall_64+0x44/0xa0 [ 185.138221][T18004] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 185.144990][T18004] RIP: 0033:0x7fefe2d12697 [ 185.149667][T18004] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 185.170363][T18004] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 185.179443][T18004] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 185.187700][T18004] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 185.196041][T18004] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 185.204011][T18004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 185.211969][T18004] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 185.232063][T17995] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 185.242668][T18027] loop2: detected capacity change from 0 to 4096 [ 185.254073][T18027] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 16:53:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 185.273418][T17995] EXT4-fs (loop1): get root inode failed [ 185.279223][T17995] EXT4-fs (loop1): mount failed [ 185.330642][T18040] loop2: detected capacity change from 0 to 4096 [ 185.340746][T18040] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 16:53:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 21) 16:53:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 33) 16:53:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 185.532080][T18056] FAULT_INJECTION: forcing a failure. [ 185.532080][T18056] name failslab, interval 1, probability 0, space 0, times 0 [ 185.545370][T18056] CPU: 0 PID: 18056 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 185.549864][T18060] loop2: detected capacity change from 0 to 4096 [ 185.554623][T18056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.554643][T18056] Call Trace: [ 185.554650][T18056] dump_stack_lvl+0xd6/0x122 [ 185.579572][T18056] dump_stack+0x11/0x1b [ 185.583732][T18056] should_fail+0x23c/0x250 [ 185.588226][T18056] __should_failslab+0x81/0x90 [ 185.592995][T18056] ? alloc_workqueue+0x15d/0xad0 [ 185.597951][T18056] should_failslab+0x5/0x20 [ 185.602549][T18056] kmem_cache_alloc_trace+0x52/0x320 [ 185.607839][T18056] alloc_workqueue+0x15d/0xad0 [ 185.612706][T18056] ? disk_unblock_events+0x35/0x40 [ 185.618147][T18056] ? bd_prepare_to_claim+0x1e6/0x270 [ 185.623728][T18056] ? loop_attr_do_show_dio+0x70/0x70 [ 185.629826][T18056] ? loop_set_status_from_info+0x35e/0x3a0 [ 185.635987][T18056] loop_configure+0x681/0xeb0 [ 185.640882][T18056] lo_ioctl+0x618/0x13e0 [ 185.649713][T18056] ? path_openat+0x18d4/0x1ec0 [ 185.655162][T18056] ? blkdev_common_ioctl+0x438/0x1110 [ 185.660628][T18056] ? selinux_file_ioctl+0x981/0xa10 [ 185.666094][T18056] ? lo_release+0x120/0x120 [ 185.670601][T18056] blkdev_ioctl+0x1d0/0x3f0 [ 185.675093][T18056] block_ioctl+0x6e/0x80 [ 185.679345][T18056] ? blkdev_iopoll+0x80/0x80 [ 185.684016][T18056] __se_sys_ioctl+0xcb/0x140 [ 185.689411][T18056] __x64_sys_ioctl+0x3f/0x50 [ 185.694594][T18056] do_syscall_64+0x44/0xa0 [ 185.699060][T18056] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 185.705515][T18056] RIP: 0033:0x7fefe2d12697 [ 185.710093][T18056] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 185.730280][T18056] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 185.738968][T18056] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 185.747143][T18056] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 185.755201][T18056] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 185.768107][T18056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 16:53:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 185.776245][T18056] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 185.794492][T18061] FAULT_INJECTION: forcing a failure. [ 185.794492][T18061] name failslab, interval 1, probability 0, space 0, times 0 [ 185.807155][T18061] CPU: 0 PID: 18061 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0 [ 185.816158][T18061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.826556][T18061] Call Trace: 16:53:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 22) 16:53:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 185.829864][T18061] dump_stack_lvl+0xd6/0x122 [ 185.834465][T18061] dump_stack+0x11/0x1b [ 185.835648][T18060] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 185.838730][T18061] should_fail+0x23c/0x250 [ 185.838753][T18061] ? __kernfs_new_node+0x6a/0x330 [ 185.855472][T18061] __should_failslab+0x81/0x90 [ 185.860238][T18061] should_failslab+0x5/0x20 [ 185.865623][T18061] kmem_cache_alloc+0x4f/0x300 [ 185.870607][T18061] ? __down_write_common+0x42/0x830 [ 185.875815][T18061] __kernfs_new_node+0x6a/0x330 16:53:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 185.881051][T18061] ? up_write+0x25/0xc0 [ 185.885272][T18061] kernfs_new_node+0x5b/0xd0 [ 185.889944][T18061] __kernfs_create_file+0x45/0x1a0 [ 185.895410][T18061] sysfs_add_file_mode_ns+0x1c1/0x250 [ 185.901742][T18061] internal_create_group+0x2f4/0x860 [ 185.907108][T18061] ? set_disk_ro+0x73/0x110 [ 185.911774][T18061] sysfs_create_group+0x1b/0x20 [ 185.917094][T18061] loop_configure+0xbcd/0xeb0 [ 185.921800][T18061] lo_ioctl+0x618/0x13e0 [ 185.925341][T18082] FAULT_INJECTION: forcing a failure. [ 185.925341][T18082] name failslab, interval 1, probability 0, space 0, times 0 [ 185.926628][T18061] ? path_openat+0x18d4/0x1ec0 [ 185.926660][T18061] ? blkdev_common_ioctl+0x438/0x1110 [ 185.926678][T18061] ? selinux_file_ioctl+0x981/0xa10 [ 185.955447][T18061] ? lo_release+0x120/0x120 [ 185.960155][T18061] blkdev_ioctl+0x1d0/0x3f0 [ 185.964642][T18061] block_ioctl+0x6e/0x80 [ 185.968960][T18061] ? blkdev_iopoll+0x80/0x80 [ 185.973528][T18061] __se_sys_ioctl+0xcb/0x140 [ 185.978108][T18061] __x64_sys_ioctl+0x3f/0x50 [ 185.982681][T18061] do_syscall_64+0x44/0xa0 [ 185.987092][T18061] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 185.992984][T18061] RIP: 0033:0x7fd846a55697 [ 185.997393][T18061] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 186.017267][T18061] RSP: 002b:00007fd8447ccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 186.025658][T18061] RAX: ffffffffffffffda RBX: 00007fd846a9fcc0 RCX: 00007fd846a55697 [ 186.033615][T18061] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 186.043193][T18061] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 186.051279][T18061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 186.059339][T18061] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 186.068350][T18082] CPU: 1 PID: 18082 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 186.074443][T18061] loop1: detected capacity change from 0 to 4096 [ 186.077254][T18082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.077266][T18082] Call Trace: [ 186.077273][T18082] dump_stack_lvl+0xd6/0x122 [ 186.077297][T18082] dump_stack+0x11/0x1b [ 186.107647][T18082] should_fail+0x23c/0x250 [ 186.112149][T18082] ? kzalloc+0x16/0x20 [ 186.116519][T18082] __should_failslab+0x81/0x90 [ 186.121548][T18082] should_failslab+0x5/0x20 [ 186.127212][T18082] __kmalloc+0x6f/0x350 [ 186.131481][T18082] ? number+0xa13/0xb60 [ 186.135741][T18082] kzalloc+0x16/0x20 [ 186.139721][T18082] apply_wqattrs_prepare+0x3a/0x630 [ 186.144926][T18082] ? vsnprintf+0xe8f/0xed0 [ 186.149604][T18082] apply_workqueue_attrs+0x9e/0x100 [ 186.154830][T18082] alloc_workqueue+0x777/0xad0 [ 186.159621][T18082] ? disk_unblock_events+0x35/0x40 [ 186.165781][T18082] ? bd_prepare_to_claim+0x1e6/0x270 [ 186.171309][T18082] ? loop_attr_do_show_dio+0x70/0x70 [ 186.176751][T18082] ? loop_set_status_from_info+0x35e/0x3a0 [ 186.182773][T18082] loop_configure+0x681/0xeb0 [ 186.187966][T18082] lo_ioctl+0x618/0x13e0 [ 186.192299][T18082] ? path_openat+0x18d4/0x1ec0 [ 186.197089][T18082] ? blkdev_common_ioctl+0x438/0x1110 [ 186.202626][T18082] ? selinux_file_ioctl+0x981/0xa10 [ 186.208325][T18082] ? lo_release+0x120/0x120 [ 186.212811][T18082] blkdev_ioctl+0x1d0/0x3f0 [ 186.217298][T18082] block_ioctl+0x6e/0x80 [ 186.222044][T18082] ? blkdev_iopoll+0x80/0x80 [ 186.226727][T18082] __se_sys_ioctl+0xcb/0x140 [ 186.231335][T18082] __x64_sys_ioctl+0x3f/0x50 [ 186.236020][T18082] do_syscall_64+0x44/0xa0 [ 186.240451][T18082] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 186.246362][T18082] RIP: 0033:0x7fefe2d12697 [ 186.250867][T18082] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 186.270918][T18082] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 186.279728][T18082] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 186.288953][T18082] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 186.297024][T18082] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 186.305065][T18082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 186.313308][T18082] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:53:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 23) 16:53:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 186.346966][T18061] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 186.396074][T18099] FAULT_INJECTION: forcing a failure. [ 186.396074][T18099] name failslab, interval 1, probability 0, space 0, times 0 [ 186.399018][T18061] EXT4-fs (loop1): get root inode failed [ 186.408907][T18099] CPU: 0 PID: 18099 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 186.414800][T18061] EXT4-fs (loop1): mount failed [ 186.424188][T18099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.424203][T18099] Call Trace: 16:53:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 186.424210][T18099] dump_stack_lvl+0xd6/0x122 [ 186.424235][T18099] dump_stack+0x11/0x1b [ 186.451712][T18099] should_fail+0x23c/0x250 [ 186.456576][T18099] __should_failslab+0x81/0x90 [ 186.461785][T18099] ? apply_wqattrs_prepare+0x5f/0x630 [ 186.467290][T18099] should_failslab+0x5/0x20 [ 186.472383][T18099] kmem_cache_alloc_trace+0x52/0x320 [ 186.478076][T18099] apply_wqattrs_prepare+0x5f/0x630 [ 186.484274][T18099] ? vsnprintf+0xe8f/0xed0 [ 186.488695][T18099] apply_workqueue_attrs+0x9e/0x100 [ 186.494329][T18099] alloc_workqueue+0x777/0xad0 [ 186.499516][T18099] ? bd_prepare_to_claim+0x1e6/0x270 [ 186.505036][T18099] ? loop_attr_do_show_dio+0x70/0x70 [ 186.510339][T18099] ? loop_set_status_from_info+0x35e/0x3a0 [ 186.516256][T18099] loop_configure+0x681/0xeb0 [ 186.520929][T18099] lo_ioctl+0x618/0x13e0 [ 186.525696][T18099] ? path_openat+0x18d4/0x1ec0 [ 186.530803][T18099] ? blkdev_common_ioctl+0x438/0x1110 [ 186.536218][T18099] ? selinux_file_ioctl+0x981/0xa10 [ 186.541518][T18099] ? lo_release+0x120/0x120 [ 186.546190][T18099] blkdev_ioctl+0x1d0/0x3f0 [ 186.551288][T18099] block_ioctl+0x6e/0x80 [ 186.555521][T18099] ? blkdev_iopoll+0x80/0x80 [ 186.560289][T18099] __se_sys_ioctl+0xcb/0x140 [ 186.564921][T18099] __x64_sys_ioctl+0x3f/0x50 [ 186.569980][T18099] do_syscall_64+0x44/0xa0 [ 186.574523][T18099] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 186.580658][T18099] RIP: 0033:0x7fefe2d12697 [ 186.585415][T18099] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 186.606272][T18099] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 186.614952][T18099] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 186.623942][T18099] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 186.633679][T18099] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 16:53:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 24) [ 186.641761][T18099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 186.650044][T18099] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 186.665816][T18113] loop2: detected capacity change from 0 to 4096 [ 186.679504][T18113] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 186.720787][T18130] FAULT_INJECTION: forcing a failure. [ 186.720787][T18130] name failslab, interval 1, probability 0, space 0, times 0 [ 186.733974][T18130] CPU: 0 PID: 18130 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 186.743022][T18130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.753085][T18130] Call Trace: [ 186.756914][T18130] dump_stack_lvl+0xd6/0x122 [ 186.762150][T18130] dump_stack+0x11/0x1b [ 186.767199][T18130] should_fail+0x23c/0x250 [ 186.771912][T18130] __should_failslab+0x81/0x90 [ 186.776963][T18130] ? apply_wqattrs_prepare+0xbe/0x630 [ 186.782369][T18130] should_failslab+0x5/0x20 [ 186.787161][T18130] kmem_cache_alloc_trace+0x52/0x320 [ 186.792635][T18130] apply_wqattrs_prepare+0xbe/0x630 [ 186.797957][T18130] ? vsnprintf+0xe8f/0xed0 [ 186.802378][T18130] apply_workqueue_attrs+0x9e/0x100 [ 186.807664][T18130] alloc_workqueue+0x777/0xad0 [ 186.812531][T18130] ? disk_unblock_events+0x35/0x40 16:53:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, 0x0, 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 186.817907][T18130] ? bd_prepare_to_claim+0x1e6/0x270 [ 186.823283][T18130] ? loop_attr_do_show_dio+0x70/0x70 [ 186.829024][T18130] ? loop_set_status_from_info+0x35e/0x3a0 [ 186.835140][T18130] loop_configure+0x681/0xeb0 [ 186.839922][T18130] lo_ioctl+0x618/0x13e0 [ 186.844166][T18130] ? path_openat+0x18d4/0x1ec0 [ 186.849093][T18130] ? blkdev_common_ioctl+0x438/0x1110 [ 186.854855][T18130] ? selinux_file_ioctl+0x981/0xa10 [ 186.860405][T18130] ? lo_release+0x120/0x120 [ 186.864948][T18130] blkdev_ioctl+0x1d0/0x3f0 [ 186.869569][T18130] block_ioctl+0x6e/0x80 [ 186.873910][T18130] ? blkdev_iopoll+0x80/0x80 [ 186.878619][T18130] __se_sys_ioctl+0xcb/0x140 [ 186.883412][T18130] __x64_sys_ioctl+0x3f/0x50 [ 186.888337][T18130] do_syscall_64+0x44/0xa0 [ 186.892871][T18130] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 186.899233][T18130] RIP: 0033:0x7fefe2d12697 16:53:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, 0x0, 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 186.903976][T18130] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 186.926015][T18130] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 186.934438][T18130] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 186.943031][T18130] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 186.951191][T18130] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 186.960326][T18130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 186.968494][T18130] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:53:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 25) [ 187.028550][T18153] loop1: detected capacity change from 0 to 4096 [ 187.034800][T18159] FAULT_INJECTION: forcing a failure. [ 187.034800][T18159] name failslab, interval 1, probability 0, space 0, times 0 [ 187.048093][T18159] CPU: 0 PID: 18159 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 187.056912][T18159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.067355][T18159] Call Trace: [ 187.070975][T18159] dump_stack_lvl+0xd6/0x122 [ 187.076471][T18159] dump_stack+0x11/0x1b [ 187.080640][T18159] should_fail+0x23c/0x250 [ 187.085154][T18159] __should_failslab+0x81/0x90 [ 187.090015][T18159] should_failslab+0x5/0x20 [ 187.094523][T18159] kmem_cache_alloc_node+0x61/0x2c0 [ 187.099909][T18159] ? alloc_unbound_pwq+0x3e6/0x780 [ 187.105692][T18159] alloc_unbound_pwq+0x3e6/0x780 [ 187.110651][T18159] apply_wqattrs_prepare+0x1ed/0x630 [ 187.116052][T18159] ? vsnprintf+0xe8f/0xed0 [ 187.120919][T18159] apply_workqueue_attrs+0x9e/0x100 [ 187.126732][T18159] alloc_workqueue+0x777/0xad0 [ 187.131498][T18159] ? disk_unblock_events+0x35/0x40 [ 187.136722][T18159] ? bd_prepare_to_claim+0x1e6/0x270 [ 187.142091][T18159] ? loop_attr_do_show_dio+0x70/0x70 [ 187.147392][T18159] ? loop_set_status_from_info+0x35e/0x3a0 [ 187.153311][T18159] loop_configure+0x681/0xeb0 [ 187.158188][T18159] lo_ioctl+0x618/0x13e0 [ 187.163069][T18159] ? path_openat+0x18d4/0x1ec0 [ 187.167990][T18159] ? blkdev_common_ioctl+0x438/0x1110 [ 187.173530][T18159] ? selinux_file_ioctl+0x981/0xa10 [ 187.178821][T18159] ? lo_release+0x120/0x120 [ 187.183469][T18159] blkdev_ioctl+0x1d0/0x3f0 [ 187.187966][T18159] block_ioctl+0x6e/0x80 [ 187.192819][T18159] ? blkdev_iopoll+0x80/0x80 [ 187.197417][T18159] __se_sys_ioctl+0xcb/0x140 [ 187.202046][T18159] __x64_sys_ioctl+0x3f/0x50 [ 187.206630][T18159] do_syscall_64+0x44/0xa0 [ 187.211042][T18159] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 187.217141][T18159] RIP: 0033:0x7fefe2d12697 [ 187.221626][T18159] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 187.241755][T18159] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 187.250591][T18159] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 187.258615][T18159] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 187.266846][T18159] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 16:53:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 187.274972][T18159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 187.283037][T18159] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 187.294845][T18153] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 187.296919][T18157] loop2: detected capacity change from 0 to 4096 16:53:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, 0x0, 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 187.333369][T18153] EXT4-fs (loop1): get root inode failed [ 187.339244][T18153] EXT4-fs (loop1): mount failed 16:53:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 26) [ 187.389543][T18157] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 187.407775][T18183] FAULT_INJECTION: forcing a failure. [ 187.407775][T18183] name failslab, interval 1, probability 0, space 0, times 0 [ 187.414247][T18185] loop1: detected capacity change from 0 to 4096 [ 187.420815][T18183] CPU: 0 PID: 18183 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 187.436123][T18183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.446427][T18183] Call Trace: [ 187.451326][T18183] dump_stack_lvl+0xd6/0x122 [ 187.456372][T18183] dump_stack+0x11/0x1b [ 187.460778][T18183] should_fail+0x23c/0x250 [ 187.465241][T18183] __should_failslab+0x81/0x90 [ 187.470087][T18183] ? kobject_uevent_env+0x1a7/0xc40 [ 187.475374][T18183] should_failslab+0x5/0x20 [ 187.480033][T18183] kmem_cache_alloc_trace+0x52/0x320 [ 187.485529][T18183] ? pwq_adjust_max_active+0x491/0x4b0 [ 187.491178][T18183] ? dev_uevent_filter+0x70/0x70 [ 187.496482][T18183] kobject_uevent_env+0x1a7/0xc40 [ 187.501690][T18183] ? __list_add_valid+0x28/0x90 [ 187.506752][T18183] ? alloc_workqueue+0xa18/0xad0 [ 187.511677][T18183] disk_force_media_change+0xe3/0x170 [ 187.517272][T18183] loop_configure+0x6c0/0xeb0 [ 187.522552][T18183] lo_ioctl+0x618/0x13e0 [ 187.527171][T18183] ? path_openat+0x18d4/0x1ec0 [ 187.531943][T18183] ? blkdev_common_ioctl+0x438/0x1110 [ 187.537310][T18183] ? selinux_file_ioctl+0x981/0xa10 [ 187.542772][T18183] ? lo_release+0x120/0x120 [ 187.547441][T18183] blkdev_ioctl+0x1d0/0x3f0 [ 187.552075][T18183] block_ioctl+0x6e/0x80 [ 187.556309][T18183] ? blkdev_iopoll+0x80/0x80 [ 187.560965][T18183] __se_sys_ioctl+0xcb/0x140 [ 187.565758][T18183] __x64_sys_ioctl+0x3f/0x50 [ 187.570353][T18183] do_syscall_64+0x44/0xa0 [ 187.574848][T18183] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 187.581053][T18183] RIP: 0033:0x7fefe2d12697 [ 187.585562][T18183] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 187.606145][T18183] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 187.614822][T18183] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 187.623492][T18183] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 187.631620][T18183] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 187.639658][T18183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 187.648053][T18183] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 187.660262][T18183] loop4: detected capacity change from 0 to 4096 [ 187.665537][T18185] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 187.682464][T18185] EXT4-fs (loop1): get root inode failed 16:53:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 27) [ 187.688204][T18185] EXT4-fs (loop1): mount failed [ 187.700559][T18183] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:53:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280), 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 187.745015][T18207] loop2: detected capacity change from 0 to 4096 [ 187.752872][T18207] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 187.763416][T18185] loop1: detected capacity change from 0 to 4096 [ 187.779076][T18218] FAULT_INJECTION: forcing a failure. [ 187.779076][T18218] name failslab, interval 1, probability 0, space 0, times 0 [ 187.792256][T18218] CPU: 1 PID: 18218 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 187.801418][T18218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.811620][T18218] Call Trace: [ 187.815489][T18218] dump_stack_lvl+0xd6/0x122 [ 187.820354][T18218] dump_stack+0x11/0x1b [ 187.823302][T18185] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 187.824718][T18218] should_fail+0x23c/0x250 [ 187.837652][T18185] EXT4-fs (loop1): get root inode failed [ 187.841603][T18218] ? kzalloc+0x1d/0x30 [ 187.841629][T18218] __should_failslab+0x81/0x90 [ 187.847326][T18185] EXT4-fs (loop1): mount failed [ 187.851426][T18218] should_failslab+0x5/0x20 [ 187.865843][T18218] __kmalloc+0x6f/0x350 [ 187.870226][T18218] kzalloc+0x1d/0x30 [ 187.874269][T18218] kobject_get_path+0x7c/0x110 [ 187.879155][T18218] kobject_uevent_env+0x1be/0xc40 [ 187.884591][T18218] ? __list_add_valid+0x28/0x90 [ 187.889545][T18218] ? alloc_workqueue+0xa18/0xad0 [ 187.894526][T18218] disk_force_media_change+0xe3/0x170 [ 187.900006][T18218] loop_configure+0x6c0/0xeb0 [ 187.904945][T18218] lo_ioctl+0x618/0x13e0 [ 187.909303][T18218] ? path_openat+0x18d4/0x1ec0 [ 187.914140][T18218] ? blkdev_common_ioctl+0x438/0x1110 [ 187.919939][T18218] ? selinux_file_ioctl+0x981/0xa10 [ 187.925414][T18218] ? lo_release+0x120/0x120 [ 187.929908][T18218] blkdev_ioctl+0x1d0/0x3f0 [ 187.934416][T18218] block_ioctl+0x6e/0x80 [ 187.938665][T18218] ? blkdev_iopoll+0x80/0x80 16:53:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280), 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 187.943323][T18218] __se_sys_ioctl+0xcb/0x140 [ 187.950427][T18218] __x64_sys_ioctl+0x3f/0x50 [ 187.955138][T18218] do_syscall_64+0x44/0xa0 [ 187.959627][T18218] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 187.965961][T18218] RIP: 0033:0x7fefe2d12697 [ 187.971095][T18218] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 187.991806][T18218] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 188.000462][T18218] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 188.008530][T18218] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 188.017185][T18218] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 188.025197][T18218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 188.033236][T18218] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:53:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 28) [ 188.045094][T18218] loop4: detected capacity change from 0 to 4096 [ 188.058158][T18234] loop2: detected capacity change from 0 to 4096 [ 188.066534][T18218] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 188.079908][T18234] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 188.126308][T18244] loop1: detected capacity change from 0 to 4096 [ 188.153782][T18244] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 188.159496][T18256] FAULT_INJECTION: forcing a failure. [ 188.159496][T18256] name failslab, interval 1, probability 0, space 0, times 0 [ 188.172942][T18244] EXT4-fs (loop1): get root inode failed [ 188.179722][T18256] CPU: 0 PID: 18256 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 188.185351][T18244] EXT4-fs (loop1): mount failed [ 188.194173][T18256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.194185][T18256] Call Trace: [ 188.194191][T18256] dump_stack_lvl+0xd6/0x122 [ 188.217225][T18256] dump_stack+0x11/0x1b [ 188.221482][T18256] should_fail+0x23c/0x250 16:53:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280), 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 188.226011][T18256] __should_failslab+0x81/0x90 [ 188.230960][T18256] should_failslab+0x5/0x20 [ 188.235640][T18256] kmem_cache_alloc_node+0x61/0x2c0 [ 188.240938][T18256] ? __alloc_skb+0xed/0x420 [ 188.245536][T18256] __alloc_skb+0xed/0x420 [ 188.249983][T18256] alloc_uevent_skb+0x5b/0x120 [ 188.255052][T18256] kobject_uevent_env+0x863/0xc40 [ 188.260085][T18256] disk_force_media_change+0xe3/0x170 [ 188.266220][T18256] loop_configure+0x6c0/0xeb0 [ 188.271431][T18256] lo_ioctl+0x618/0x13e0 [ 188.275751][T18256] ? path_openat+0x18d4/0x1ec0 [ 188.280958][T18256] ? blkdev_common_ioctl+0x438/0x1110 [ 188.286420][T18256] ? selinux_file_ioctl+0x981/0xa10 [ 188.291835][T18256] ? lo_release+0x120/0x120 [ 188.296326][T18256] blkdev_ioctl+0x1d0/0x3f0 [ 188.300924][T18256] block_ioctl+0x6e/0x80 [ 188.305326][T18256] ? blkdev_iopoll+0x80/0x80 [ 188.310778][T18256] __se_sys_ioctl+0xcb/0x140 [ 188.315710][T18256] __x64_sys_ioctl+0x3f/0x50 [ 188.320615][T18256] do_syscall_64+0x44/0xa0 [ 188.325285][T18256] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 188.331449][T18256] RIP: 0033:0x7fefe2d12697 [ 188.336167][T18256] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 188.356921][T18256] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 188.365899][T18256] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 16:53:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{0x0}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 188.373916][T18256] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 188.381886][T18256] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 188.390143][T18256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 188.398303][T18256] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 188.413505][T18256] loop4: detected capacity change from 0 to 4096 [ 188.420203][T18264] loop2: detected capacity change from 0 to 4096 16:53:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 188.431756][T18264] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 188.447331][T18256] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 188.467733][T18244] loop1: detected capacity change from 0 to 4096 16:53:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 29) 16:53:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 188.477256][T18286] loop2: detected capacity change from 0 to 4096 [ 188.493635][T18244] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 188.498365][T18286] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 188.517857][T18244] EXT4-fs (loop1): get root inode failed [ 188.523532][T18244] EXT4-fs (loop1): mount failed 16:53:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{0x0}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 188.564509][T18298] FAULT_INJECTION: forcing a failure. [ 188.564509][T18298] name failslab, interval 1, probability 0, space 0, times 0 [ 188.577792][T18298] CPU: 0 PID: 18298 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 188.586632][T18298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.596726][T18298] Call Trace: [ 188.600091][T18298] dump_stack_lvl+0xd6/0x122 [ 188.604686][T18298] dump_stack+0x11/0x1b [ 188.608900][T18298] should_fail+0x23c/0x250 [ 188.613295][T18298] __should_failslab+0x81/0x90 [ 188.618280][T18298] should_failslab+0x5/0x20 [ 188.622856][T18298] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 188.628731][T18298] ? __kmalloc_node_track_caller+0x30/0x40 [ 188.634827][T18298] __kmalloc_node_track_caller+0x30/0x40 [ 188.640567][T18298] ? alloc_uevent_skb+0x5b/0x120 [ 188.645508][T18298] __alloc_skb+0x187/0x420 [ 188.650105][T18298] alloc_uevent_skb+0x5b/0x120 [ 188.655004][T18298] kobject_uevent_env+0x863/0xc40 [ 188.660048][T18298] disk_force_media_change+0xe3/0x170 [ 188.665859][T18298] loop_configure+0x6c0/0xeb0 [ 188.670555][T18298] lo_ioctl+0x618/0x13e0 [ 188.674944][T18298] ? path_openat+0x18d4/0x1ec0 [ 188.679771][T18298] ? blkdev_common_ioctl+0x438/0x1110 [ 188.685337][T18298] ? selinux_file_ioctl+0x981/0xa10 [ 188.690603][T18298] ? lo_release+0x120/0x120 [ 188.695198][T18298] blkdev_ioctl+0x1d0/0x3f0 [ 188.699700][T18298] block_ioctl+0x6e/0x80 [ 188.703927][T18298] ? blkdev_iopoll+0x80/0x80 [ 188.708509][T18298] __se_sys_ioctl+0xcb/0x140 16:53:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{0x0}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 188.713088][T18298] __x64_sys_ioctl+0x3f/0x50 [ 188.717666][T18298] do_syscall_64+0x44/0xa0 [ 188.722234][T18298] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 188.728242][T18298] RIP: 0033:0x7fefe2d12697 [ 188.732679][T18298] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 188.752554][T18298] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 188.760950][T18298] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 188.768909][T18298] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 188.777279][T18298] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 188.785242][T18298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 188.793313][T18298] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 188.806673][T18298] loop4: detected capacity change from 0 to 4096 [ 188.806734][T18307] loop1: detected capacity change from 0 to 4096 [ 188.821010][T18310] loop2: detected capacity change from 0 to 4096 [ 188.847626][T18310] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 16:53:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 30) [ 188.849353][T18307] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 188.866922][T18298] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 188.896764][T18307] EXT4-fs (loop1): get root inode failed [ 188.902622][T18307] EXT4-fs (loop1): mount failed [ 188.949399][T18307] loop1: detected capacity change from 0 to 4096 [ 188.956779][T18338] FAULT_INJECTION: forcing a failure. [ 188.956779][T18338] name failslab, interval 1, probability 0, space 0, times 0 [ 188.970124][T18338] CPU: 1 PID: 18338 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 188.979131][T18338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.989481][T18338] Call Trace: [ 188.992946][T18338] dump_stack_lvl+0xd6/0x122 [ 188.997712][T18338] dump_stack+0x11/0x1b [ 189.001875][T18338] should_fail+0x23c/0x250 [ 189.006739][T18338] ? skb_clone+0x12c/0x1f0 [ 189.011141][T18338] __should_failslab+0x81/0x90 [ 189.017689][T18338] should_failslab+0x5/0x20 [ 189.022453][T18338] kmem_cache_alloc+0x4f/0x300 [ 189.027454][T18338] skb_clone+0x12c/0x1f0 [ 189.032475][T18338] netlink_broadcast_filtered+0x4fd/0xb60 [ 189.038358][T18338] ? skb_put+0xb9/0xf0 [ 189.042485][T18338] netlink_broadcast+0x35/0x50 [ 189.047333][T18338] kobject_uevent_env+0x8c9/0xc40 [ 189.052461][T18338] disk_force_media_change+0xe3/0x170 [ 189.057839][T18338] loop_configure+0x6c0/0xeb0 [ 189.062509][T18338] lo_ioctl+0x618/0x13e0 [ 189.066912][T18338] ? path_openat+0x18d4/0x1ec0 [ 189.071842][T18338] ? blkdev_common_ioctl+0x438/0x1110 [ 189.077291][T18338] ? selinux_file_ioctl+0x981/0xa10 [ 189.083027][T18338] ? lo_release+0x120/0x120 [ 189.087687][T18338] blkdev_ioctl+0x1d0/0x3f0 [ 189.092186][T18338] block_ioctl+0x6e/0x80 16:53:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, 0x0, 0x10034) 16:53:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 189.096429][T18338] ? blkdev_iopoll+0x80/0x80 [ 189.101014][T18338] __se_sys_ioctl+0xcb/0x140 [ 189.105705][T18338] __x64_sys_ioctl+0x3f/0x50 [ 189.110550][T18338] do_syscall_64+0x44/0xa0 [ 189.114972][T18338] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 189.121013][T18338] RIP: 0033:0x7fefe2d12697 [ 189.125691][T18338] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 189.146103][T18338] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 189.154599][T18338] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 189.163018][T18338] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 189.171065][T18338] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 189.179112][T18338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 189.187069][T18338] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:53:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200005, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 31) 16:53:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 189.197590][T18338] loop4: detected capacity change from 0 to 4096 [ 189.201108][T18348] loop2: detected capacity change from 0 to 4096 [ 189.223551][T18348] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 189.232845][T18338] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:53:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 189.304465][T18376] loop2: detected capacity change from 0 to 4096 [ 189.322347][T18376] EXT4-fs (loop2): invalid first ino: 0 [ 189.344232][T18389] loop1: detected capacity change from 0 to 4096 [ 189.344584][T18390] FAULT_INJECTION: forcing a failure. [ 189.344584][T18390] name failslab, interval 1, probability 0, space 0, times 0 [ 189.363674][T18390] CPU: 0 PID: 18390 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 189.372447][T18390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.382693][T18390] Call Trace: [ 189.385957][T18390] dump_stack_lvl+0xd6/0x122 [ 189.390645][T18390] dump_stack+0x11/0x1b [ 189.394816][T18390] should_fail+0x23c/0x250 [ 189.399421][T18390] __should_failslab+0x81/0x90 [ 189.404374][T18390] ? call_usermodehelper_setup+0x71/0x190 [ 189.410243][T18390] should_failslab+0x5/0x20 [ 189.414922][T18390] kmem_cache_alloc_trace+0x52/0x320 [ 189.420218][T18390] call_usermodehelper_setup+0x71/0x190 [ 189.425858][T18390] ? add_uevent_var+0x1d0/0x1d0 [ 189.430717][T18390] kobject_uevent_env+0xb29/0xc40 [ 189.435849][T18390] disk_force_media_change+0xe3/0x170 [ 189.439692][T18389] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated 16:53:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 189.441316][T18390] loop_configure+0x6c0/0xeb0 [ 189.458247][T18390] lo_ioctl+0x618/0x13e0 [ 189.460371][T18389] EXT4-fs (loop1): get root inode failed [ 189.462684][T18390] ? path_openat+0x18d4/0x1ec0 [ 189.462716][T18390] ? blkdev_common_ioctl+0x438/0x1110 [ 189.468347][T18389] EXT4-fs (loop1): mount failed [ 189.473171][T18390] ? selinux_file_ioctl+0x981/0xa10 [ 189.490060][T18401] loop2: detected capacity change from 0 to 4096 [ 189.490804][T18390] ? lo_release+0x120/0x120 [ 189.501730][T18390] blkdev_ioctl+0x1d0/0x3f0 [ 189.506939][T18390] block_ioctl+0x6e/0x80 [ 189.511228][T18390] ? blkdev_iopoll+0x80/0x80 [ 189.512597][T18401] EXT4-fs (loop2): invalid first ino: 0 [ 189.516178][T18390] __se_sys_ioctl+0xcb/0x140 [ 189.516205][T18390] __x64_sys_ioctl+0x3f/0x50 [ 189.531262][T18390] do_syscall_64+0x44/0xa0 [ 189.535745][T18390] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 189.541802][T18390] RIP: 0033:0x7fefe2d12697 [ 189.546202][T18390] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 189.566509][T18390] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 189.575074][T18390] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 189.583061][T18390] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 189.591141][T18390] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 16:53:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 189.599884][T18390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 189.607930][T18390] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 189.616522][T18390] loop4: detected capacity change from 0 to 4096 [ 189.645753][T18390] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:53:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 189.677925][T18389] loop1: detected capacity change from 0 to 4096 [ 189.688359][T18389] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 189.702579][T18389] EXT4-fs (loop1): get root inode failed [ 189.708388][T18389] EXT4-fs (loop1): mount failed [ 189.709295][T18422] loop2: detected capacity change from 0 to 4096 [ 189.723838][T18422] EXT4-fs (loop2): invalid first ino: 0 16:53:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, 0x0, 0x10034) 16:53:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 32) 16:53:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200006, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 189.990621][T18440] loop1: detected capacity change from 0 to 4096 [ 190.002349][T18443] FAULT_INJECTION: forcing a failure. [ 190.002349][T18443] name failslab, interval 1, probability 0, space 0, times 0 [ 190.010417][T18440] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 190.015225][T18443] CPU: 0 PID: 18443 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 190.015247][T18443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.015256][T18443] Call Trace: [ 190.037799][T18440] EXT4-fs (loop1): get root inode failed [ 190.046520][T18443] dump_stack_lvl+0xd6/0x122 [ 190.049845][T18440] EXT4-fs (loop1): mount failed [ 190.055622][T18443] dump_stack+0x11/0x1b [ 190.069140][T18443] should_fail+0x23c/0x250 [ 190.073556][T18443] ? __kernfs_new_node+0x6a/0x330 [ 190.078744][T18443] __should_failslab+0x81/0x90 [ 190.081994][T18450] loop2: detected capacity change from 0 to 4096 [ 190.083694][T18443] should_failslab+0x5/0x20 [ 190.083722][T18443] kmem_cache_alloc+0x4f/0x300 [ 190.083739][T18443] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 190.106500][T18443] __kernfs_new_node+0x6a/0x330 [ 190.108844][T18450] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 190.112433][T18443] ? ___cache_free+0x3c/0x300 [ 190.125366][T18443] ? kfree+0xf8/0x1d0 [ 190.129370][T18443] kernfs_create_dir_ns+0x5e/0x140 [ 190.134566][T18443] internal_create_group+0x148/0x860 16:53:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, 0x0, 0x10034) [ 190.139869][T18443] ? __invalidate_device+0xb0/0xc0 [ 190.144981][T18443] ? set_disk_ro+0x73/0x110 [ 190.151149][T18443] sysfs_create_group+0x1b/0x20 [ 190.156951][T18443] loop_configure+0xbcd/0xeb0 [ 190.162116][T18443] lo_ioctl+0x618/0x13e0 [ 190.166350][T18443] ? path_openat+0x18d4/0x1ec0 [ 190.171540][T18443] ? blkdev_common_ioctl+0x438/0x1110 [ 190.176983][T18443] ? selinux_file_ioctl+0x981/0xa10 [ 190.182357][T18443] ? lo_release+0x120/0x120 [ 190.187629][T18443] blkdev_ioctl+0x1d0/0x3f0 [ 190.192237][T18443] block_ioctl+0x6e/0x80 [ 190.197413][T18443] ? blkdev_iopoll+0x80/0x80 [ 190.202216][T18443] __se_sys_ioctl+0xcb/0x140 [ 190.207058][T18443] __x64_sys_ioctl+0x3f/0x50 [ 190.211689][T18443] do_syscall_64+0x44/0xa0 [ 190.216244][T18443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 190.222188][T18443] RIP: 0033:0x7fefe2d12697 [ 190.226683][T18443] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 190.247248][T18443] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 190.256123][T18443] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 190.264371][T18443] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 190.272704][T18443] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 190.280663][T18443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 190.289437][T18443] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 190.297870][T18443] loop4: detected capacity change from 0 to 4096 [ 190.308306][T18443] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:53:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 190.338771][T18440] loop1: detected capacity change from 0 to 4096 16:53:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 33) 16:53:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 190.367407][T18440] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 190.374916][T18479] loop2: detected capacity change from 0 to 4096 [ 190.384225][T18440] EXT4-fs (loop1): get root inode failed [ 190.392083][T18440] EXT4-fs (loop1): mount failed [ 190.392411][T18479] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 190.451972][T18493] FAULT_INJECTION: forcing a failure. [ 190.451972][T18493] name failslab, interval 1, probability 0, space 0, times 0 [ 190.464445][T18496] loop2: detected capacity change from 0 to 4096 [ 190.465438][T18493] CPU: 1 PID: 18493 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 190.481299][T18493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.491571][T18493] Call Trace: [ 190.494914][T18493] dump_stack_lvl+0xd6/0x122 [ 190.499680][T18493] dump_stack+0x11/0x1b [ 190.503974][T18493] should_fail+0x23c/0x250 [ 190.508563][T18493] ? __kernfs_new_node+0x6a/0x330 [ 190.513963][T18493] __should_failslab+0x81/0x90 [ 190.518980][T18493] should_failslab+0x5/0x20 [ 190.523745][T18493] kmem_cache_alloc+0x4f/0x300 [ 190.528631][T18493] __kernfs_new_node+0x6a/0x330 [ 190.534503][T18493] ? __down_write_common+0x42/0x830 [ 190.539698][T18493] ? idr_alloc_cyclic+0x26b/0x2f0 [ 190.545100][T18493] ? __down_write_common+0x42/0x830 [ 190.550380][T18493] ? rb_insert_color+0x7e/0x310 [ 190.555222][T18493] kernfs_new_node+0x5b/0xd0 [ 190.559894][T18493] __kernfs_create_file+0x45/0x1a0 [ 190.565083][T18493] sysfs_add_file_mode_ns+0x1c1/0x250 [ 190.570628][T18493] internal_create_group+0x2f4/0x860 [ 190.576094][T18493] sysfs_create_group+0x1b/0x20 [ 190.580929][T18493] loop_configure+0xbcd/0xeb0 [ 190.585662][T18493] lo_ioctl+0x618/0x13e0 [ 190.589905][T18493] ? path_openat+0x18d4/0x1ec0 [ 190.594662][T18493] ? blkdev_common_ioctl+0x438/0x1110 [ 190.600017][T18493] ? selinux_file_ioctl+0x981/0xa10 [ 190.605469][T18493] ? lo_release+0x120/0x120 [ 190.610000][T18493] blkdev_ioctl+0x1d0/0x3f0 [ 190.614589][T18493] block_ioctl+0x6e/0x80 [ 190.618907][T18493] ? blkdev_iopoll+0x80/0x80 [ 190.623702][T18493] __se_sys_ioctl+0xcb/0x140 [ 190.628347][T18493] __x64_sys_ioctl+0x3f/0x50 [ 190.632916][T18493] do_syscall_64+0x44/0xa0 [ 190.637409][T18493] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 190.643378][T18493] RIP: 0033:0x7fefe2d12697 [ 190.647826][T18493] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 190.667876][T18493] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 190.677239][T18493] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 190.685291][T18493] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 190.693926][T18493] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 16:53:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200007, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 190.702005][T18493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 190.710859][T18493] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:53:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 190.746431][T18496] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 190.758133][T18493] loop4: detected capacity change from 0 to 4096 [ 190.766757][T18505] loop1: detected capacity change from 0 to 4096 [ 190.785421][T18505] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 190.786227][T18493] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 190.816668][T18505] EXT4-fs (loop1): get root inode failed [ 190.822375][T18505] EXT4-fs (loop1): mount failed [ 190.829448][T18517] loop2: detected capacity change from 0 to 4096 16:53:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 34) [ 190.839844][T18517] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) 16:53:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 190.886920][T18505] loop1: detected capacity change from 0 to 4096 [ 190.901172][T18532] loop2: detected capacity change from 0 to 4096 [ 190.908050][T18505] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 190.944075][T18505] EXT4-fs (loop1): get root inode failed [ 190.949886][T18505] EXT4-fs (loop1): mount failed [ 190.951329][T18539] FAULT_INJECTION: forcing a failure. [ 190.951329][T18539] name failslab, interval 1, probability 0, space 0, times 0 [ 190.967722][T18539] CPU: 0 PID: 18539 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 190.970513][T18532] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 190.976480][T18539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.976493][T18539] Call Trace: [ 190.976500][T18539] dump_stack_lvl+0xd6/0x122 [ 191.003447][T18539] dump_stack+0x11/0x1b [ 191.007616][T18539] should_fail+0x23c/0x250 [ 191.012025][T18539] ? __kernfs_new_node+0x6a/0x330 [ 191.017061][T18539] __should_failslab+0x81/0x90 [ 191.021961][T18539] should_failslab+0x5/0x20 [ 191.026445][T18539] kmem_cache_alloc+0x4f/0x300 [ 191.031189][T18539] ? __down_write_common+0x42/0x830 [ 191.036392][T18539] __kernfs_new_node+0x6a/0x330 [ 191.041226][T18539] ? up_write+0x25/0xc0 [ 191.045357][T18539] kernfs_new_node+0x5b/0xd0 [ 191.050200][T18539] __kernfs_create_file+0x45/0x1a0 [ 191.055332][T18539] sysfs_add_file_mode_ns+0x1c1/0x250 [ 191.060727][T18539] internal_create_group+0x2f4/0x860 [ 191.066166][T18539] ? set_disk_ro+0x73/0x110 [ 191.070654][T18539] sysfs_create_group+0x1b/0x20 [ 191.075502][T18539] loop_configure+0xbcd/0xeb0 [ 191.080207][T18539] lo_ioctl+0x618/0x13e0 [ 191.084703][T18539] ? path_openat+0x18d4/0x1ec0 [ 191.089710][T18539] ? blkdev_common_ioctl+0x438/0x1110 [ 191.095074][T18539] ? selinux_file_ioctl+0x981/0xa10 [ 191.100343][T18539] ? lo_release+0x120/0x120 [ 191.104944][T18539] blkdev_ioctl+0x1d0/0x3f0 [ 191.109621][T18539] block_ioctl+0x6e/0x80 [ 191.113873][T18539] ? blkdev_iopoll+0x80/0x80 [ 191.118716][T18539] __se_sys_ioctl+0xcb/0x140 [ 191.123991][T18539] __x64_sys_ioctl+0x3f/0x50 [ 191.129064][T18539] do_syscall_64+0x44/0xa0 [ 191.133466][T18539] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 191.140217][T18539] RIP: 0033:0x7fefe2d12697 [ 191.144682][T18539] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 191.164727][T18539] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 191.173392][T18539] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 191.181368][T18539] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 16:53:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/68, 0x44}], 0x1, 0x515, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x3f}, 0x0) getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 35) 16:53:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 191.189544][T18539] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 191.197513][T18539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 191.206352][T18539] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 191.214934][T18539] loop4: detected capacity change from 0 to 4096 [ 191.228059][T18539] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:53:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200008, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 191.286980][T18561] loop2: detected capacity change from 0 to 4096 [ 191.296904][T18559] FAULT_INJECTION: forcing a failure. [ 191.296904][T18559] name failslab, interval 1, probability 0, space 0, times 0 [ 191.309597][T18559] CPU: 0 PID: 18559 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 191.314067][T18561] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 191.318547][T18559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:53:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 191.318561][T18559] Call Trace: [ 191.318568][T18559] dump_stack_lvl+0xd6/0x122 [ 191.318594][T18559] dump_stack+0x11/0x1b [ 191.318611][T18559] should_fail+0x23c/0x250 [ 191.354058][T18559] ? __kernfs_new_node+0x6a/0x330 [ 191.359721][T18559] __should_failslab+0x81/0x90 [ 191.365605][T18559] should_failslab+0x5/0x20 [ 191.370225][T18559] kmem_cache_alloc+0x4f/0x300 [ 191.375396][T18559] ? __down_write_common+0x42/0x830 [ 191.380907][T18559] __kernfs_new_node+0x6a/0x330 [ 191.385990][T18559] ? up_write+0x25/0xc0 [ 191.390394][T18559] kernfs_new_node+0x5b/0xd0 [ 191.395139][T18559] __kernfs_create_file+0x45/0x1a0 [ 191.400402][T18559] sysfs_add_file_mode_ns+0x1c1/0x250 [ 191.405938][T18559] internal_create_group+0x2f4/0x860 [ 191.411353][T18559] ? set_disk_ro+0x73/0x110 [ 191.415863][T18559] sysfs_create_group+0x1b/0x20 [ 191.420814][T18559] loop_configure+0xbcd/0xeb0 [ 191.425746][T18559] lo_ioctl+0x618/0x13e0 [ 191.430142][T18559] ? path_openat+0x18d4/0x1ec0 [ 191.435307][T18559] ? blkdev_common_ioctl+0x438/0x1110 [ 191.440663][T18559] ? selinux_file_ioctl+0x981/0xa10 [ 191.445946][T18559] ? lo_release+0x120/0x120 [ 191.450444][T18559] blkdev_ioctl+0x1d0/0x3f0 [ 191.455153][T18559] block_ioctl+0x6e/0x80 [ 191.459519][T18559] ? blkdev_iopoll+0x80/0x80 [ 191.464094][T18559] __se_sys_ioctl+0xcb/0x140 [ 191.468681][T18559] __x64_sys_ioctl+0x3f/0x50 [ 191.473284][T18559] do_syscall_64+0x44/0xa0 [ 191.477707][T18559] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 191.484092][T18559] RIP: 0033:0x7fefe2d12697 [ 191.488614][T18559] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 191.508777][T18559] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 191.517396][T18559] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 191.525355][T18559] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 191.533312][T18559] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 191.541452][T18559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 191.549506][T18559] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 191.563486][T18559] loop4: detected capacity change from 0 to 4096 [ 191.580759][T18559] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:53:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 36) [ 191.622957][T18580] loop2: detected capacity change from 0 to 4096 [ 191.624352][T18579] loop1: detected capacity change from 0 to 4096 [ 191.656897][T18580] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) 16:53:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 191.672075][T18579] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 191.685304][T18579] EXT4-fs (loop1): get root inode failed [ 191.690986][T18579] EXT4-fs (loop1): mount failed [ 191.711173][T18595] FAULT_INJECTION: forcing a failure. [ 191.711173][T18595] name failslab, interval 1, probability 0, space 0, times 0 [ 191.724496][T18595] CPU: 1 PID: 18595 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 191.733257][T18595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.735617][T18601] loop2: detected capacity change from 0 to 4096 [ 191.743571][T18595] Call Trace: [ 191.743584][T18595] dump_stack_lvl+0xd6/0x122 [ 191.743609][T18595] dump_stack+0x11/0x1b [ 191.763301][T18595] should_fail+0x23c/0x250 [ 191.767722][T18595] ? __kernfs_new_node+0x6a/0x330 [ 191.772765][T18595] __should_failslab+0x81/0x90 [ 191.777607][T18595] should_failslab+0x5/0x20 [ 191.782209][T18595] kmem_cache_alloc+0x4f/0x300 [ 191.786967][T18595] ? __down_write_common+0x7bd/0x830 [ 191.792240][T18595] __kernfs_new_node+0x6a/0x330 [ 191.797150][T18595] ? up_write+0x25/0xc0 [ 191.801287][T18595] kernfs_new_node+0x5b/0xd0 [ 191.806078][T18595] __kernfs_create_file+0x45/0x1a0 [ 191.811173][T18595] sysfs_add_file_mode_ns+0x1c1/0x250 [ 191.816790][T18595] internal_create_group+0x2f4/0x860 [ 191.822147][T18595] ? set_disk_ro+0x73/0x110 [ 191.826719][T18595] sysfs_create_group+0x1b/0x20 [ 191.831584][T18595] loop_configure+0xbcd/0xeb0 [ 191.836371][T18595] lo_ioctl+0x618/0x13e0 [ 191.840621][T18595] ? path_openat+0x18d4/0x1ec0 [ 191.845641][T18595] ? blkdev_common_ioctl+0x438/0x1110 [ 191.851093][T18595] ? selinux_file_ioctl+0x981/0xa10 [ 191.856283][T18595] ? lo_release+0x120/0x120 [ 191.861070][T18595] blkdev_ioctl+0x1d0/0x3f0 [ 191.865739][T18595] block_ioctl+0x6e/0x80 [ 191.869964][T18595] ? blkdev_iopoll+0x80/0x80 [ 191.874708][T18595] __se_sys_ioctl+0xcb/0x140 [ 191.879306][T18595] __x64_sys_ioctl+0x3f/0x50 [ 191.883971][T18595] do_syscall_64+0x44/0xa0 [ 191.888702][T18595] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 191.895145][T18595] RIP: 0033:0x7fefe2d12697 [ 191.899723][T18595] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 191.919841][T18595] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 191.928508][T18595] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 191.937263][T18595] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 191.946523][T18595] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 191.954749][T18595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 191.963333][T18595] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:53:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, 0x0, 0x10034) [ 191.986111][T18579] loop1: detected capacity change from 0 to 4096 [ 191.990489][T18595] loop4: detected capacity change from 0 to 4096 [ 192.007081][T18601] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) 16:53:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) (fail_nth: 1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:53:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 37) [ 192.035687][T18579] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 192.044059][T18595] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 192.069562][T18579] EXT4-fs (loop1): get root inode failed [ 192.075253][T18579] EXT4-fs (loop1): mount failed 16:53:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200009, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:53:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 192.101103][T18620] loop2: detected capacity change from 0 to 4096 [ 192.109765][T18620] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 192.167184][T18643] FAULT_INJECTION: forcing a failure. [ 192.167184][T18643] name failslab, interval 1, probability 0, space 0, times 0 [ 192.179965][T18643] CPU: 0 PID: 18643 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 192.189115][T18643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.190343][T18647] loop1: detected capacity change from 0 to 4096 [ 192.199171][T18643] Call Trace: [ 192.199182][T18643] dump_stack_lvl+0xd6/0x122 [ 192.199207][T18643] dump_stack+0x11/0x1b [ 192.199223][T18643] should_fail+0x23c/0x250 [ 192.199240][T18643] ? __kernfs_new_node+0x6a/0x330 [ 192.227354][T18643] __should_failslab+0x81/0x90 [ 192.232122][T18643] should_failslab+0x5/0x20 [ 192.236960][T18643] kmem_cache_alloc+0x4f/0x300 [ 192.241720][T18643] ? __down_write_common+0x42/0x830 [ 192.247341][T18643] __kernfs_new_node+0x6a/0x330 [ 192.253125][T18643] ? up_write+0x25/0xc0 [ 192.257281][T18643] kernfs_new_node+0x5b/0xd0 [ 192.262235][T18643] __kernfs_create_file+0x45/0x1a0 [ 192.267496][T18643] sysfs_add_file_mode_ns+0x1c1/0x250 [ 192.273194][T18643] internal_create_group+0x2f4/0x860 [ 192.278778][T18643] ? set_disk_ro+0x73/0x110 [ 192.283279][T18643] sysfs_create_group+0x1b/0x20 [ 192.288268][T18643] loop_configure+0xbcd/0xeb0 [ 192.292968][T18643] lo_ioctl+0x618/0x13e0 [ 192.298293][T18643] ? path_openat+0x18d4/0x1ec0 [ 192.303257][T18643] ? blkdev_common_ioctl+0x438/0x1110 [ 192.308702][T18643] ? selinux_file_ioctl+0x981/0xa10 [ 192.314385][T18643] ? lo_release+0x120/0x120 [ 192.318926][T18643] blkdev_ioctl+0x1d0/0x3f0 [ 192.323800][T18643] block_ioctl+0x6e/0x80 [ 192.328317][T18643] ? blkdev_iopoll+0x80/0x80 [ 192.333629][T18643] __se_sys_ioctl+0xcb/0x140 [ 192.338426][T18643] __x64_sys_ioctl+0x3f/0x50 [ 192.343368][T18643] do_syscall_64+0x44/0xa0 [ 192.347913][T18643] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 192.353951][T18643] RIP: 0033:0x7fefe2d12697 [ 192.358357][T18643] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 192.378219][T18643] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 192.386813][T18643] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 192.395326][T18643] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 192.403287][T18643] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 192.411276][T18643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 192.419279][T18643] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 192.443138][T18643] loop4: detected capacity change from 0 to 4096 [ 192.448834][T18653] loop2: detected capacity change from 0 to 4096 [ 192.469363][T18643] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 192.469577][T18653] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 192.481293][T18649] FAULT_INJECTION: forcing a failure. [ 192.481293][T18649] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 192.502358][T18649] CPU: 1 PID: 18649 Comm: syz-executor.5 Not tainted 5.15.0-rc4-syzkaller #0 [ 192.511122][T18649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.521188][T18649] Call Trace: [ 192.524611][T18649] dump_stack_lvl+0xd6/0x122 [ 192.529312][T18649] dump_stack+0x11/0x1b [ 192.533537][T18649] should_fail+0x23c/0x250 [ 192.538059][T18649] should_fail_usercopy+0x16/0x20 [ 192.541640][T18647] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 192.543107][T18649] copy_page_to_iter+0x26f/0x950 [ 192.543130][T18649] pipe_read+0x302/0x940 16:54:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 38) [ 192.563370][T18647] EXT4-fs (loop1): get root inode failed [ 192.564428][T18649] ? iov_iter_init+0xb1/0xf0 [ 192.570357][T18647] EXT4-fs (loop1): mount failed [ 192.574904][T18649] vfs_read+0x66c/0x750 [ 192.583958][T18649] ksys_read+0xd9/0x190 [ 192.588224][T18649] __x64_sys_read+0x3e/0x50 [ 192.592900][T18649] do_syscall_64+0x44/0xa0 [ 192.597470][T18649] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 192.605119][T18649] RIP: 0033:0x7f7cfe5bc8d9 [ 192.609674][T18649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 192.629718][T18649] RSP: 002b:00007f7cfc2f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 192.638949][T18649] RAX: ffffffffffffffda RBX: 00007f7cfe6c10e0 RCX: 00007f7cfe5bc8d9 [ 192.647172][T18649] RDX: 00000000000000ba RSI: 00000000200002c0 RDI: 0000000000000005 [ 192.655153][T18649] RBP: 00007f7cfc2f21d0 R08: 0000000000000000 R09: 0000000000000000 16:54:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 192.663311][T18649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 192.671578][T18649] R13: 00007fffe9a8f44f R14: 00007f7cfc2f2300 R15: 0000000000022000 [ 192.696051][T18647] loop1: detected capacity change from 0 to 4096 [ 192.719144][T18681] FAULT_INJECTION: forcing a failure. [ 192.719144][T18681] name failslab, interval 1, probability 0, space 0, times 0 [ 192.720095][T18647] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 192.732243][T18681] CPU: 1 PID: 18681 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 192.749796][T18647] EXT4-fs (loop1): get root inode failed [ 192.753898][T18681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.753909][T18681] Call Trace: [ 192.753916][T18681] dump_stack_lvl+0xd6/0x122 [ 192.759564][T18647] EXT4-fs (loop1): mount failed [ 192.769776][T18681] dump_stack+0x11/0x1b [ 192.769799][T18681] should_fail+0x23c/0x250 [ 192.780605][T18684] loop2: detected capacity change from 0 to 4096 [ 192.783037][T18681] ? __kernfs_new_node+0x6a/0x330 [ 192.783067][T18681] __should_failslab+0x81/0x90 [ 192.783087][T18681] should_failslab+0x5/0x20 [ 192.813314][T18681] kmem_cache_alloc+0x4f/0x300 [ 192.818159][T18681] ? __down_write_common+0x42/0x830 [ 192.823607][T18681] __kernfs_new_node+0x6a/0x330 [ 192.828906][T18681] ? up_write+0x25/0xc0 [ 192.833264][T18681] kernfs_new_node+0x5b/0xd0 [ 192.837994][T18681] __kernfs_create_file+0x45/0x1a0 [ 192.843244][T18681] sysfs_add_file_mode_ns+0x1c1/0x250 [ 192.848850][T18681] internal_create_group+0x2f4/0x860 [ 192.854120][T18681] ? set_disk_ro+0x73/0x110 [ 192.858831][T18681] sysfs_create_group+0x1b/0x20 [ 192.863814][T18681] loop_configure+0xbcd/0xeb0 [ 192.868693][T18681] lo_ioctl+0x618/0x13e0 [ 192.872929][T18681] ? path_openat+0x18d4/0x1ec0 [ 192.877803][T18681] ? blkdev_common_ioctl+0x438/0x1110 [ 192.888292][T18681] ? selinux_file_ioctl+0x981/0xa10 [ 192.893847][T18681] ? lo_release+0x120/0x120 [ 192.898562][T18681] blkdev_ioctl+0x1d0/0x3f0 [ 192.903109][T18681] block_ioctl+0x6e/0x80 [ 192.907825][T18681] ? blkdev_iopoll+0x80/0x80 [ 192.912532][T18681] __se_sys_ioctl+0xcb/0x140 [ 192.917403][T18681] __x64_sys_ioctl+0x3f/0x50 [ 192.921981][T18681] do_syscall_64+0x44/0xa0 [ 192.926825][T18681] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 192.932707][T18681] RIP: 0033:0x7fefe2d12697 [ 192.937201][T18681] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 192.956993][T18681] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 192.965406][T18681] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 192.973928][T18681] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 192.982322][T18681] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 192.991419][T18681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 192.999945][T18681] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 193.010073][T18681] loop4: detected capacity change from 0 to 4096 16:54:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) (fail_nth: 2) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, 0x0, 0x10034) [ 193.019539][T18684] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 193.057445][T18681] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 39) [ 193.110903][T18705] loop2: detected capacity change from 0 to 4096 [ 193.119833][T18706] loop1: detected capacity change from 0 to 4096 [ 193.141089][T18705] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) 16:54:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 193.158313][T18706] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 193.184515][T18706] EXT4-fs (loop1): get root inode failed [ 193.190134][T18722] FAULT_INJECTION: forcing a failure. [ 193.190134][T18722] name failslab, interval 1, probability 0, space 0, times 0 [ 193.190371][T18706] EXT4-fs (loop1): mount failed [ 193.203218][T18722] CPU: 1 PID: 18722 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 193.216894][T18722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.227319][T18722] Call Trace: [ 193.228989][T18725] loop2: detected capacity change from 0 to 4096 [ 193.230603][T18722] dump_stack_lvl+0xd6/0x122 [ 193.241526][T18722] dump_stack+0x11/0x1b [ 193.245947][T18722] should_fail+0x23c/0x250 [ 193.250405][T18722] ? __kernfs_new_node+0x6a/0x330 [ 193.255430][T18722] __should_failslab+0x81/0x90 [ 193.260193][T18722] should_failslab+0x5/0x20 [ 193.264793][T18722] kmem_cache_alloc+0x4f/0x300 [ 193.270282][T18722] ? __down_write_common+0x42/0x830 [ 193.275612][T18722] __kernfs_new_node+0x6a/0x330 [ 193.280541][T18722] ? up_write+0x25/0xc0 [ 193.284880][T18722] kernfs_new_node+0x5b/0xd0 [ 193.289565][T18722] __kernfs_create_file+0x45/0x1a0 [ 193.294732][T18722] sysfs_add_file_mode_ns+0x1c1/0x250 [ 193.300116][T18722] internal_create_group+0x2f4/0x860 [ 193.305645][T18722] ? set_disk_ro+0x73/0x110 [ 193.310995][T18722] sysfs_create_group+0x1b/0x20 [ 193.316039][T18722] loop_configure+0xbcd/0xeb0 [ 193.320984][T18722] lo_ioctl+0x618/0x13e0 [ 193.325222][T18722] ? path_openat+0x18d4/0x1ec0 [ 193.330734][T18722] ? blkdev_common_ioctl+0x438/0x1110 [ 193.336272][T18722] ? selinux_file_ioctl+0x981/0xa10 [ 193.341716][T18722] ? lo_release+0x120/0x120 [ 193.346300][T18722] blkdev_ioctl+0x1d0/0x3f0 [ 193.350897][T18722] block_ioctl+0x6e/0x80 [ 193.355735][T18722] ? blkdev_iopoll+0x80/0x80 [ 193.360877][T18722] __se_sys_ioctl+0xcb/0x140 [ 193.365817][T18722] __x64_sys_ioctl+0x3f/0x50 [ 193.370398][T18722] do_syscall_64+0x44/0xa0 [ 193.374807][T18722] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 193.380692][T18722] RIP: 0033:0x7fefe2d12697 [ 193.385177][T18722] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 193.405042][T18722] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 193.413524][T18722] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 193.421567][T18722] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 193.429531][T18722] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 193.437672][T18722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 193.445726][T18722] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 193.455235][T18724] FAULT_INJECTION: forcing a failure. [ 193.455235][T18724] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 193.468908][T18724] CPU: 1 PID: 18724 Comm: syz-executor.5 Not tainted 5.15.0-rc4-syzkaller #0 [ 193.469475][T18725] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 193.477854][T18724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.477866][T18724] Call Trace: [ 193.477873][T18724] dump_stack_lvl+0xd6/0x122 [ 193.477896][T18724] dump_stack+0x11/0x1b [ 193.487121][T18722] loop4: detected capacity change from 0 to 4096 [ 193.494568][T18724] should_fail+0x23c/0x250 [ 193.494592][T18724] should_fail_usercopy+0x16/0x20 [ 193.522476][T18724] _copy_to_user+0x1c/0x90 [ 193.526909][T18724] simple_read_from_buffer+0xab/0x120 [ 193.532288][T18724] proc_fail_nth_read+0x10d/0x150 [ 193.537633][T18724] ? proc_fault_inject_write+0x230/0x230 [ 193.540851][T18722] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 193.543485][T18724] vfs_read+0x1e6/0x750 [ 193.558922][T18724] ? __fget_light+0x21b/0x260 16:54:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 40) [ 193.563600][T18724] ? __cond_resched+0x11/0x40 [ 193.568417][T18724] ksys_read+0xd9/0x190 [ 193.572617][T18724] __x64_sys_read+0x3e/0x50 [ 193.577124][T18724] do_syscall_64+0x44/0xa0 [ 193.582475][T18724] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 193.588636][T18724] RIP: 0033:0x7f7cfe56f48c [ 193.593401][T18724] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 16:54:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 193.613178][T18724] RSP: 002b:00007f7cfc2f2170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 193.621768][T18724] RAX: ffffffffffffffda RBX: 00000000000000ba RCX: 00007f7cfe56f48c [ 193.629806][T18724] RDX: 000000000000000f RSI: 00007f7cfc2f21e0 RDI: 0000000000000007 [ 193.637868][T18724] RBP: 00007f7cfc2f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 193.646024][T18724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 193.654205][T18724] R13: 00007fffe9a8f44f R14: 00007f7cfc2f2300 R15: 0000000000022000 16:54:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 193.682390][T18706] loop1: detected capacity change from 0 to 4096 [ 193.704594][T18754] loop4: detected capacity change from 0 to 4096 [ 193.711271][T18706] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 193.723669][T18754] FAULT_INJECTION: forcing a failure. [ 193.723669][T18754] name failslab, interval 1, probability 0, space 0, times 0 [ 193.735132][T18706] EXT4-fs (loop1): get root inode failed [ 193.736636][T18754] CPU: 1 PID: 18754 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 193.742674][T18706] EXT4-fs (loop1): mount failed [ 193.751430][T18754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.751444][T18754] Call Trace: [ 193.751451][T18754] dump_stack_lvl+0xd6/0x122 [ 193.751474][T18754] dump_stack+0x11/0x1b [ 193.759703][T18760] loop2: detected capacity change from 0 to 4096 [ 193.766505][T18754] should_fail+0x23c/0x250 [ 193.766531][T18754] __should_failslab+0x81/0x90 [ 193.766550][T18754] ? kobject_uevent_env+0x1a7/0xc40 [ 193.766570][T18754] should_failslab+0x5/0x20 [ 193.774420][T18760] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 193.778562][T18754] kmem_cache_alloc_trace+0x52/0x320 [ 193.778590][T18754] ? dev_uevent_filter+0x70/0x70 [ 193.778611][T18754] kobject_uevent_env+0x1a7/0xc40 [ 193.826037][T18754] ? internal_create_group+0x7d9/0x860 [ 193.831618][T18754] ? set_capacity_and_notify+0x1eb/0x200 [ 193.837337][T18754] kobject_uevent+0x18/0x20 [ 193.842005][T18754] loop_configure+0xce1/0xeb0 [ 193.846675][T18754] lo_ioctl+0x618/0x13e0 [ 193.850988][T18754] ? path_openat+0x18d4/0x1ec0 [ 193.855749][T18754] ? blkdev_common_ioctl+0x438/0x1110 [ 193.861313][T18754] ? selinux_file_ioctl+0x981/0xa10 [ 193.866984][T18754] ? lo_release+0x120/0x120 [ 193.871475][T18754] blkdev_ioctl+0x1d0/0x3f0 [ 193.876045][T18754] block_ioctl+0x6e/0x80 [ 193.880274][T18754] ? blkdev_iopoll+0x80/0x80 [ 193.884852][T18754] __se_sys_ioctl+0xcb/0x140 [ 193.889516][T18754] __x64_sys_ioctl+0x3f/0x50 [ 193.894166][T18754] do_syscall_64+0x44/0xa0 [ 193.898634][T18754] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 193.905031][T18754] RIP: 0033:0x7fefe2d12697 [ 193.909522][T18754] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 16:54:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, 0x0, 0x10034) [ 193.930054][T18754] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 193.938625][T18754] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 193.947289][T18754] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 193.955360][T18754] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 193.963605][T18754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 193.971916][T18754] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:54:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 41) 16:54:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 193.994894][T18754] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000b, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 194.051856][T18781] loop2: detected capacity change from 0 to 4096 [ 194.071223][T18781] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 194.092343][T18790] loop4: detected capacity change from 0 to 4096 [ 194.096597][T18792] loop1: detected capacity change from 0 to 4096 [ 194.104451][T18790] FAULT_INJECTION: forcing a failure. [ 194.104451][T18790] name failslab, interval 1, probability 0, space 0, times 0 [ 194.118097][T18790] CPU: 1 PID: 18790 Comm: syz-executor.4 Not tainted 5.15.0-rc4-syzkaller #0 [ 194.123997][T18792] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 194.126946][T18790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:54:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0) [ 194.126973][T18790] Call Trace: [ 194.126979][T18790] dump_stack_lvl+0xd6/0x122 [ 194.127004][T18790] dump_stack+0x11/0x1b [ 194.139754][T18792] EXT4-fs (loop1): get root inode failed [ 194.149490][T18790] should_fail+0x23c/0x250 [ 194.149517][T18790] ? kzalloc+0x1d/0x30 [ 194.149534][T18790] __should_failslab+0x81/0x90 [ 194.149553][T18790] should_failslab+0x5/0x20 [ 194.152851][T18792] EXT4-fs (loop1): mount failed [ 194.157421][T18790] __kmalloc+0x6f/0x350 [ 194.157444][T18790] kzalloc+0x1d/0x30 [ 194.198343][T18790] kobject_get_path+0x7c/0x110 [ 194.203114][T18790] kobject_uevent_env+0x1be/0xc40 [ 194.208121][T18790] ? internal_create_group+0x7d9/0x860 [ 194.213569][T18790] ? set_capacity_and_notify+0x1eb/0x200 [ 194.219197][T18790] kobject_uevent+0x18/0x20 [ 194.223684][T18790] loop_configure+0xce1/0xeb0 [ 194.228379][T18790] lo_ioctl+0x618/0x13e0 [ 194.232605][T18790] ? path_openat+0x18d4/0x1ec0 [ 194.237436][T18790] ? blkdev_common_ioctl+0x438/0x1110 [ 194.242793][T18790] ? selinux_file_ioctl+0x981/0xa10 [ 194.248029][T18790] ? lo_release+0x120/0x120 [ 194.253017][T18790] blkdev_ioctl+0x1d0/0x3f0 [ 194.257528][T18790] block_ioctl+0x6e/0x80 [ 194.261920][T18790] ? blkdev_iopoll+0x80/0x80 [ 194.266629][T18790] __se_sys_ioctl+0xcb/0x140 [ 194.271217][T18790] __x64_sys_ioctl+0x3f/0x50 [ 194.275791][T18790] do_syscall_64+0x44/0xa0 [ 194.280240][T18790] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 194.286205][T18790] RIP: 0033:0x7fefe2d12697 [ 194.290913][T18790] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 194.310568][T18790] RSP: 002b:00007fefe0a89f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 194.318969][T18790] RAX: ffffffffffffffda RBX: 00007fefe2d5ccc0 RCX: 00007fefe2d12697 [ 194.327260][T18790] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 194.335449][T18790] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 194.343498][T18790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 16:54:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 42) [ 194.351764][T18790] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 194.371589][T18790] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 194.404454][T18792] loop1: detected capacity change from 0 to 4096 [ 194.425748][T18811] loop2: detected capacity change from 0 to 4096 16:54:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0) 16:54:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 194.454471][T18792] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 194.468316][T18792] EXT4-fs (loop1): get root inode failed [ 194.473990][T18792] EXT4-fs (loop1): mount failed [ 194.480393][T18809] loop4: detected capacity change from 0 to 4096 [ 194.493869][T18809] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 194.524730][T18828] loop1: detected capacity change from 0 to 4096 [ 194.538515][T18828] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 194.551450][T18828] EXT4-fs (loop1): get root inode failed [ 194.557660][T18828] EXT4-fs (loop1): mount failed 16:54:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 194.570641][T18837] loop2: detected capacity change from 0 to 4096 [ 194.604305][T18845] loop4: detected capacity change from 0 to 4096 [ 194.616640][T18845] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xfdef) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0) 16:54:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200003, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000d, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 194.870885][T18871] loop4: detected capacity change from 0 to 4096 [ 194.873675][T18868] loop1: detected capacity change from 0 to 4096 [ 194.877754][T18872] loop2: detected capacity change from 0 to 4096 [ 194.899409][T18871] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200004, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 1) [ 194.911342][T18868] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 194.924830][T18868] EXT4-fs (loop1): get root inode failed [ 194.930522][T18868] EXT4-fs (loop1): mount failed [ 194.977927][T18868] loop1: detected capacity change from 0 to 4096 [ 194.986692][T18868] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 194.999918][T18868] EXT4-fs (loop1): get root inode failed [ 195.005579][T18868] EXT4-fs (loop1): mount failed [ 195.019394][T18899] loop4: detected capacity change from 0 to 4096 [ 195.037411][T18899] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 195.055397][T18912] FAULT_INJECTION: forcing a failure. [ 195.055397][T18912] name failslab, interval 1, probability 0, space 0, times 0 [ 195.068066][T18912] CPU: 1 PID: 18912 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 195.076940][T18912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.087163][T18912] Call Trace: [ 195.090445][T18912] dump_stack_lvl+0xd6/0x122 [ 195.095131][T18912] dump_stack+0x11/0x1b [ 195.099294][T18912] should_fail+0x23c/0x250 [ 195.103802][T18912] ? __se_sys_memfd_create+0xfb/0x390 [ 195.109299][T18912] __should_failslab+0x81/0x90 [ 195.114085][T18912] should_failslab+0x5/0x20 [ 195.118621][T18912] __kmalloc+0x6f/0x350 [ 195.122826][T18912] ? strnlen_user+0x137/0x1c0 [ 195.127782][T18912] __se_sys_memfd_create+0xfb/0x390 [ 195.133080][T18912] __x64_sys_memfd_create+0x2d/0x40 [ 195.138380][T18912] do_syscall_64+0x44/0xa0 [ 195.143057][T18912] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 195.149031][T18912] RIP: 0033:0x7f7d5c3528d9 [ 195.153456][T18912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 195.173223][T18912] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 195.181761][T18912] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7d5c3528d9 [ 195.189832][T18912] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007f7d5c3abe76 [ 195.197874][T18912] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 195.206151][T18912] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 195.214131][T18912] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 16:54:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x2000037a) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200005, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 2) [ 195.333514][T18936] loop4: detected capacity change from 0 to 4096 [ 195.338242][T18937] FAULT_INJECTION: forcing a failure. [ 195.338242][T18937] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 195.340671][T18941] loop1: detected capacity change from 0 to 4096 [ 195.353043][T18937] CPU: 0 PID: 18937 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 195.353068][T18937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.353079][T18937] Call Trace: [ 195.382186][T18937] dump_stack_lvl+0xd6/0x122 [ 195.386864][T18937] dump_stack+0x11/0x1b [ 195.391189][T18937] should_fail+0x23c/0x250 [ 195.395588][T18937] should_fail_usercopy+0x16/0x20 [ 195.400603][T18937] _copy_from_user+0x1c/0xd0 [ 195.405417][T18937] __se_sys_memfd_create+0x137/0x390 [ 195.410728][T18937] __x64_sys_memfd_create+0x2d/0x40 [ 195.416089][T18937] do_syscall_64+0x44/0xa0 [ 195.420581][T18937] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 195.426464][T18937] RIP: 0033:0x7f7d5c3528d9 [ 195.430946][T18937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 195.451789][T18937] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 195.460454][T18937] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7d5c3528d9 [ 195.468521][T18937] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007f7d5c3abe76 16:54:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 3) [ 195.476568][T18937] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 195.484520][T18937] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 195.492600][T18937] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 195.519669][T18936] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 195.540760][T18941] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 195.546117][T18954] FAULT_INJECTION: forcing a failure. [ 195.546117][T18954] name failslab, interval 1, probability 0, space 0, times 0 [ 195.566186][T18954] CPU: 0 PID: 18954 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 195.575000][T18954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.585311][T18954] Call Trace: 16:54:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200006, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 195.587064][T18941] EXT4-fs (loop1): get root inode failed [ 195.588584][T18954] dump_stack_lvl+0xd6/0x122 [ 195.588610][T18954] dump_stack+0x11/0x1b [ 195.594224][T18941] EXT4-fs (loop1): mount failed [ 195.598886][T18954] should_fail+0x23c/0x250 [ 195.598912][T18954] ? shmem_alloc_inode+0x22/0x30 [ 195.598931][T18954] __should_failslab+0x81/0x90 [ 195.598949][T18954] ? shmem_match+0xa0/0xa0 [ 195.598965][T18954] should_failslab+0x5/0x20 [ 195.631294][T18954] kmem_cache_alloc+0x4f/0x300 [ 195.636125][T18954] ? shmem_match+0xa0/0xa0 16:54:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 195.640659][T18954] shmem_alloc_inode+0x22/0x30 [ 195.645511][T18954] new_inode_pseudo+0x38/0x1c0 [ 195.650857][T18954] new_inode+0x21/0x120 [ 195.655002][T18954] shmem_get_inode+0xb7/0x4a0 [ 195.659775][T18954] __shmem_file_setup+0xf1/0x1d0 [ 195.664729][T18954] shmem_file_setup+0x37/0x40 [ 195.669412][T18954] __se_sys_memfd_create+0x1eb/0x390 [ 195.674837][T18954] __x64_sys_memfd_create+0x2d/0x40 [ 195.680190][T18954] do_syscall_64+0x44/0xa0 [ 195.684670][T18954] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 195.690830][T18954] RIP: 0033:0x7f7d5c3528d9 [ 195.695466][T18954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 195.715684][T18954] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 195.724176][T18954] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7d5c3528d9 [ 195.732354][T18954] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007f7d5c3abe76 16:54:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x7ffff000) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 195.740590][T18954] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 195.748822][T18954] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 195.756781][T18954] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 16:54:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 4) 16:54:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 195.785538][T18941] loop1: detected capacity change from 0 to 4096 [ 195.799111][T18941] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 195.811822][T18941] EXT4-fs (loop1): get root inode failed [ 195.817598][T18941] EXT4-fs (loop1): mount failed [ 195.847553][T18987] FAULT_INJECTION: forcing a failure. [ 195.847553][T18987] name failslab, interval 1, probability 0, space 0, times 0 [ 195.860188][T18987] CPU: 1 PID: 18987 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 195.868992][T18987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.873132][T18988] loop4: detected capacity change from 0 to 4096 [ 195.879247][T18987] Call Trace: [ 195.888868][T18987] dump_stack_lvl+0xd6/0x122 [ 195.893501][T18987] dump_stack+0x11/0x1b [ 195.897741][T18987] should_fail+0x23c/0x250 [ 195.902293][T18987] ? security_inode_alloc+0x30/0x180 [ 195.907870][T18987] __should_failslab+0x81/0x90 [ 195.912639][T18987] should_failslab+0x5/0x20 [ 195.917251][T18987] kmem_cache_alloc+0x4f/0x300 [ 195.922010][T18987] security_inode_alloc+0x30/0x180 [ 195.927469][T18987] inode_init_always+0x20b/0x430 [ 195.932488][T18987] ? shmem_match+0xa0/0xa0 [ 195.936889][T18987] new_inode_pseudo+0x73/0x1c0 [ 195.941682][T18987] new_inode+0x21/0x120 [ 195.945901][T18987] shmem_get_inode+0xb7/0x4a0 [ 195.950668][T18987] __shmem_file_setup+0xf1/0x1d0 [ 195.955682][T18987] shmem_file_setup+0x37/0x40 [ 195.960450][T18987] __se_sys_memfd_create+0x1eb/0x390 [ 195.965760][T18987] __x64_sys_memfd_create+0x2d/0x40 [ 195.971040][T18987] do_syscall_64+0x44/0xa0 [ 195.975941][T18987] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 195.982118][T18987] RIP: 0033:0x7f7d5c3528d9 [ 195.986839][T18987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 196.006780][T18987] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 196.015410][T18987] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7d5c3528d9 [ 196.023641][T18987] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007f7d5c3abe76 [ 196.031738][T18987] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 196.039851][T18987] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 196.047966][T18987] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 196.057990][T18988] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 196.071934][T18998] loop1: detected capacity change from 0 to 4096 16:54:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200007, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 5) 16:54:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0x1001) [ 196.104197][T18998] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 196.123128][T18998] EXT4-fs (loop1): get root inode failed [ 196.129101][T18998] EXT4-fs (loop1): mount failed [ 196.167738][T18998] loop1: detected capacity change from 0 to 4096 [ 196.175712][T19017] loop4: detected capacity change from 0 to 4096 [ 196.187822][T18998] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 196.191577][T19024] FAULT_INJECTION: forcing a failure. [ 196.191577][T19024] name failslab, interval 1, probability 0, space 0, times 0 16:54:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xfffffdef) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 196.212988][T19024] CPU: 0 PID: 19024 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 196.222102][T19024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.232327][T19024] Call Trace: [ 196.235696][T19024] dump_stack_lvl+0xd6/0x122 [ 196.240863][T19024] dump_stack+0x11/0x1b [ 196.245077][T19024] should_fail+0x23c/0x250 [ 196.249494][T19024] ? __d_alloc+0x36/0x370 [ 196.253832][T19024] __should_failslab+0x81/0x90 [ 196.258649][T19024] should_failslab+0x5/0x20 [ 196.261660][T19017] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 196.263244][T19024] kmem_cache_alloc+0x4f/0x300 [ 196.263266][T19024] ? security_inode_alloc+0x138/0x180 [ 196.284860][T19024] ? __init_rwsem+0x59/0x70 [ 196.289360][T19024] __d_alloc+0x36/0x370 [ 196.293519][T19024] d_alloc_pseudo+0x1a/0x50 [ 196.298267][T19024] alloc_file_pseudo+0x77/0x150 [ 196.299036][T18998] EXT4-fs (loop1): get root inode failed [ 196.303162][T19024] __shmem_file_setup+0x14c/0x1d0 16:54:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200008, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 196.303186][T19024] shmem_file_setup+0x37/0x40 [ 196.308849][T18998] EXT4-fs (loop1): mount failed [ 196.313889][T19024] __se_sys_memfd_create+0x1eb/0x390 [ 196.329549][T19024] __x64_sys_memfd_create+0x2d/0x40 [ 196.334842][T19024] do_syscall_64+0x44/0xa0 [ 196.339385][T19024] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 196.345295][T19024] RIP: 0033:0x7f7d5c3528d9 16:54:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 6) [ 196.349894][T19024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 196.369912][T19024] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 196.378837][T19024] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7d5c3528d9 [ 196.386979][T19024] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007f7d5c3abe76 [ 196.394941][T19024] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 196.403045][T19024] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 196.411014][T19024] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 16:54:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200010, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 196.439113][T19047] FAULT_INJECTION: forcing a failure. [ 196.439113][T19047] name failslab, interval 1, probability 0, space 0, times 0 [ 196.452022][T19047] CPU: 0 PID: 19047 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 196.461049][T19047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.471620][T19047] Call Trace: [ 196.474969][T19047] dump_stack_lvl+0xd6/0x122 [ 196.480118][T19047] dump_stack+0x11/0x1b [ 196.484815][T19047] should_fail+0x23c/0x250 16:54:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xfffffffffffffdef) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 196.489244][T19047] ? __alloc_file+0x2e/0x1a0 [ 196.493842][T19047] __should_failslab+0x81/0x90 [ 196.498606][T19047] should_failslab+0x5/0x20 [ 196.503099][T19047] kmem_cache_alloc+0x4f/0x300 [ 196.507931][T19047] __alloc_file+0x2e/0x1a0 [ 196.512462][T19047] alloc_empty_file+0xcd/0x1c0 [ 196.517340][T19047] alloc_file+0x3a/0x280 [ 196.521588][T19047] alloc_file_pseudo+0xfa/0x150 [ 196.526440][T19047] __shmem_file_setup+0x14c/0x1d0 [ 196.531531][T19047] shmem_file_setup+0x37/0x40 [ 196.536429][T19047] __se_sys_memfd_create+0x1eb/0x390 [ 196.541701][T19047] __x64_sys_memfd_create+0x2d/0x40 [ 196.546926][T19047] do_syscall_64+0x44/0xa0 [ 196.551619][T19047] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 196.557562][T19047] RIP: 0033:0x7f7d5c3528d9 [ 196.561998][T19047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 196.581851][T19047] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 196.590530][T19047] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7d5c3528d9 [ 196.598758][T19047] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007f7d5c3abe76 [ 196.606730][T19047] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 196.614778][T19047] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 196.622956][T19047] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 16:54:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 7) [ 196.656568][T19065] loop4: detected capacity change from 0 to 4096 [ 196.670595][T19065] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 196.685501][T19071] loop1: detected capacity change from 0 to 4096 [ 196.691484][T19073] FAULT_INJECTION: forcing a failure. [ 196.691484][T19073] name failslab, interval 1, probability 0, space 0, times 0 [ 196.705124][T19073] CPU: 1 PID: 19073 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 196.713898][T19073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.724123][T19073] Call Trace: [ 196.727405][T19073] dump_stack_lvl+0xd6/0x122 [ 196.732047][T19073] dump_stack+0x11/0x1b [ 196.736202][T19073] should_fail+0x23c/0x250 [ 196.740603][T19073] ? security_file_alloc+0x30/0x190 [ 196.745790][T19073] __should_failslab+0x81/0x90 [ 196.750627][T19073] should_failslab+0x5/0x20 [ 196.755222][T19073] kmem_cache_alloc+0x4f/0x300 [ 196.760059][T19073] security_file_alloc+0x30/0x190 [ 196.765141][T19073] __alloc_file+0x83/0x1a0 [ 196.769550][T19073] alloc_empty_file+0xcd/0x1c0 [ 196.774318][T19073] alloc_file+0x3a/0x280 [ 196.778611][T19073] alloc_file_pseudo+0xfa/0x150 [ 196.783462][T19073] __shmem_file_setup+0x14c/0x1d0 [ 196.788480][T19073] shmem_file_setup+0x37/0x40 [ 196.793227][T19073] __se_sys_memfd_create+0x1eb/0x390 [ 196.798594][T19073] __x64_sys_memfd_create+0x2d/0x40 [ 196.803858][T19073] do_syscall_64+0x44/0xa0 [ 196.808513][T19073] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 196.814625][T19073] RIP: 0033:0x7f7d5c3528d9 [ 196.819038][T19073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 196.839075][T19073] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 196.847616][T19073] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7d5c3528d9 16:54:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200009, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 196.855655][T19073] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00007f7d5c3abe76 [ 196.863638][T19073] RBP: 0000000000000004 R08: 0000000000004400 R09: ffffffffffffffff [ 196.871699][T19073] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 196.879663][T19073] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 16:54:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 8) [ 196.910974][T19071] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 196.923541][T19071] EXT4-fs (loop1): get root inode failed [ 196.929243][T19071] EXT4-fs (loop1): mount failed [ 196.936257][T19079] loop4: detected capacity change from 0 to 4096 [ 196.938729][T19085] FAULT_INJECTION: forcing a failure. [ 196.938729][T19085] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 196.955877][T19085] CPU: 1 PID: 19085 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 196.964817][T19085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.974907][T19085] Call Trace: [ 196.978184][T19085] dump_stack_lvl+0xd6/0x122 [ 196.982822][T19085] dump_stack+0x11/0x1b [ 196.987057][T19085] should_fail+0x23c/0x250 [ 196.991470][T19085] __alloc_pages+0x102/0x320 [ 196.996059][T19085] alloc_pages_vma+0x5ee/0x770 [ 197.000820][T19085] shmem_getpage_gfp+0x96d/0x13d0 [ 197.005849][T19085] ? policydb_context_isvalid+0x135/0x230 [ 197.011598][T19085] shmem_write_begin+0x7e/0x100 [ 197.016450][T19085] generic_perform_write+0x1b8/0x3e0 [ 197.022030][T19085] __generic_file_write_iter+0x174/0x310 [ 197.027821][T19085] ? generic_write_checks+0x250/0x290 [ 197.033184][T19085] generic_file_write_iter+0x75/0x130 [ 197.038599][T19085] vfs_write+0x7bc/0x900 [ 197.042860][T19085] __x64_sys_pwrite64+0xf5/0x150 [ 197.047782][T19085] do_syscall_64+0x44/0xa0 [ 197.052224][T19085] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 197.058188][T19085] RIP: 0033:0x7f7d5c3058a7 [ 197.062611][T19085] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 197.082997][T19085] RSP: 002b:00007f7d5a0c9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 197.091392][T19085] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c3058a7 [ 197.099369][T19085] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 16:54:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0x1001) [ 197.107328][T19085] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 197.115317][T19085] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 197.123425][T19085] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 197.139869][T19071] loop1: detected capacity change from 0 to 4096 [ 197.150958][T19085] loop2: detected capacity change from 0 to 4096 16:54:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 197.167352][T19071] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 197.180845][T19079] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 197.186777][T19085] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 197.196320][T19071] EXT4-fs (loop1): get root inode failed [ 197.204040][T19071] EXT4-fs (loop1): mount failed 16:54:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200011, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 9) [ 197.284806][T19122] loop4: detected capacity change from 0 to 4096 [ 197.298342][T19126] FAULT_INJECTION: forcing a failure. [ 197.298342][T19126] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 197.306540][T19127] loop1: detected capacity change from 0 to 4096 [ 197.311824][T19126] CPU: 0 PID: 19126 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 197.327113][T19126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.337431][T19126] Call Trace: [ 197.340774][T19126] dump_stack_lvl+0xd6/0x122 [ 197.345455][T19126] dump_stack+0x11/0x1b [ 197.349785][T19126] should_fail+0x23c/0x250 [ 197.354192][T19126] should_fail_usercopy+0x16/0x20 [ 197.359212][T19126] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 197.364957][T19126] ? shmem_write_begin+0x7e/0x100 [ 197.370263][T19126] generic_perform_write+0x201/0x3e0 [ 197.375562][T19126] __generic_file_write_iter+0x174/0x310 [ 197.381348][T19126] ? generic_write_checks+0x250/0x290 [ 197.386711][T19126] generic_file_write_iter+0x75/0x130 [ 197.392090][T19126] vfs_write+0x7bc/0x900 [ 197.396367][T19126] __x64_sys_pwrite64+0xf5/0x150 [ 197.401322][T19126] do_syscall_64+0x44/0xa0 [ 197.405727][T19126] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 197.411724][T19126] RIP: 0033:0x7f7d5c3058a7 [ 197.416261][T19126] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 197.436507][T19126] RSP: 002b:00007f7d5a0c9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 197.445458][T19126] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c3058a7 [ 197.453422][T19126] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 197.461383][T19126] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 197.469363][T19126] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 197.477712][T19126] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 16:54:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xffffffffffffffff) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000b, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 197.505976][T19127] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 197.506903][T19126] loop2: detected capacity change from 0 to 4096 [ 197.521187][T19122] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 197.540457][T19127] EXT4-fs (loop1): get root inode failed [ 197.546189][T19127] EXT4-fs (loop1): mount failed 16:54:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 10) [ 197.565707][T19126] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 197.607149][T19127] loop1: detected capacity change from 0 to 4096 [ 197.614899][T19127] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 197.629487][T19147] loop4: detected capacity change from 0 to 4096 [ 197.636336][T19161] FAULT_INJECTION: forcing a failure. [ 197.636336][T19161] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 197.649542][T19161] CPU: 1 PID: 19161 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 197.658311][T19161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.668608][T19161] Call Trace: [ 197.672037][T19161] dump_stack_lvl+0xd6/0x122 [ 197.676641][T19161] dump_stack+0x11/0x1b [ 197.680924][T19161] should_fail+0x23c/0x250 [ 197.685423][T19161] should_fail_usercopy+0x16/0x20 [ 197.690531][T19161] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 197.696240][T19161] ? shmem_write_begin+0x7e/0x100 [ 197.701855][T19161] generic_perform_write+0x201/0x3e0 [ 197.708232][T19161] __generic_file_write_iter+0x174/0x310 [ 197.713960][T19161] ? generic_write_checks+0x250/0x290 [ 197.719402][T19161] generic_file_write_iter+0x75/0x130 [ 197.724762][T19161] vfs_write+0x7bc/0x900 [ 197.728993][T19161] __x64_sys_pwrite64+0xf5/0x150 [ 197.733920][T19161] do_syscall_64+0x44/0xa0 [ 197.738384][T19161] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 197.744268][T19161] RIP: 0033:0x7f7d5c3058a7 [ 197.748732][T19161] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 197.768605][T19161] RSP: 002b:00007f7d5a0c9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 197.777116][T19161] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c3058a7 [ 197.785068][T19161] RDX: 000000000000001f RSI: 0000000020010100 RDI: 0000000000000004 [ 197.793110][T19161] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 197.801063][T19161] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000004 [ 197.809131][T19161] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 197.818308][T19147] EXT4-fs: failed to create workqueue [ 197.823953][T19147] EXT4-fs (loop4): mount failed [ 197.832157][T19127] EXT4-fs (loop1): get root inode failed [ 197.838025][T19127] EXT4-fs (loop1): mount failed [ 197.843968][T19161] loop2: detected capacity change from 0 to 4096 16:54:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200012, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 11) [ 197.857854][T19161] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 197.901937][T19175] FAULT_INJECTION: forcing a failure. [ 197.901937][T19175] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 197.915398][T19175] CPU: 1 PID: 19175 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 197.924713][T19175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.934879][T19175] Call Trace: [ 197.938215][T19175] dump_stack_lvl+0xd6/0x122 [ 197.942793][T19175] dump_stack+0x11/0x1b [ 197.946956][T19175] should_fail+0x23c/0x250 [ 197.951510][T19175] __alloc_pages+0x102/0x320 [ 197.956397][T19175] alloc_pages_vma+0x5ee/0x770 [ 197.961198][T19175] shmem_getpage_gfp+0x96d/0x13d0 [ 197.966592][T19175] ? policydb_context_isvalid+0x135/0x230 [ 197.972313][T19175] shmem_write_begin+0x7e/0x100 [ 197.977210][T19175] generic_perform_write+0x1b8/0x3e0 [ 197.982499][T19175] __generic_file_write_iter+0x174/0x310 [ 197.988142][T19175] ? generic_write_checks+0x250/0x290 [ 197.993913][T19175] generic_file_write_iter+0x75/0x130 16:54:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, 0x0, 0x10034) 16:54:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0x1001) [ 197.999470][T19175] vfs_write+0x7bc/0x900 [ 198.003752][T19175] __x64_sys_pwrite64+0xf5/0x150 [ 198.008765][T19175] do_syscall_64+0x44/0xa0 [ 198.013241][T19175] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 198.019322][T19175] RIP: 0033:0x7f7d5c3058a7 [ 198.023740][T19175] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 198.043614][T19175] RSP: 002b:00007f7d5a0c9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 198.052032][T19175] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c3058a7 [ 198.060014][T19175] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000004 [ 198.068008][T19175] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 198.075969][T19175] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 198.084103][T19175] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 198.107429][T19176] loop4: detected capacity change from 0 to 4096 [ 198.107911][T19175] loop2: detected capacity change from 0 to 4096 [ 198.129545][T19197] loop1: detected capacity change from 0 to 4096 [ 198.138047][T19175] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 198.148120][T19175] EXT4-fs (loop2): group descriptors corrupted! 16:54:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 12) [ 198.159693][T19176] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 198.174253][T19205] FAULT_INJECTION: forcing a failure. [ 198.174253][T19205] name failslab, interval 1, probability 0, space 0, times 0 [ 198.187200][T19205] CPU: 0 PID: 19205 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 198.195948][T19205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.206017][T19205] Call Trace: [ 198.209289][T19205] dump_stack_lvl+0xd6/0x122 [ 198.213870][T19205] dump_stack+0x11/0x1b [ 198.218013][T19205] should_fail+0x23c/0x250 [ 198.222509][T19205] ? xas_create+0x3fb/0xb30 [ 198.226993][T19205] __should_failslab+0x81/0x90 [ 198.231739][T19205] should_failslab+0x5/0x20 [ 198.236314][T19205] kmem_cache_alloc+0x4f/0x300 [ 198.241321][T19205] ? __perf_event_task_sched_out+0xe6b/0xec0 [ 198.247536][T19205] xas_create+0x3fb/0xb30 [ 198.251887][T19205] ? get_page_from_freelist+0x510/0x830 [ 198.257465][T19205] xas_create_range+0x146/0x360 [ 198.262300][T19205] shmem_add_to_page_cache+0x3bd/0x660 [ 198.267744][T19205] shmem_getpage_gfp+0xba5/0x13d0 [ 198.272764][T19205] ? policydb_context_isvalid+0x135/0x230 [ 198.278524][T19205] shmem_write_begin+0x7e/0x100 [ 198.283741][T19205] generic_perform_write+0x1b8/0x3e0 [ 198.289575][T19205] __generic_file_write_iter+0x174/0x310 [ 198.295208][T19205] ? generic_write_checks+0x250/0x290 [ 198.300587][T19205] generic_file_write_iter+0x75/0x130 [ 198.305958][T19205] vfs_write+0x7bc/0x900 [ 198.310215][T19205] __x64_sys_pwrite64+0xf5/0x150 [ 198.315235][T19205] do_syscall_64+0x44/0xa0 [ 198.319666][T19205] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 198.325563][T19205] RIP: 0033:0x7f7d5c3058a7 [ 198.330164][T19205] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 198.350058][T19205] RSP: 002b:00007f7d5a0c9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 198.358555][T19205] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c3058a7 [ 198.367217][T19205] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000004 [ 198.375205][T19205] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 198.383870][T19205] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 198.392103][T19205] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 16:54:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x80800, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) ppoll(&(0x7f0000000440)=[{r4, 0x18}, {r2, 0xa640}, {r1, 0x8}, {r5, 0x100}, {r1, 0x8050}, {r0}, {r2, 0x200}], 0x7, &(0x7f00000004c0)={r6, r7+10000000}, &(0x7f0000000500)={[0x7fffffff]}, 0x8) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 198.413995][T19197] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 198.427035][T19205] loop2: detected capacity change from 0 to 4096 [ 198.453942][T19197] EXT4-fs (loop1): get root inode failed 16:54:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200022, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 13) [ 198.459837][T19197] EXT4-fs (loop1): mount failed [ 198.474080][T19205] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 198.515848][T19223] loop1: detected capacity change from 0 to 4096 [ 198.544868][T19223] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 198.553108][T19232] loop4: detected capacity change from 0 to 4096 [ 198.559983][T19237] FAULT_INJECTION: forcing a failure. [ 198.559983][T19237] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 198.571514][T19223] EXT4-fs (loop1): get root inode failed [ 198.576644][T19237] CPU: 0 PID: 19237 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 198.582844][T19223] EXT4-fs (loop1): mount failed [ 198.591869][T19237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.591885][T19237] Call Trace: [ 198.591891][T19237] dump_stack_lvl+0xd6/0x122 [ 198.591917][T19237] dump_stack+0x11/0x1b [ 198.619536][T19237] should_fail+0x23c/0x250 [ 198.623953][T19237] should_fail_usercopy+0x16/0x20 [ 198.629288][T19237] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 198.635759][T19237] ? shmem_write_begin+0x7e/0x100 [ 198.640786][T19237] generic_perform_write+0x201/0x3e0 [ 198.646065][T19237] __generic_file_write_iter+0x174/0x310 [ 198.652030][T19237] ? generic_write_checks+0x250/0x290 [ 198.657828][T19237] generic_file_write_iter+0x75/0x130 [ 198.663188][T19237] vfs_write+0x7bc/0x900 [ 198.667435][T19237] __x64_sys_pwrite64+0xf5/0x150 [ 198.672417][T19237] do_syscall_64+0x44/0xa0 [ 198.677112][T19237] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 198.683693][T19237] RIP: 0033:0x7f7d5c3058a7 [ 198.688539][T19237] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 198.708510][T19237] RSP: 002b:00007f7d5a0c9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 198.717055][T19237] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c3058a7 [ 198.725137][T19237] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000004 [ 198.733179][T19237] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 198.741247][T19237] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 198.749347][T19237] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 198.759145][T19232] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 198.762574][T19237] loop2: detected capacity change from 0 to 4096 [ 198.791034][T19223] loop1: detected capacity change from 0 to 4096 [ 198.795197][T19237] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000e, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 14) [ 198.813644][T19223] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 198.840360][T19223] EXT4-fs (loop1): get root inode failed [ 198.846157][T19223] EXT4-fs (loop1): mount failed 16:54:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, 0x0, 0x10034) 16:54:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200025, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 198.925502][T19257] loop4: detected capacity change from 0 to 4096 [ 198.937091][T19257] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 198.954557][T19272] FAULT_INJECTION: forcing a failure. [ 198.954557][T19272] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 198.954824][T19275] loop1: detected capacity change from 0 to 4096 16:54:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000f, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 198.967970][T19272] CPU: 1 PID: 19272 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 198.967995][T19272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.993214][T19272] Call Trace: [ 198.996793][T19272] dump_stack_lvl+0xd6/0x122 [ 199.001441][T19272] dump_stack+0x11/0x1b [ 199.005602][T19272] should_fail+0x23c/0x250 [ 199.010018][T19272] __alloc_pages+0x102/0x320 [ 199.014617][T19272] alloc_pages_vma+0x5ee/0x770 [ 199.020079][T19272] shmem_getpage_gfp+0x96d/0x13d0 [ 199.025124][T19272] ? policydb_context_isvalid+0x135/0x230 [ 199.030934][T19272] shmem_write_begin+0x7e/0x100 [ 199.035776][T19272] generic_perform_write+0x1b8/0x3e0 [ 199.041324][T19272] __generic_file_write_iter+0x174/0x310 [ 199.046947][T19272] ? generic_write_checks+0x250/0x290 [ 199.052391][T19272] generic_file_write_iter+0x75/0x130 [ 199.057805][T19272] vfs_write+0x7bc/0x900 [ 199.062041][T19272] __x64_sys_pwrite64+0xf5/0x150 [ 199.067068][T19272] do_syscall_64+0x44/0xa0 [ 199.071601][T19272] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 199.077741][T19272] RIP: 0033:0x7f7d5c3058a7 [ 199.082245][T19272] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 199.101945][T19272] RSP: 002b:00007f7d5a0c9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 199.110351][T19272] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c3058a7 [ 199.118423][T19272] RDX: 000000000000001d RSI: 0000000020012600 RDI: 0000000000000004 [ 199.126625][T19272] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 199.134780][T19272] R10: 0000000000004400 R11: 0000000000000293 R12: 0000000000000004 [ 199.142744][T19272] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 199.160746][T19275] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 199.162067][T19272] loop2: detected capacity change from 0 to 4096 [ 199.184333][T19275] EXT4-fs (loop1): get root inode failed [ 199.190033][T19275] EXT4-fs (loop1): mount failed [ 199.194981][T19272] EXT4-fs error (device loop2): ext4_fill_super:4816: inode #2: comm syz-executor.2: iget: root inode unallocated [ 199.215209][T19272] EXT4-fs (loop2): get root inode failed [ 199.221503][T19272] EXT4-fs (loop2): mount failed 16:54:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10040, 0x8) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 15) [ 199.229623][T19293] loop4: detected capacity change from 0 to 4096 [ 199.240409][T19293] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 199.258654][T19275] loop1: detected capacity change from 0 to 4096 16:54:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200010, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 199.307831][T19275] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 199.330940][T19275] EXT4-fs (loop1): get root inode failed [ 199.332900][T19315] FAULT_INJECTION: forcing a failure. [ 199.332900][T19315] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 199.336673][T19275] EXT4-fs (loop1): mount failed [ 199.349696][T19315] CPU: 1 PID: 19315 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 199.363510][T19315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.374206][T19315] Call Trace: [ 199.377919][T19315] dump_stack_lvl+0xd6/0x122 [ 199.383018][T19315] dump_stack+0x11/0x1b [ 199.387446][T19315] should_fail+0x23c/0x250 [ 199.392110][T19315] should_fail_usercopy+0x16/0x20 [ 199.397129][T19315] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 199.403135][T19315] ? shmem_write_begin+0x7e/0x100 [ 199.408273][T19315] generic_perform_write+0x201/0x3e0 [ 199.413576][T19315] __generic_file_write_iter+0x174/0x310 [ 199.420818][T19315] ? generic_write_checks+0x250/0x290 [ 199.426717][T19315] generic_file_write_iter+0x75/0x130 [ 199.432823][T19315] vfs_write+0x7bc/0x900 [ 199.437148][T19315] __x64_sys_pwrite64+0xf5/0x150 [ 199.442391][T19315] do_syscall_64+0x44/0xa0 [ 199.447174][T19315] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 199.453307][T19315] RIP: 0033:0x7f7d5c3058a7 [ 199.457977][T19315] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 199.478482][T19315] RSP: 002b:00007f7d5a0c9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 199.487433][T19315] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c3058a7 [ 199.495421][T19315] RDX: 000000000000001d RSI: 0000000020012600 RDI: 0000000000000004 16:54:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20002e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 199.503923][T19315] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 199.513520][T19315] R10: 0000000000004400 R11: 0000000000000293 R12: 0000000000000004 [ 199.522218][T19315] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 199.532659][T19315] loop2: detected capacity change from 0 to 4096 16:54:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 16) [ 199.561145][T19315] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 199.563319][T19326] loop1: detected capacity change from 0 to 4096 [ 199.602617][T19333] loop4: detected capacity change from 0 to 4096 [ 199.611723][T19326] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 199.624971][T19326] EXT4-fs (loop1): get root inode failed [ 199.630859][T19326] EXT4-fs (loop1): mount failed 16:54:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200011, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 199.645330][T19333] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 199.660897][T19343] FAULT_INJECTION: forcing a failure. [ 199.660897][T19343] name failslab, interval 1, probability 0, space 0, times 0 [ 199.674314][T19343] CPU: 0 PID: 19343 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 199.683576][T19343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.694028][T19343] Call Trace: [ 199.697322][T19343] dump_stack_lvl+0xd6/0x122 [ 199.701952][T19343] dump_stack+0x11/0x1b [ 199.706096][T19343] should_fail+0x23c/0x250 [ 199.710497][T19343] ? getname_flags+0x84/0x3f0 [ 199.715174][T19343] __should_failslab+0x81/0x90 [ 199.720050][T19343] should_failslab+0x5/0x20 [ 199.724545][T19343] kmem_cache_alloc+0x4f/0x300 [ 199.729376][T19343] getname_flags+0x84/0x3f0 [ 199.733891][T19343] getname+0x15/0x20 [ 199.737857][T19343] do_sys_openat2+0x6d/0x2b0 [ 199.742426][T19343] __x64_sys_openat+0xef/0x110 [ 199.747218][T19343] do_syscall_64+0x44/0xa0 16:54:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, 0x0, 0x10034) [ 199.751635][T19343] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 199.757780][T19343] RIP: 0033:0x7f7d5c3057f4 [ 199.762189][T19343] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 199.782132][T19343] RSP: 002b:00007f7d5a0c9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 199.790550][T19343] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c3057f4 16:54:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 199.798525][T19343] RDX: 0000000000000002 RSI: 00007f7d5a0ca000 RDI: 00000000ffffff9c [ 199.806642][T19343] RBP: 00007f7d5a0ca000 R08: 0000000000000000 R09: ffffffffffffffff [ 199.814607][T19343] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 199.822563][T19343] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 199.844549][T19326] loop1: detected capacity change from 0 to 4096 16:54:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 17) [ 199.865427][T19326] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 199.883170][T19366] loop4: detected capacity change from 0 to 4096 [ 199.895104][T19326] EXT4-fs (loop1): get root inode failed [ 199.896185][T19370] FAULT_INJECTION: forcing a failure. [ 199.896185][T19370] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 199.900925][T19326] EXT4-fs (loop1): mount failed [ 199.914132][T19370] CPU: 0 PID: 19370 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 199.927721][T19370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.937842][T19370] Call Trace: [ 199.941114][T19370] dump_stack_lvl+0xd6/0x122 [ 199.945690][T19370] dump_stack+0x11/0x1b [ 199.949845][T19370] should_fail+0x23c/0x250 [ 199.954742][T19370] should_fail_usercopy+0x16/0x20 [ 199.959826][T19370] strncpy_from_user+0x21/0x250 [ 199.964688][T19370] getname_flags+0xb8/0x3f0 [ 199.969206][T19370] getname+0x15/0x20 [ 199.973097][T19370] do_sys_openat2+0x6d/0x2b0 [ 199.977728][T19370] __x64_sys_openat+0xef/0x110 [ 199.982486][T19370] do_syscall_64+0x44/0xa0 [ 199.986978][T19370] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 199.993077][T19370] RIP: 0033:0x7f7d5c3057f4 [ 199.997566][T19370] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 200.017461][T19370] RSP: 002b:00007f7d5a0c9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 200.025869][T19370] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c3057f4 [ 200.034174][T19370] RDX: 0000000000000002 RSI: 00007f7d5a0ca000 RDI: 00000000ffffff9c [ 200.042153][T19370] RBP: 00007f7d5a0ca000 R08: 0000000000000000 R09: ffffffffffffffff [ 200.050117][T19370] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 200.058080][T19370] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:54:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 18) [ 200.081856][T19366] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 200.101338][T19381] FAULT_INJECTION: forcing a failure. [ 200.101338][T19381] name failslab, interval 1, probability 0, space 0, times 0 [ 200.114256][T19381] CPU: 0 PID: 19381 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 16:54:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200012, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 200.123025][T19381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.133437][T19381] Call Trace: [ 200.136803][T19381] dump_stack_lvl+0xd6/0x122 [ 200.141388][T19381] dump_stack+0x11/0x1b [ 200.145566][T19381] should_fail+0x23c/0x250 [ 200.149967][T19381] ? __alloc_file+0x2e/0x1a0 [ 200.154579][T19381] __should_failslab+0x81/0x90 [ 200.159327][T19381] should_failslab+0x5/0x20 [ 200.163912][T19381] kmem_cache_alloc+0x4f/0x300 [ 200.168936][T19381] __alloc_file+0x2e/0x1a0 [ 200.173544][T19381] alloc_empty_file+0xcd/0x1c0 [ 200.178298][T19381] path_openat+0x6a/0x1ec0 [ 200.182708][T19381] ? copy_page_from_iter_atomic+0x44b/0xbb0 [ 200.188972][T19381] ? set_page_dirty+0xf4/0x1a0 [ 200.194554][T19381] ? shmem_write_end+0x37d/0x3d0 [ 200.200060][T19381] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 200.206291][T19381] ? generic_perform_write+0x377/0x3e0 [ 200.211883][T19381] do_filp_open+0x105/0x220 [ 200.216888][T19381] do_sys_openat2+0xb5/0x2b0 [ 200.221488][T19381] __x64_sys_openat+0xef/0x110 [ 200.226271][T19381] do_syscall_64+0x44/0xa0 [ 200.230710][T19381] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 200.236765][T19381] RIP: 0033:0x7f7d5c3057f4 [ 200.241159][T19381] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 200.260875][T19381] RSP: 002b:00007f7d5a0c9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 200.269747][T19381] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c3057f4 16:54:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') fcntl$setsig(r4, 0xa, 0x40) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 19) 16:54:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200048, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 200.277733][T19381] RDX: 0000000000000002 RSI: 00007f7d5a0ca000 RDI: 00000000ffffff9c [ 200.285716][T19381] RBP: 00007f7d5a0ca000 R08: 0000000000000000 R09: ffffffffffffffff [ 200.294367][T19381] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 200.302848][T19381] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 200.368082][T19395] FAULT_INJECTION: forcing a failure. [ 200.368082][T19395] name failslab, interval 1, probability 0, space 0, times 0 [ 200.381299][T19395] CPU: 0 PID: 19395 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 200.390155][T19395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.394203][T19400] loop4: detected capacity change from 0 to 4096 [ 200.400300][T19395] Call Trace: [ 200.400312][T19395] dump_stack_lvl+0xd6/0x122 [ 200.400343][T19395] dump_stack+0x11/0x1b [ 200.400359][T19395] should_fail+0x23c/0x250 [ 200.407465][T19401] loop1: detected capacity change from 0 to 4096 [ 200.410120][T19395] ? security_file_alloc+0x30/0x190 [ 200.410148][T19395] __should_failslab+0x81/0x90 [ 200.440579][T19395] should_failslab+0x5/0x20 [ 200.445080][T19395] kmem_cache_alloc+0x4f/0x300 [ 200.450025][T19395] security_file_alloc+0x30/0x190 [ 200.455047][T19395] __alloc_file+0x83/0x1a0 [ 200.459512][T19395] alloc_empty_file+0xcd/0x1c0 [ 200.464336][T19395] path_openat+0x6a/0x1ec0 [ 200.468994][T19395] ? copy_page_from_iter_atomic+0x44b/0xbb0 [ 200.474883][T19395] ? set_page_dirty+0xf4/0x1a0 [ 200.479643][T19395] ? shmem_write_end+0x37d/0x3d0 [ 200.485123][T19395] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 200.491454][T19395] ? generic_perform_write+0x377/0x3e0 [ 200.497262][T19395] do_filp_open+0x105/0x220 [ 200.502592][T19395] do_sys_openat2+0xb5/0x2b0 [ 200.507184][T19395] __x64_sys_openat+0xef/0x110 [ 200.511935][T19395] do_syscall_64+0x44/0xa0 [ 200.516355][T19395] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 200.522587][T19395] RIP: 0033:0x7f7d5c3057f4 [ 200.527307][T19395] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 200.547173][T19395] RSP: 002b:00007f7d5a0c9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 200.555585][T19395] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c3057f4 [ 200.563585][T19395] RDX: 0000000000000002 RSI: 00007f7d5a0ca000 RDI: 00000000ffffff9c [ 200.571538][T19395] RBP: 00007f7d5a0ca000 R08: 0000000000000000 R09: ffffffffffffffff [ 200.579490][T19395] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 200.587458][T19395] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:54:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 20) [ 200.619114][T19400] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 200.634952][T19401] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 200.663488][T19401] EXT4-fs (loop1): get root inode failed 16:54:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200018, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) (fail_nth: 1) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 200.666713][T19414] FAULT_INJECTION: forcing a failure. [ 200.666713][T19414] name failslab, interval 1, probability 0, space 0, times 0 [ 200.669292][T19401] EXT4-fs (loop1): mount failed [ 200.681945][T19414] CPU: 1 PID: 19414 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 200.695607][T19414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.706233][T19414] Call Trace: [ 200.709526][T19414] dump_stack_lvl+0xd6/0x122 [ 200.714125][T19414] dump_stack+0x11/0x1b [ 200.718292][T19414] should_fail+0x23c/0x250 [ 200.722803][T19414] ? kzalloc+0x16/0x20 [ 200.726912][T19414] __should_failslab+0x81/0x90 [ 200.731752][T19414] should_failslab+0x5/0x20 [ 200.736427][T19414] __kmalloc+0x6f/0x350 [ 200.740652][T19414] ? _atomic_dec_and_lock+0x60/0xd0 [ 200.746018][T19414] kzalloc+0x16/0x20 [ 200.750809][T19414] alloc_workqueue+0x12f/0xad0 [ 200.755673][T19414] ? disk_unblock_events+0x35/0x40 [ 200.760918][T19414] ? bd_prepare_to_claim+0x1e6/0x270 [ 200.766467][T19414] ? loop_attr_do_show_dio+0x70/0x70 [ 200.772188][T19414] ? loop_set_status_from_info+0x35e/0x3a0 [ 200.778021][T19414] loop_configure+0x681/0xeb0 [ 200.782690][T19414] lo_ioctl+0x618/0x13e0 [ 200.787277][T19414] ? path_openat+0x18d4/0x1ec0 [ 200.792261][T19414] ? blkdev_common_ioctl+0x438/0x1110 [ 200.792633][T19425] FAULT_INJECTION: forcing a failure. [ 200.792633][T19425] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 200.797634][T19414] ? selinux_file_ioctl+0x981/0xa10 [ 200.797664][T19414] ? lo_release+0x120/0x120 [ 200.797684][T19414] blkdev_ioctl+0x1d0/0x3f0 [ 200.825383][T19414] block_ioctl+0x6e/0x80 [ 200.829886][T19414] ? blkdev_iopoll+0x80/0x80 [ 200.834573][T19414] __se_sys_ioctl+0xcb/0x140 [ 200.839207][T19414] __x64_sys_ioctl+0x3f/0x50 [ 200.843968][T19414] do_syscall_64+0x44/0xa0 [ 200.848602][T19414] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 200.855234][T19414] RIP: 0033:0x7f7d5c352697 [ 200.859750][T19414] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 200.880235][T19414] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 200.889362][T19414] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 200.897680][T19414] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 200.906428][T19414] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 200.914560][T19414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 200.923731][T19414] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 200.931695][T19425] CPU: 0 PID: 19425 Comm: syz-executor.0 Not tainted 5.15.0-rc4-syzkaller #0 [ 200.940549][T19425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.950604][T19425] Call Trace: [ 200.953882][T19425] dump_stack_lvl+0xd6/0x122 [ 200.958485][T19425] dump_stack+0x11/0x1b [ 200.962788][T19425] should_fail+0x23c/0x250 16:54:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 21) [ 200.967260][T19425] should_fail_usercopy+0x16/0x20 [ 200.972387][T19425] _copy_from_user+0x1c/0xd0 [ 200.977030][T19425] iovec_from_user+0xc4/0x2e0 [ 200.981838][T19425] ? get_page_from_freelist+0x55e/0x830 [ 200.986053][T19434] FAULT_INJECTION: forcing a failure. [ 200.986053][T19434] name failslab, interval 1, probability 0, space 0, times 0 [ 200.987478][T19425] __import_iovec+0x57/0x2c0 [ 201.004811][T19425] ? __alloc_pages+0x194/0x320 [ 201.009591][T19425] import_iovec+0x69/0x80 [ 201.013922][T19425] __se_sys_vmsplice+0x162/0x9a0 [ 201.018846][T19425] ? kstrtouint_from_user+0x13c/0x170 [ 201.024230][T19425] ? 0xffffffff81000000 [ 201.028369][T19425] ? proc_fail_nth_write+0x127/0x150 [ 201.033645][T19425] ? __fget_light+0x21b/0x260 [ 201.038485][T19425] ? __cond_resched+0x11/0x40 [ 201.043332][T19425] ? fput+0x2d/0x130 [ 201.047521][T19425] ? ksys_write+0x162/0x190 [ 201.052065][T19425] __x64_sys_vmsplice+0x51/0x60 [ 201.056932][T19425] do_syscall_64+0x44/0xa0 [ 201.061340][T19425] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 201.067240][T19425] RIP: 0033:0x7f1a027158d9 [ 201.072107][T19425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 201.092337][T19425] RSP: 002b:00007f1a0046c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 201.100749][T19425] RAX: ffffffffffffffda RBX: 00007f1a0281a020 RCX: 00007f1a027158d9 [ 201.109078][T19425] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000006 [ 201.117412][T19425] RBP: 00007f1a0046c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.126163][T19425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.134638][T19425] R13: 00007ffed93cb76f R14: 00007f1a0046c300 R15: 0000000000022000 [ 201.142687][T19434] CPU: 1 PID: 19434 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 201.151853][T19434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.162120][T19434] Call Trace: [ 201.165736][T19434] dump_stack_lvl+0xd6/0x122 [ 201.170351][T19434] dump_stack+0x11/0x1b [ 201.174490][T19434] should_fail+0x23c/0x250 [ 201.178954][T19434] __should_failslab+0x81/0x90 [ 201.183718][T19434] ? alloc_workqueue+0x15d/0xad0 [ 201.188975][T19434] should_failslab+0x5/0x20 [ 201.193841][T19434] kmem_cache_alloc_trace+0x52/0x320 [ 201.199226][T19434] alloc_workqueue+0x15d/0xad0 [ 201.204342][T19434] ? disk_unblock_events+0x35/0x40 [ 201.210673][T19434] ? bd_prepare_to_claim+0x1e6/0x270 [ 201.216052][T19434] ? loop_attr_do_show_dio+0x70/0x70 [ 201.221384][T19434] ? loop_set_status_from_info+0x35e/0x3a0 [ 201.227701][T19434] loop_configure+0x681/0xeb0 [ 201.232638][T19434] lo_ioctl+0x618/0x13e0 [ 201.236901][T19434] ? path_openat+0x18d4/0x1ec0 [ 201.241742][T19434] ? blkdev_common_ioctl+0x438/0x1110 [ 201.247430][T19434] ? selinux_file_ioctl+0x981/0xa10 [ 201.252633][T19434] ? lo_release+0x120/0x120 [ 201.257122][T19434] blkdev_ioctl+0x1d0/0x3f0 [ 201.261613][T19434] block_ioctl+0x6e/0x80 [ 201.266039][T19434] ? blkdev_iopoll+0x80/0x80 [ 201.270624][T19434] __se_sys_ioctl+0xcb/0x140 [ 201.275382][T19434] __x64_sys_ioctl+0x3f/0x50 [ 201.280173][T19434] do_syscall_64+0x44/0xa0 [ 201.284594][T19434] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 201.291015][T19434] RIP: 0033:0x7f7d5c352697 [ 201.295419][T19434] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 16:54:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) (fail_nth: 2) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x4) vmsplice(r2, &(0x7f0000000280), 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') dup(r4) read(r3, &(0x7f00000002c0)=""/186, 0xba) r5 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x40000) fcntl$getown(r5, 0x9) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f00000008c0)={{}, 0x0, 0x0, @unused=[0x8, 0x8, 0x20, 0x5], @devid}) [ 201.315236][T19434] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 201.323631][T19434] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 201.331591][T19434] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 201.339988][T19434] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 201.348120][T19434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 201.356378][T19434] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:54:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20004c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 22) [ 201.456753][T19453] loop1: detected capacity change from 0 to 4096 [ 201.463721][T19458] FAULT_INJECTION: forcing a failure. [ 201.463721][T19458] name failslab, interval 1, probability 0, space 0, times 0 [ 201.463913][T19461] loop4: detected capacity change from 0 to 4096 [ 201.481779][T19458] CPU: 0 PID: 19458 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 201.497429][T19458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.507931][T19458] Call Trace: [ 201.511225][T19458] dump_stack_lvl+0xd6/0x122 [ 201.515831][T19458] dump_stack+0x11/0x1b [ 201.520112][T19458] should_fail+0x23c/0x250 [ 201.524785][T19458] ? kzalloc+0x16/0x20 [ 201.528934][T19458] __should_failslab+0x81/0x90 [ 201.533739][T19458] should_failslab+0x5/0x20 [ 201.538481][T19458] __kmalloc+0x6f/0x350 [ 201.542634][T19458] ? number+0xa13/0xb60 [ 201.546884][T19458] kzalloc+0x16/0x20 [ 201.550872][T19458] apply_wqattrs_prepare+0x3a/0x630 [ 201.556062][T19458] ? vsnprintf+0xe8f/0xed0 [ 201.560588][T19458] apply_workqueue_attrs+0x9e/0x100 [ 201.565837][T19458] alloc_workqueue+0x777/0xad0 [ 201.570673][T19458] ? bd_prepare_to_claim+0x1e6/0x270 [ 201.575995][T19458] ? loop_attr_do_show_dio+0x70/0x70 [ 201.581452][T19458] ? loop_set_status_from_info+0x35e/0x3a0 [ 201.587256][T19458] loop_configure+0x681/0xeb0 [ 201.591988][T19458] lo_ioctl+0x618/0x13e0 [ 201.596266][T19458] ? path_openat+0x18d4/0x1ec0 [ 201.601017][T19458] ? blkdev_common_ioctl+0x438/0x1110 [ 201.606419][T19458] ? selinux_file_ioctl+0x981/0xa10 [ 201.611863][T19458] ? lo_release+0x120/0x120 [ 201.616354][T19458] blkdev_ioctl+0x1d0/0x3f0 [ 201.620938][T19458] block_ioctl+0x6e/0x80 [ 201.625241][T19458] ? blkdev_iopoll+0x80/0x80 [ 201.629942][T19458] __se_sys_ioctl+0xcb/0x140 [ 201.634517][T19458] __x64_sys_ioctl+0x3f/0x50 [ 201.639196][T19458] do_syscall_64+0x44/0xa0 [ 201.643612][T19458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 201.649858][T19458] RIP: 0033:0x7f7d5c352697 [ 201.654255][T19458] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 201.674644][T19458] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 201.683302][T19458] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 201.691429][T19458] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 201.699615][T19458] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 16:54:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 23) [ 201.707589][T19458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 201.715541][T19458] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 201.760962][T19453] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 201.769717][T19472] FAULT_INJECTION: forcing a failure. [ 201.769717][T19472] name failslab, interval 1, probability 0, space 0, times 0 [ 201.786376][T19472] CPU: 0 PID: 19472 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 201.789405][T19453] EXT4-fs (loop1): get root inode failed [ 201.795137][T19472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.795149][T19472] Call Trace: [ 201.795156][T19472] dump_stack_lvl+0xd6/0x122 [ 201.795201][T19472] dump_stack+0x11/0x1b [ 201.800817][T19453] EXT4-fs (loop1): mount failed [ 201.810945][T19472] should_fail+0x23c/0x250 [ 201.810971][T19472] __should_failslab+0x81/0x90 [ 201.838001][T19472] ? apply_wqattrs_prepare+0x5f/0x630 [ 201.843479][T19472] should_failslab+0x5/0x20 [ 201.847979][T19472] kmem_cache_alloc_trace+0x52/0x320 [ 201.853358][T19472] apply_wqattrs_prepare+0x5f/0x630 [ 201.858628][T19472] ? vsnprintf+0xe8f/0xed0 [ 201.863040][T19472] apply_workqueue_attrs+0x9e/0x100 [ 201.868239][T19472] alloc_workqueue+0x777/0xad0 [ 201.873098][T19472] ? disk_unblock_events+0x35/0x40 [ 201.878558][T19472] ? bd_prepare_to_claim+0x1e6/0x270 [ 201.883928][T19472] ? loop_attr_do_show_dio+0x70/0x70 [ 201.889455][T19472] ? loop_set_status_from_info+0x35e/0x3a0 [ 201.895626][T19472] loop_configure+0x681/0xeb0 [ 201.900300][T19472] lo_ioctl+0x618/0x13e0 [ 201.904524][T19472] ? path_openat+0x18d4/0x1ec0 [ 201.909447][T19472] ? blkdev_common_ioctl+0x438/0x1110 [ 201.914815][T19472] ? selinux_file_ioctl+0x981/0xa10 [ 201.920551][T19472] ? lo_release+0x120/0x120 [ 201.925091][T19472] blkdev_ioctl+0x1d0/0x3f0 [ 201.929602][T19472] block_ioctl+0x6e/0x80 [ 201.934000][T19472] ? blkdev_iopoll+0x80/0x80 [ 201.938919][T19472] __se_sys_ioctl+0xcb/0x140 [ 201.943489][T19472] __x64_sys_ioctl+0x3f/0x50 [ 201.948069][T19472] do_syscall_64+0x44/0xa0 [ 201.952862][T19472] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 201.959179][T19472] RIP: 0033:0x7f7d5c352697 [ 201.963775][T19472] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 201.983541][T19472] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 201.991938][T19472] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 201.999952][T19472] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 16:54:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) [ 202.007905][T19472] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 202.015874][T19472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 202.023915][T19472] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:54:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) [ 202.055627][T19461] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 202.070980][T19453] loop1: detected capacity change from 0 to 4096 16:54:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200019, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 24) 16:54:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 202.097223][T19453] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 202.109786][T19453] EXT4-fs (loop1): get root inode failed [ 202.115491][T19453] EXT4-fs (loop1): mount failed [ 202.129901][T19495] FAULT_INJECTION: forcing a failure. [ 202.129901][T19495] name failslab, interval 1, probability 0, space 0, times 0 16:54:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 202.143187][T19495] CPU: 1 PID: 19495 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 202.152259][T19495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.162568][T19495] Call Trace: [ 202.165882][T19495] dump_stack_lvl+0xd6/0x122 [ 202.170508][T19495] dump_stack+0x11/0x1b [ 202.174665][T19495] should_fail+0x23c/0x250 [ 202.179099][T19495] __should_failslab+0x81/0x90 [ 202.183933][T19495] ? apply_wqattrs_prepare+0xbe/0x630 [ 202.189401][T19495] should_failslab+0x5/0x20 [ 202.194082][T19495] kmem_cache_alloc_trace+0x52/0x320 [ 202.199444][T19495] ? apply_wqattrs_prepare+0x5f/0x630 [ 202.204815][T19495] apply_wqattrs_prepare+0xbe/0x630 [ 202.210020][T19495] ? vsnprintf+0xe8f/0xed0 [ 202.214587][T19495] apply_workqueue_attrs+0x9e/0x100 [ 202.219953][T19495] alloc_workqueue+0x777/0xad0 [ 202.224733][T19495] ? disk_unblock_events+0x35/0x40 [ 202.229959][T19495] ? bd_prepare_to_claim+0x1e6/0x270 [ 202.235400][T19495] ? loop_attr_do_show_dio+0x70/0x70 [ 202.238121][T19460] FAULT_INJECTION: forcing a failure. [ 202.238121][T19460] name failslab, interval 1, probability 0, space 0, times 0 [ 202.240764][T19495] ? loop_set_status_from_info+0x35e/0x3a0 [ 202.259586][T19495] loop_configure+0x681/0xeb0 [ 202.264629][T19495] lo_ioctl+0x618/0x13e0 [ 202.268863][T19495] ? path_openat+0x18d4/0x1ec0 [ 202.273801][T19495] ? blkdev_common_ioctl+0x438/0x1110 [ 202.279170][T19495] ? selinux_file_ioctl+0x981/0xa10 [ 202.284810][T19495] ? lo_release+0x120/0x120 [ 202.289323][T19495] blkdev_ioctl+0x1d0/0x3f0 [ 202.293829][T19495] block_ioctl+0x6e/0x80 [ 202.298079][T19495] ? blkdev_iopoll+0x80/0x80 [ 202.302666][T19495] __se_sys_ioctl+0xcb/0x140 [ 202.307335][T19495] __x64_sys_ioctl+0x3f/0x50 [ 202.311950][T19495] do_syscall_64+0x44/0xa0 [ 202.316659][T19495] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 202.322542][T19495] RIP: 0033:0x7f7d5c352697 [ 202.326954][T19495] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 202.347273][T19495] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 202.355759][T19495] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 202.363825][T19495] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 202.371924][T19495] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 202.380644][T19495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 202.388911][T19495] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 202.397186][T19460] CPU: 0 PID: 19460 Comm: syz-executor.0 Not tainted 5.15.0-rc4-syzkaller #0 [ 202.406000][T19460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.416265][T19460] Call Trace: [ 202.419697][T19460] dump_stack_lvl+0xd6/0x122 [ 202.424436][T19460] dump_stack+0x11/0x1b [ 202.428595][T19460] should_fail+0x23c/0x250 [ 202.433050][T19460] ? __sigqueue_alloc+0x13a/0x270 [ 202.438084][T19460] __should_failslab+0x81/0x90 [ 202.442834][T19460] should_failslab+0x5/0x20 [ 202.447324][T19460] kmem_cache_alloc+0x4f/0x300 [ 202.452075][T19460] __sigqueue_alloc+0x13a/0x270 [ 202.456979][T19460] __send_signal+0x178/0x760 [ 202.461867][T19460] send_signal+0x281/0x390 [ 202.466289][T19460] ? mutex_lock+0x9/0x30 [ 202.470747][T19460] send_sig_info+0xb5/0x100 [ 202.475427][T19460] send_sig+0x2b/0x30 [ 202.479448][T19460] __se_sys_vmsplice+0x979/0x9a0 [ 202.484499][T19460] ? 0xffffffff81000000 [ 202.488632][T19460] ? init_mem_debugging_and_hardening+0x50/0x50 [ 202.495010][T19460] ? proc_fail_nth_write+0x127/0x150 [ 202.500297][T19460] ? __fget_light+0x21b/0x260 [ 202.505081][T19460] ? __cond_resched+0x11/0x40 [ 202.509746][T19460] ? fput+0x2d/0x130 [ 202.513652][T19460] ? ksys_write+0x162/0x190 [ 202.518162][T19460] __x64_sys_vmsplice+0x51/0x60 [ 202.523080][T19460] do_syscall_64+0x44/0xa0 [ 202.527476][T19460] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 202.533383][T19460] RIP: 0033:0x7f1a027158d9 [ 202.537875][T19460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 202.557828][T19460] RSP: 002b:00007f1a0046c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 202.566311][T19460] RAX: ffffffffffffffda RBX: 00007f1a0281a020 RCX: 00007f1a027158d9 [ 202.574552][T19460] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000006 [ 202.582506][T19460] RBP: 00007f1a0046c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 202.590470][T19460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 202.598421][T19460] R13: 00007ffed93cb76f R14: 00007f1a0046c300 R15: 0000000000022000 16:54:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200060, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 25) [ 202.646288][T19507] loop4: detected capacity change from 0 to 4096 [ 202.680826][T19517] loop1: detected capacity change from 0 to 4096 [ 202.690908][T19521] FAULT_INJECTION: forcing a failure. [ 202.690908][T19521] name failslab, interval 1, probability 0, space 0, times 0 [ 202.699978][T19507] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 202.703763][T19521] CPU: 0 PID: 19521 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 202.723718][T19521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.733870][T19521] Call Trace: [ 202.737146][T19521] dump_stack_lvl+0xd6/0x122 [ 202.741762][T19521] dump_stack+0x11/0x1b [ 202.745909][T19521] should_fail+0x23c/0x250 [ 202.750423][T19521] __should_failslab+0x81/0x90 [ 202.755176][T19521] should_failslab+0x5/0x20 [ 202.759763][T19521] kmem_cache_alloc_node+0x61/0x2c0 [ 202.765010][T19521] ? alloc_unbound_pwq+0x3e6/0x780 [ 202.770194][T19521] alloc_unbound_pwq+0x3e6/0x780 [ 202.775202][T19521] apply_wqattrs_prepare+0x1ed/0x630 [ 202.780470][T19521] ? vsnprintf+0xe8f/0xed0 [ 202.785131][T19521] apply_workqueue_attrs+0x9e/0x100 [ 202.790333][T19521] alloc_workqueue+0x777/0xad0 [ 202.795093][T19521] ? disk_unblock_events+0x35/0x40 [ 202.800310][T19521] ? bd_prepare_to_claim+0x1e6/0x270 [ 202.805670][T19521] ? loop_attr_do_show_dio+0x70/0x70 [ 202.811041][T19521] ? loop_set_status_from_info+0x35e/0x3a0 [ 202.817163][T19521] loop_configure+0x681/0xeb0 [ 202.821898][T19521] lo_ioctl+0x618/0x13e0 [ 202.826299][T19521] ? path_openat+0x18d4/0x1ec0 [ 202.831152][T19521] ? blkdev_common_ioctl+0x438/0x1110 [ 202.836668][T19521] ? selinux_file_ioctl+0x981/0xa10 [ 202.841859][T19521] ? lo_release+0x120/0x120 [ 202.846424][T19521] blkdev_ioctl+0x1d0/0x3f0 [ 202.850998][T19521] block_ioctl+0x6e/0x80 [ 202.855253][T19521] ? blkdev_iopoll+0x80/0x80 [ 202.860006][T19521] __se_sys_ioctl+0xcb/0x140 [ 202.864617][T19521] __x64_sys_ioctl+0x3f/0x50 [ 202.869209][T19521] do_syscall_64+0x44/0xa0 [ 202.873614][T19521] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 202.879862][T19521] RIP: 0033:0x7f7d5c352697 [ 202.884527][T19521] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 202.904411][T19521] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 202.913010][T19521] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 202.920977][T19521] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 202.928951][T19521] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 202.937118][T19521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 16:54:10 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:10 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200022, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 202.945282][T19521] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 202.973243][T19517] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 202.992304][T19517] EXT4-fs (loop1): get root inode failed 16:54:10 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:10 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 202.998101][T19517] EXT4-fs (loop1): mount failed 16:54:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 26) [ 203.041532][T19517] loop1: detected capacity change from 0 to 4096 [ 203.064280][T19551] loop4: detected capacity change from 0 to 4096 [ 203.070944][T19517] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated 16:54:10 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 203.101399][T19517] EXT4-fs (loop1): get root inode failed [ 203.107102][T19517] EXT4-fs (loop1): mount failed [ 203.119254][T19551] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 203.119620][T19562] FAULT_INJECTION: forcing a failure. [ 203.119620][T19562] name failslab, interval 1, probability 0, space 0, times 0 [ 203.143075][T19562] CPU: 1 PID: 19562 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 203.152112][T19562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.162257][T19562] Call Trace: [ 203.165532][T19562] dump_stack_lvl+0xd6/0x122 [ 203.170124][T19562] dump_stack+0x11/0x1b [ 203.174287][T19562] should_fail+0x23c/0x250 [ 203.178709][T19562] __should_failslab+0x81/0x90 [ 203.183497][T19562] ? kobject_uevent_env+0x1a7/0xc40 [ 203.188717][T19562] should_failslab+0x5/0x20 [ 203.193231][T19562] kmem_cache_alloc_trace+0x52/0x320 [ 203.198693][T19562] ? pwq_adjust_max_active+0x491/0x4b0 [ 203.204304][T19562] ? dev_uevent_filter+0x70/0x70 [ 203.209272][T19562] kobject_uevent_env+0x1a7/0xc40 [ 203.214440][T19562] ? __list_add_valid+0x28/0x90 [ 203.219435][T19562] ? alloc_workqueue+0xa18/0xad0 [ 203.224473][T19562] disk_force_media_change+0xe3/0x170 [ 203.229831][T19562] loop_configure+0x6c0/0xeb0 [ 203.234589][T19562] lo_ioctl+0x618/0x13e0 [ 203.238923][T19562] ? path_openat+0x18d4/0x1ec0 [ 203.243678][T19562] ? blkdev_common_ioctl+0x438/0x1110 [ 203.249053][T19562] ? selinux_file_ioctl+0x981/0xa10 [ 203.254265][T19562] ? lo_release+0x120/0x120 [ 203.258753][T19562] blkdev_ioctl+0x1d0/0x3f0 [ 203.263411][T19562] block_ioctl+0x6e/0x80 [ 203.267810][T19562] ? blkdev_iopoll+0x80/0x80 [ 203.272406][T19562] __se_sys_ioctl+0xcb/0x140 [ 203.276985][T19562] __x64_sys_ioctl+0x3f/0x50 [ 203.281718][T19562] do_syscall_64+0x44/0xa0 [ 203.286127][T19562] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 203.292091][T19562] RIP: 0033:0x7f7d5c352697 [ 203.296622][T19562] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 203.317223][T19562] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 203.325750][T19562] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 203.333846][T19562] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 203.342874][T19562] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 203.351185][T19562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 203.359525][T19562] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 203.383633][T19562] loop2: detected capacity change from 0 to 4096 [ 203.393575][T19562] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x7}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:10 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200025, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200068, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 27) 16:54:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 203.567624][T19592] loop1: detected capacity change from 0 to 4096 [ 203.576886][T19593] loop4: detected capacity change from 0 to 4096 [ 203.583967][T19601] FAULT_INJECTION: forcing a failure. [ 203.583967][T19601] name failslab, interval 1, probability 0, space 0, times 0 [ 203.596708][T19601] CPU: 1 PID: 19601 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 203.605958][T19601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.616008][T19601] Call Trace: [ 203.619583][T19601] dump_stack_lvl+0xd6/0x122 [ 203.624288][T19601] dump_stack+0x11/0x1b [ 203.628432][T19601] should_fail+0x23c/0x250 [ 203.633005][T19601] ? kzalloc+0x1d/0x30 [ 203.637203][T19601] __should_failslab+0x81/0x90 [ 203.642097][T19601] should_failslab+0x5/0x20 [ 203.646672][T19601] __kmalloc+0x6f/0x350 [ 203.650807][T19601] kzalloc+0x1d/0x30 [ 203.654918][T19601] kobject_get_path+0x7c/0x110 [ 203.659703][T19601] kobject_uevent_env+0x1be/0xc40 [ 203.664726][T19601] ? __list_add_valid+0x28/0x90 [ 203.669570][T19601] ? alloc_workqueue+0xa18/0xad0 [ 203.674561][T19601] disk_force_media_change+0xe3/0x170 [ 203.680105][T19601] loop_configure+0x6c0/0xeb0 [ 203.684793][T19601] lo_ioctl+0x618/0x13e0 [ 203.689451][T19601] ? path_openat+0x18d4/0x1ec0 [ 203.694241][T19601] ? blkdev_common_ioctl+0x438/0x1110 [ 203.699594][T19601] ? selinux_file_ioctl+0x981/0xa10 [ 203.704849][T19601] ? lo_release+0x120/0x120 [ 203.709362][T19601] blkdev_ioctl+0x1d0/0x3f0 [ 203.713932][T19601] block_ioctl+0x6e/0x80 [ 203.718439][T19601] ? blkdev_iopoll+0x80/0x80 [ 203.723399][T19601] __se_sys_ioctl+0xcb/0x140 [ 203.728085][T19601] __x64_sys_ioctl+0x3f/0x50 [ 203.732744][T19601] do_syscall_64+0x44/0xa0 [ 203.737146][T19601] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 203.743160][T19601] RIP: 0033:0x7f7d5c352697 [ 203.747576][T19601] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 16:54:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 203.767955][T19601] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 203.776713][T19601] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 203.785026][T19601] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 203.793167][T19601] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 203.801230][T19601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 203.809465][T19601] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:54:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) [ 203.828955][T19601] loop2: detected capacity change from 0 to 4096 [ 203.840019][T19593] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 203.856152][T19601] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20002e, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 28) 16:54:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 203.886067][T19592] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 203.923221][T19592] EXT4-fs (loop1): get root inode failed [ 203.928929][T19592] EXT4-fs (loop1): mount failed [ 203.968605][T19592] loop1: detected capacity change from 0 to 4096 [ 203.991030][T19592] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 204.003902][T19644] loop4: detected capacity change from 0 to 4096 [ 204.011340][T19592] EXT4-fs (loop1): get root inode failed [ 204.014301][T19645] FAULT_INJECTION: forcing a failure. [ 204.014301][T19645] name failslab, interval 1, probability 0, space 0, times 0 [ 204.017136][T19592] EXT4-fs (loop1): mount failed [ 204.034657][T19645] CPU: 1 PID: 19645 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 204.043419][T19645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.053733][T19645] Call Trace: [ 204.057061][T19645] dump_stack_lvl+0xd6/0x122 [ 204.059814][T19644] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 204.061655][T19645] dump_stack+0x11/0x1b [ 204.061679][T19645] should_fail+0x23c/0x250 [ 204.081145][T19645] __should_failslab+0x81/0x90 [ 204.085962][T19645] should_failslab+0x5/0x20 [ 204.090518][T19645] kmem_cache_alloc_node+0x61/0x2c0 [ 204.096277][T19645] ? __alloc_skb+0xed/0x420 [ 204.100787][T19645] __alloc_skb+0xed/0x420 [ 204.105121][T19645] alloc_uevent_skb+0x5b/0x120 [ 204.110144][T19645] kobject_uevent_env+0x863/0xc40 [ 204.115490][T19645] disk_force_media_change+0xe3/0x170 [ 204.121299][T19645] loop_configure+0x6c0/0xeb0 [ 204.126090][T19645] lo_ioctl+0x618/0x13e0 [ 204.130463][T19645] ? path_openat+0x18d4/0x1ec0 [ 204.135439][T19645] ? blkdev_common_ioctl+0x438/0x1110 [ 204.141097][T19645] ? selinux_file_ioctl+0x981/0xa10 [ 204.146307][T19645] ? lo_release+0x120/0x120 [ 204.151038][T19645] blkdev_ioctl+0x1d0/0x3f0 [ 204.155611][T19645] block_ioctl+0x6e/0x80 [ 204.160014][T19645] ? blkdev_iopoll+0x80/0x80 [ 204.164689][T19645] __se_sys_ioctl+0xcb/0x140 [ 204.169314][T19645] __x64_sys_ioctl+0x3f/0x50 [ 204.173887][T19645] do_syscall_64+0x44/0xa0 [ 204.178293][T19645] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 204.184213][T19645] RIP: 0033:0x7f7d5c352697 [ 204.188603][T19645] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 204.208414][T19645] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 204.217296][T19645] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 204.227536][T19645] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 204.235798][T19645] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 204.244042][T19645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 204.252191][T19645] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 204.261287][T19645] loop2: detected capacity change from 0 to 4096 [ 204.281551][T19645] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x8}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200036, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20006c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 29) 16:54:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) setregid(0xffffffffffffffff, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0xffffffffffffffff, r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000005a80)={0x0, 0x0}) r7 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r8, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r8, 0xa, 0x12) poll(&(0x7f0000000100)=[{r9}], 0x1, 0x603) dup2(r8, r9) fcntl$setown(r9, 0x8, r7) tkill(r7, 0x14) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005bc0)=[{{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001380)=[{&(0x7f00000000c0)="b456e5", 0x3}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f00000001c0)="7ff23e5f3fbbb93bb0e1eed6bf52e15d94ce1d5e7f473171f000cd6b492cc5c3f6234e343ae8ed5be1171a5421e58a", 0x2f}, {&(0x7f0000000200)="091f76b78fb9749dcbf8f8d13c22d69fb56844435ab94c99ee6526c6fe0d341674aa6b5e0c491b9d4e98da24abe054b481ac190d0b", 0x35}, {&(0x7f0000000240)="dc30d4fa998a9f2a02a5e980504823ca2af5e2bfa1b50165b2", 0x19}], 0x5, &(0x7f0000001500)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x28, 0x1, 0x1, [r2, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0, 0xc010}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000001600)="38bf97ab253f8a5e36ca37a21a89879e34a832db89a341654d3e09d614a232fcee82215a21bbf4e38291457e540dffab9e6168c3082e38a151c400611e00a2b6c5f893b43899eff1a98d1864e30f2c791492ff653867b5ebcc664e04312a6f6b", 0x60}, {&(0x7f0000001680)="ab97cbf74f3b3549bdf50bb7fe943638295cc9c236fb7718db3246c2ae68a62747e4f852d01d96ae488385eec5a3ba7685e893c8e8de4744d7112fcedfcb9558701e0772adf80a2dde55d603d1f6c0b48fe0a2f90eaea1f39df4b772326ac660b1accb8394dcec7dd4c10060bbb6d28cc774e268f82173a6be9317580973796d9324e7cb79a99780e1277bdd9e2314d2c686851890cfea49525d58aabf676ef2f80600000017de0be3e614dd06a4bceb00879d455b936ba2e8", 0xb9}, {&(0x7f0000001740)="cd141d0014934210d3bf1227973f75015bfb9eb0c4fa64dba9397f966c5ddb98c17ee47d15e18109dd1a7f814d6e32af83ec3e5366151feb54a4a2ef5782caed4992d98d7c529046609dc0f7e955be1e6a9033bff3350a258f8fe1196de04c0390892a4c3d07b4cfb7cd6037d796427746ba22b6eead697c05e50027036cf54f63cfcb2a198a826ed76845a21ae8354dacd7375d26eed429354d4af09bf6d17cd5bdf1d9c7586be4a4d6f3a4205a0663504cd0458261f074553bd299cc8534a5146b662530b366", 0xc7}, {&(0x7f0000001840)}, {&(0x7f0000001880)="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", 0x1000}, {&(0x7f0000002880)="f45759ec570ad99418ff269311788bce5f6b751d9a6509598b8055efe7d7c679fdb08a175a0d6faa50e961fc9af766faf9746d2a699fcef837aad1dd1c0905e4e287b3c43da9cce53c3b7b0114c1427ac6e3e6870e9e1d105709c0000734e249819d464bd4d4f53fb8b2cdc619bf", 0x6e}, {&(0x7f0000002900)}], 0x7, &(0x7f0000002f00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}, @rights={{0x34, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, r3, 0xffffffffffffffff, 0xffffffffffffffff, r3]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r2, 0xffffffffffffffff, r0]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0xf8, 0x40}}, {{&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003340)=[{&(0x7f0000003080)="07ab1ef19fd0dc41a6ad7d8aa2738ed9b9cad517d10bab449e09724253050b993abdc2b9d1359e1053d635727dd074b30881dfb1b5da3ca79d39fb019b3af30f3cdd2e27abc33017b82af2daf4570b847d96974527a92c38cad08563ebe1e3402126b122e5b70adfc0aac5f22fb94f1a03981082381457a6b193d882d9a98993cf3fe1d52a904992f99c2579a39b880582fd23d4d30c59f6f4be91a27cee99142dc48ec022d22acbbdaa7c6feaa911f2e1549ffa836bee1b5abea3", 0xbb}, {&(0x7f0000003140)="afb0047e7cf43d05d5867cedffe6a9b22562518c811b3116f3c1343b50646d74ec99a091033587be9e4cb3238fde612440c2a8ce2654c1822c217802e03df0113c59dd37bbc4e9a2affe9fd49b5afa1b432ed303a7fa26b567", 0x59}, {&(0x7f00000031c0)="1e10786a067da22c539d494d7ee3ad5b7c8c6368b67f8076e92691e1d621eeb4f71442049d4b124e114cd4eb834f78215fb5bc7c4583fa87aeb2e33aa1d1b94145323c18fa9f5a09aa940e8d7a12c9e3f0330b4eef3a8362ad7baa5fa157cab83b08dd667ef0c891553b79642d2d5a4d5b9a0627005feb2edf648b9d3c9d71ffb9164fb283a8eac7a06bbb95b7a6afa5de6cea05ee5a0e093fc8a69817c85ecf26c30f638764c514e9638480568d62b780d45f20fa894bbfa9b8f0", 0xbb}, {&(0x7f0000003280)="f3ef6f344fc98d0edc198f213d2e", 0xe}, {&(0x7f00000032c0)="102986edb05eeacdc236c5377edede0a5c3be8a36b9712b051fe7dc63e12c000209d4b4ce6df49309b17830a3b88ccbff1f95906d0c285e02c921318a62340db66a805f2c0e8fdf38c7accde7548e9beee74c9ab198986c2a970c330913257aed46d17862c3a5427f83ac5c0c44f6a84f9d8c92642384c2e19794d83bf7c477f", 0x80}], 0x5, &(0x7f0000003400)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18, 0xc4}}, {{&(0x7f0000003440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004a00)=[{&(0x7f00000034c0)="66564ef7d5f9363d3c1a568a27bbb4f4c763daad6d5a36003e820dc715e7ce82773409ca4dcd460f81bf2b257fb078d77324c2567d5f7d8bfdd6962278db2608203b39597de8b4cac92d94d4493a1660aa186912cfd7ce100bffee632d9624f19311b3a67487c58cae5c82589862499c8986cc2591b45e7966504c82e8b55a6c7ea45b03a5fb97e4c8ad8f5588e0c204babfd7a30c2b3214126147c32a0b67587c2cca157ade5a898ef7c2028a7dc1fc0d4dcdd5edebdc3155e9fe32465cb3ab5a8f115e29c385188ce3bd", 0xcb}, {&(0x7f00000035c0)="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", 0x1000}, {&(0x7f00000045c0)="9810745b7322993aa0c8ff20c5bc23af8c131c9624f007c70a9e6174cf0fe9b0327cbab9938c5912152fe05da03c1fe41fef8c6e6db78bcc786fb22d5e6782ec789cbd896c1f260d739e443188bbaaa7a74688e0825c19cdc468662fff6e47d7c9197684efc2144576a2687651f5f3442ebb56699bce813199a6b2ad19c380579a667d008e005f73cb61bb6dd4d23fa6d42996350d10a84cf756fcc82274ea1a608bec3af188a631148fc343bcc4bc556c28f6b63fe065a1e3cf761122272a43bc66369054e58e64ee7964c66ef689e07dab4694caea7ef9d34b04d68eda5c2186fa801792ef0b19287d08f7395ac5c08427", 0xf2}, {&(0x7f00000046c0)="2bdc25442b9de09c314dd12ecc47337e1bda13ee697e523fb4f65a7a6f6be95faf42d401a5242233b030e2af711a858ddf6456b05ed999056dce727c70406eeb2d895f122e3bd5ced9f74fc32231279e5d21d131e81edd9ecaba704493bfde8f0437f72a11133ceeeb959c1196014c", 0x6f}, {&(0x7f0000004740)="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", 0xff}, {&(0x7f0000004840)="2932d9f8119a22b02e2d263c02980aab8ebaf308b5367d575f55350ab600c9ba1455d8a4a2d537ddd3d1dfebba2a83e0e3486f5980d47e9beaa0d1bd142bb93cf69fed61aef47ec938a9bf7520f7629e90f85302266e22c5c7cf4aa447d4903cb48e48f13f0bf8c5cd08f855217d69368fe57bc222cefad393a8315e111501ba07a0a81891c743fb20f84db3e287ac3252ace72595152c77923384b7f02951962dfde7160447e49dec06ef19cea97aff40f63d97b03ac275c7f851e3fbd0c5d3", 0xc0}, {&(0x7f0000004900)="834a5512f3c457cca88002e4fb7bf8396cbcdb641df00131f913663d8d1683abac5c748f4451fb5e2bbed61a7b7ef73704e5fe1cfb7ca28d3daf592afc123ba422b2bd36c3eca34ee242fd407de44b658929f34993cab3ba05a05949698527bf60d628b2ed97ce4163931612f8f5e924b19bf298590ffa703c0c8b5c6bffc1e63914f018115ac830d6f50c55ca50328dd9f74a0615cb84a490752e24a8c289c3d94d0113bf67452b3859d20888741c1139082d525c370137566092ae844781e2", 0xc0}, {&(0x7f00000049c0)="fb123831964fa4afc7701fada4f5f014770c383aff775017b27486e78c7d7f40", 0x20}], 0x8, &(0x7f0000005340)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, r1, r0, r0]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r3, r2, r1, 0xffffffffffffffff]}}], 0xa8, 0x8894}}, {{&(0x7f0000005400)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000055c0)=[{&(0x7f0000005480)="8dd711e4a8b3f3c000166586db2ff79c3022b21200ab3667eac84fac5d39890cabb464621051498ad75ebcc30e382276535cc9f85a55ef8ffe378618e37e634bc1d912c5b57f712d22a47fe3bc999473d8b59d520f7a7d434e9b8596e0d1f425baf3e6b89c9bf1db0fbeb49dd47b54c41b22e296c24cd0078fa61035c6f0a1d028134b5aeb0582378c946121620ec4e7c45fa6e9b631985e618315fc304fd3f4c608bdab7ca10e7c5e77122f6358d9c5caa88479160cbfe57caa84b15c58d5c7b82ad88523f6a5d09f65e395088c7c32741644e2437f2cfccc0ff1c2ed21f19f854a6f64e695779f9e49e5", 0xeb}, {&(0x7f0000005580)}], 0x2, &(0x7f0000005b00)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r5}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00}}}], 0xa0, 0x44c00}}], 0x5, 0xc002) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) [ 204.448320][T19679] FAULT_INJECTION: forcing a failure. [ 204.448320][T19679] name failslab, interval 1, probability 0, space 0, times 0 [ 204.461233][T19679] CPU: 0 PID: 19679 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 204.470081][T19679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.480170][T19679] Call Trace: [ 204.483531][T19679] dump_stack_lvl+0xd6/0x122 [ 204.488185][T19679] dump_stack+0x11/0x1b [ 204.492556][T19679] should_fail+0x23c/0x250 16:54:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 204.497077][T19679] __should_failslab+0x81/0x90 [ 204.501881][T19679] should_failslab+0x5/0x20 [ 204.506515][T19679] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 204.512350][T19679] ? __kmalloc_node_track_caller+0x30/0x40 [ 204.518172][T19679] __kmalloc_node_track_caller+0x30/0x40 [ 204.523813][T19679] ? alloc_uevent_skb+0x5b/0x120 [ 204.528904][T19679] __alloc_skb+0x187/0x420 [ 204.533589][T19679] alloc_uevent_skb+0x5b/0x120 [ 204.538601][T19679] kobject_uevent_env+0x863/0xc40 16:54:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 204.543867][T19679] disk_force_media_change+0xe3/0x170 [ 204.550455][T19679] loop_configure+0x6c0/0xeb0 [ 204.555400][T19679] lo_ioctl+0x618/0x13e0 [ 204.560122][T19679] ? path_openat+0x18d4/0x1ec0 [ 204.565103][T19679] ? blkdev_common_ioctl+0x438/0x1110 [ 204.570484][T19679] ? selinux_file_ioctl+0x981/0xa10 [ 204.575768][T19679] ? lo_release+0x120/0x120 [ 204.580593][T19679] blkdev_ioctl+0x1d0/0x3f0 [ 204.585183][T19679] block_ioctl+0x6e/0x80 [ 204.589602][T19679] ? blkdev_iopoll+0x80/0x80 [ 204.594181][T19679] __se_sys_ioctl+0xcb/0x140 [ 204.598759][T19679] __x64_sys_ioctl+0x3f/0x50 [ 204.603339][T19679] do_syscall_64+0x44/0xa0 [ 204.607761][T19679] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 204.613892][T19679] RIP: 0033:0x7f7d5c352697 [ 204.618332][T19679] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 204.638601][T19679] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 204.647088][T19679] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 204.655514][T19679] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 204.665022][T19679] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 204.672983][T19679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 204.681560][T19679] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 204.694827][T19680] loop1: detected capacity change from 0 to 4096 [ 204.696161][T19679] loop2: detected capacity change from 0 to 4096 [ 204.704744][T19681] loop4: detected capacity change from 0 to 4096 [ 204.722368][T19679] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 204.738154][T19681] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 204.749300][T19680] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 204.766094][T19680] EXT4-fs (loop1): get root inode failed [ 204.772063][T19680] EXT4-fs (loop1): mount failed [ 204.816813][T19680] loop1: detected capacity change from 0 to 4096 [ 204.830093][T19680] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 204.842825][T19680] EXT4-fs (loop1): get root inode failed [ 204.848525][T19680] EXT4-fs (loop1): mount failed 16:54:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x600}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 30) 16:54:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200048, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200074, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') eventfd2(0x20, 0x1) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') accept$inet6(0xffffffffffffffff, &(0x7f0000000980)={0xa, 0x0, 0x0, @local}, &(0x7f00000009c0)=0x1c) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r7 = perf_event_open(&(0x7f0000000d80)={0x0, 0x80, 0x80, 0xd4, 0x3f, 0xe3, 0x0, 0x80000001, 0x8080, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x3}, 0xa114, 0x100000000, 0x6, 0x5, 0x9, 0x9, 0x6b, 0x0, 0x6}, 0x0, 0x4, 0xffffffffffffffff, 0x1) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000e40)=[{{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000140), 0x0, &(0x7f0000000380)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r1, r0]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r1, 0xffffffffffffffff, r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r4, r0]}}], 0xd8, 0x8011}}, {{&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000500)="c2ec355740d6f08e6c422b3e47ff12ef68e9ddb280d097832f84e658", 0x1c}, {&(0x7f0000000540)="2caf530f2811fdd5477d7648a579b59f52a100379a69e37076e56e2beb47db803876004b3fe12ebbdcdac20b3b18ec8a22e7106d9b7ab4ec7cf1df81f90ef8a1dd630610792138cd53da3338a7c30a5b04b26124768438f9b91b35dcbc6c47d225e3d1e78f9f945bac0427067769fffb86246435653de6b29472b3ea2f1899ed094cb87a76dd996a8357f079b732d7711f53639f983125fd86be27fd9ff45c7e82266903178f0f8d03e25a117cb7a721132513e4c5a542be0a3b7e61d9c527efc70b61d7f11fa56e50695edf09e55ef644b77887", 0xd4}, {&(0x7f0000000640)="a8c2aae5323e98a5b8d0b37f96687a426d09f17b6a032ebee6d99115377da94beaaa142f8c6287595f660e97a1a60664b623b9a910cd2807685af668d9a91721b8f61bdd07b0374792a86b94d4db90fe917b92783575ae512126f682d3c7ba6c1a75a6fac7c41f12e6aefd56e809eb8d6d2fb1db213a127bdc23bfccb673602b05944d1cf01d28fa40baf8e315af40f2f577ca53e03a8bb14b20fca3745f7f16e4d2f412980059cfed5be2a520170fdbe1d3ebacf4df39dde45fd9c7cb9a2ee957469932148d29febde6ff4bbe0bb3dcafe835a633883612a909ae8b6a3441", 0xdf}, {&(0x7f0000000740)="b15bfe063d2664dcf2b18536c697e25e474c078e309eac33173e375d257ca0dc607d20dbea2c03be4124067d35e1b3f5eff701a7a80d479d22f5d4473256245962dd669cd485", 0x46}, {&(0x7f00000007c0)="1111463f7a3dade6b0638ffa5c8b73e3f9b2349f2c9e5a5911b4924cb4eaeb157e3184d15a543f7e052839ea6cf9dc8f1fa6a8699ad42b82e52c27253c6ee4132bda149e", 0x44}, {&(0x7f0000000140)="b7d2390ec432014f98db0868d983119cb39734d85be7a78b76cff5c8703673830b96c169d2c74de2bb2f7e7f92b068dbe5f63e27160ce9c22047e3558e3af2be94ff4eb1ede4f1d56c50419bccfc57d2b36da602d8dabb4765e940edd3fc3c317ad2d9d89785036f4824c24243ac96cb1d11629fcf09388cda961b09c99c98296eb8d2680538ad", 0x87}], 0x6, &(0x7f0000000a00), 0x0, 0x20008084}}, {{&(0x7f0000000b00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000d40)=[{&(0x7f0000000b80)="8ebbee4801af07bde026a3ba5da146701dddb1e11e7837a5aeef4250af2970951722becc0bdf8f88d29ff8c1811af8ce86476d421aaea53be45ece2baec71c607583cfea854c27a9e5ece65c11a86bd3", 0x50}, {&(0x7f0000000f00)="6f71f572521c48c6eae0237f87628fdef0abbc649835d2cdbb0be00d1faaa9f31e7f6b887119a07ef48480e3870634924229f517e074a3834c250d0dcd2b7b626acab3b07cbfaa6e8fb4e9a325fa59a7f49750e2e6140ca6b67162b40d86dc96a22a27f1fc1ddb592e053253a0b65fcc14b70c89b473182619ccab152be17393fd370a9d33c2c4d2d4b480df83a2271731184c2c65ca946d5d5bc5b2b8a4ed6474d06bd09b45248d3b86720079b83841a1d6cbab10337480d0a14dee433330f0", 0xc0}, {&(0x7f0000000cc0)="f18ae07c8213085c13d6d992656204e29a4e9e2bc46a8f88ff83db33a15f31ded41d9432b4a4916cda74e9ba605f0ca4a4366dd58530c8a8c97cd22bb22150be41392dfe39e4a3a547111665afc6d11ca655331c789f564b0ddd1cb9bf3adca1d75e3b8338dbe5c674b7a0c1903e45bf48d1f2", 0x73}], 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="2c00000000000000f969515c01000000", @ANYRES32=r7, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRESDEC=r8, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x30, 0x4000041}}], 0x3, 0x84) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r10, 0x0, 0x10000, 0x0) read(r9, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 205.311863][T19736] FAULT_INJECTION: forcing a failure. [ 205.311863][T19736] name failslab, interval 1, probability 0, space 0, times 0 [ 205.325172][T19736] CPU: 1 PID: 19736 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 205.333952][T19736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.344322][T19736] Call Trace: [ 205.347700][T19736] dump_stack_lvl+0xd6/0x122 [ 205.352300][T19736] dump_stack+0x11/0x1b [ 205.356808][T19736] should_fail+0x23c/0x250 [ 205.361220][T19736] ? skb_clone+0x12c/0x1f0 [ 205.365663][T19736] __should_failslab+0x81/0x90 [ 205.370622][T19736] should_failslab+0x5/0x20 [ 205.375138][T19736] kmem_cache_alloc+0x4f/0x300 [ 205.381008][T19736] skb_clone+0x12c/0x1f0 [ 205.385349][T19736] netlink_broadcast_filtered+0x4fd/0xb60 [ 205.391321][T19736] ? skb_put+0xb9/0xf0 [ 205.395498][T19736] netlink_broadcast+0x35/0x50 [ 205.400365][T19736] kobject_uevent_env+0x8c9/0xc40 [ 205.405505][T19736] disk_force_media_change+0xe3/0x170 [ 205.410894][T19736] loop_configure+0x6c0/0xeb0 [ 205.415753][T19736] lo_ioctl+0x618/0x13e0 [ 205.420082][T19736] ? path_openat+0x18d4/0x1ec0 [ 205.425340][T19736] ? blkdev_common_ioctl+0x438/0x1110 [ 205.430736][T19736] ? selinux_file_ioctl+0x981/0xa10 [ 205.435999][T19736] ? lo_release+0x120/0x120 [ 205.440677][T19736] blkdev_ioctl+0x1d0/0x3f0 [ 205.445229][T19736] block_ioctl+0x6e/0x80 [ 205.449756][T19736] ? blkdev_iopoll+0x80/0x80 [ 205.454957][T19736] __se_sys_ioctl+0xcb/0x140 [ 205.459721][T19736] __x64_sys_ioctl+0x3f/0x50 [ 205.464400][T19736] do_syscall_64+0x44/0xa0 [ 205.469060][T19736] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 205.475623][T19736] RIP: 0033:0x7f7d5c352697 [ 205.480107][T19736] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 205.500416][T19736] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 16:54:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 205.508987][T19736] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 205.517120][T19736] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 205.525422][T19736] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 205.533466][T19736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 205.541580][T19736] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 205.550529][T19736] loop2: detected capacity change from 0 to 4096 16:54:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 31) [ 205.561099][T19737] loop1: detected capacity change from 0 to 4096 [ 205.561534][T19736] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 205.567613][T19739] loop4: detected capacity change from 0 to 4096 [ 205.607470][T19737] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 205.644285][T19737] EXT4-fs (loop1): get root inode failed [ 205.650458][T19737] EXT4-fs (loop1): mount failed [ 205.665315][T19739] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 205.677036][T19777] FAULT_INJECTION: forcing a failure. [ 205.677036][T19777] name failslab, interval 1, probability 0, space 0, times 0 [ 205.690084][T19777] CPU: 1 PID: 19777 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 205.698837][T19777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.708889][T19777] Call Trace: [ 205.712204][T19777] dump_stack_lvl+0xd6/0x122 [ 205.716894][T19777] dump_stack+0x11/0x1b [ 205.721168][T19777] should_fail+0x23c/0x250 [ 205.725675][T19777] __should_failslab+0x81/0x90 [ 205.730566][T19777] ? call_usermodehelper_setup+0x71/0x190 [ 205.736388][T19777] should_failslab+0x5/0x20 [ 205.740891][T19777] kmem_cache_alloc_trace+0x52/0x320 [ 205.746551][T19777] call_usermodehelper_setup+0x71/0x190 [ 205.752751][T19777] ? add_uevent_var+0x1d0/0x1d0 [ 205.757603][T19777] kobject_uevent_env+0xb29/0xc40 [ 205.767487][T19777] disk_force_media_change+0xe3/0x170 [ 205.773455][T19777] loop_configure+0x6c0/0xeb0 [ 205.778125][T19777] lo_ioctl+0x618/0x13e0 [ 205.782345][T19777] ? path_openat+0x18d4/0x1ec0 [ 205.787154][T19777] ? blkdev_common_ioctl+0x438/0x1110 [ 205.792525][T19777] ? selinux_file_ioctl+0x981/0xa10 [ 205.797950][T19777] ? lo_release+0x120/0x120 [ 205.802455][T19777] blkdev_ioctl+0x1d0/0x3f0 [ 205.806948][T19777] block_ioctl+0x6e/0x80 [ 205.811268][T19777] ? blkdev_iopoll+0x80/0x80 [ 205.815841][T19777] __se_sys_ioctl+0xcb/0x140 [ 205.820416][T19777] __x64_sys_ioctl+0x3f/0x50 [ 205.825173][T19777] do_syscall_64+0x44/0xa0 [ 205.829665][T19777] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 205.835545][T19777] RIP: 0033:0x7f7d5c352697 [ 205.840134][T19777] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 205.861201][T19777] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 205.869987][T19777] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 205.878059][T19777] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 205.886017][T19777] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 205.893994][T19777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 205.903061][T19777] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 205.911434][T19777] loop2: detected capacity change from 0 to 4096 [ 205.920709][T19737] loop1: detected capacity change from 0 to 4096 [ 205.933982][T19737] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 205.935739][T19777] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 205.957643][T19737] EXT4-fs (loop1): get root inode failed [ 205.963288][T19737] EXT4-fs (loop1): mount failed 16:54:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20004c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x20000081}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f00000009c0)="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", 0x126}, {&(0x7f0000000b00)="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", 0x132}], 0x2, 0x4) read(r2, &(0x7f00000002c0)=""/186, 0xba) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000001900)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000600)=[{{&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @private}}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/161, 0xa1}], 0x1, &(0x7f0000000380)=""/251, 0xfb}, 0x3ff}, {{&(0x7f0000000480)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000500)=""/223, 0xdf}], 0x1}, 0x9}], 0x2, 0x3, &(0x7f0000001940)={r7, r8+10000000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, &(0x7f0000000280)=0x40, r11, &(0x7f0000000900)=0x2, 0x7f, 0x7) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') write$binfmt_elf64(r6, &(0x7f0000001980)=ANY=[@ANYRES64=r11, @ANYRES32=r10, @ANYRESOCT=r1, @ANYBLOB="8d6c663a65b726b727461a22285184cc4a6203e4396e4fbfc71890694bc4e1010b7df5548812cc6f3c0562b02aaac65a306072b46d2f2f207bb1ab3cd80c5789f9326342151182bced0b1ff037d1d6136d1c562015d64fdcd92676d10e62d2b75425c21d47c0d834b72899f8eb63081c190313622b333f5d4c5d77c191a14bb4b55197e54a9b1fd54d9545865d9d96b8874215ff1cb6c37570cd1a3d3ab755bec3631e2974bce77bcc33b0c418f829a2f33f038d4e1d8bba6d48276581b9e2ae1eff6fe630619c69ce0d687ae85811f2009bde39ad966dbdba492b4e14f6a7c1a35450f95937e332c20c54a233e380477e57e1d266c6ff81b95fb926a15a7a2efbac96538e7e8223b6ec191344b04dfc737c663a4c1b139ca050e62723f7a697f5aca95aabe162fcff57717e9c1b1592938b1459838f5b028c96bb9aa5754585a04a07d6732a8b8c8811dec679ba7774237c335aadd0a3a1487eca9e72317e1c8a66394d2c0949b478b762deb4f474f9b745934e9f6928a93f0ee1fb8dfb49689d52a2a6ab808db7804c88df2871d32650fd09f1932798a813402830e3c11e9efe33a6879bb9026fbe48f3c7ef7593a6b20970cdd38feb0b5bb4e8c1c4d70635d44b8fb984a1307dca93705301b0d3cf0b11e26b2d7b89ac752add9e4c0f217ef7e1e46d1fb01f2cc7e4f47ab8fd2f02d6d5c0d96f71e11d8ff3065718a897da56e7eecc7d9bc1096634c9ec9818400fa46bac3c7937e7e359e01aebfa437e76fd55128f432633d80f8f0ad0f5d2c6b118031aa8d1588e126ce3655b1a818eaa26fa8118592a413d7ecd9292c6131cbe96f2e3223ebbf20f031f9b8fdb849704e08ab79811d487cbe763a1f3eff6fdc87e8d4b73bc7bc910cd0820ada395f58076ac9a1b616cd865afa1bf0ba553567ac90f0610d6daa108692c8960ec7ffbcc58b3401e0316e486b332305f01bad48cba5553bb5eea95db9535190129c12de7cb7426b78dabc3a234f5add325ccf32038e7aebaedc3fe7dda415401f44d648921a2f62c064d51d742bbb03a3be3c8a8c10cd755ccee258ffae1212e310dbbf266f5fe359557ecad513fb81f4f424b8b1959753dea08552e528e994ba67bc75e0f1452dc9e15a1b5f1c25b03430c357f11db8fbf26b1e4ee213add1ec79d946a0568fc73dfb48b511fc085993e9bc80d0207cce8de59abfb9c38f334ed4142186a2d4671a1c0dea8fb1d32e03f29810b8147c404b42570281bce8ac4eb958df37428e8f6541f77c8683e87bdc9b827880b8b061dabbd6f65fc6b3c6480ebd8f6c5d0e67a3a6167291a47f2021b64f31e498c0deeeea7b72d057ed1a2917fd65ff2f4a280c5a79e0e93f713cef69ebbe42d5fc3c621b65502b116f03acf6f359172db8e5a3b7a7a7fca63217d73c773b4872a948a549ff564176aeb94fc5a81c7db68947cb92652e4d8eda911a4c5b46efcd6c2d2c48162486239017cf756771fd6a813fade1b851fc2c3e19afb7a4ad270f17f805728c216e0ce60a713658b2d60f549af6f45ddabd316b4961bf7a06b3fc6416ce5c1d21a4426189e41d6751ff5f1d449839f63122f66248c4d2d51e784166abfa988a3388916082d24bd9f7e6193d6072ae8fd80b7269e8097b247a5f68fd0b94fe331e4accd99a23e58634e838da35f47ecfaee328efe03789da96fe8a8f324352c706a48b6d6ce87b368d4a901241fc276729f90a672c1998e4754ed3d675ffc8eb76c17b3a5b663eb1e3291c77b2432f91b04a47121968e25e9fea078ec6434dc82e3ab54c30efd6f94cc68c84997a13925a99748caec4ed1e63c1c2f23f3674f02e819f1efd2d3d2ad80e2228e507e8724973d0f0d2649eb76b007856300bddd98606116c5d6e860036c75671e86cda8ff04d291089c8bdb0e4c3a42f66d9295d5d88df445e6a3d7ea06603efbd7c3d16f235afc4668e18c618e786b2ebe52d8ceb5a0c8b2cb07148c60fbd7f308d54a3e95fae5194c3a593cb15af152fcb90ed71fba9544661e2b1c4c0ef302b06eda3451a43266d83d076665564f7581b8f2e7972626c3eb45bab6149c2e1994e514d56c877b9616f708bee91b6d05d944339e8e6e1b6a5d562682bc7dd534bb7e73561faa9f716f6f8b742abd97e426e2a25f1870e0d5a281671baece87f327c69c059d2a9e56df72f18ede5875b6373f58662a2868eb5b6c2430d930beb0e99a065d95e02cc0e5708eb7dae0a6e8af06d38ad5ad2e4adc957e7ce88c96df9e7a375c63c48394399e5b148b9609f17226c30d166fbe2505f60ca2eab4cebeb094e579adc63605eaab5845e6dd2310bf592619d15d5b793dbe58ac38368c650dd9d8f890798263ae4552e7fc527b574b3098611e635b8d2cb1c5869da6a3a0c24297baaa366e2b605dbe965c124f5fe77240f57877bcd1a8aeb2265b572b99f9211b0516fd4bb2101996a23a2b06edc21d894c5f828fa9bad497871f7df2752fc242b355b40c9c020f9ecc784b4e8f839fb05703ed4341afc7d2daf7b761f72b13dc9091a76ee34e402bd60356c2ab285437064e53016cde92dbc537df7d9578adb1f8f6d19a2984eab3791d17981eac775272744986e324d18fc048a25bcb1ba922d82e47cfc4d8027f7c1c6178fb147afd1b07b7889191a832277c53dfa192ab4b6ca45f39aa74d6dd49be19d8c126ff96cd929fb509d8bc59d928086b748f477dbd57e16b82c2283409b4bd9a8c22ea723959a73e584b0e49be5c63700224f42f9d33af6cf71808bf11c1df9d113357186f489f7b55ce3747c4f79a0d2722b9e1644f75bd24b23510419fc786eaebd2efd1a5deb016b924a5f79d111f0fc20c5b1e47449bdbe3141148e211d0ef2e3d99616eeaf973ba2d2ceada6c4efffd5ed301fc35541c7eb72d3831472de3af1efa74b6b86a592808f64073317057913d29a38dcaea1864e750c4e1c6e456daac4c4066113bf780ab6c6ff7f24b549d20ce721c14baf552b045b97ee08782adbd083a480e1c71453f1d2d4ba4559fc1b0809a45a60e67048336107ff20917e0eb1276940c4a95179906b77a7dcac15c2c5d2badbf5f9b7a677334b9cef11b7a62d1536b852b481840a41d954a9c38065a46d5fddc3b77f6a623d4546655e328e701460cf1d571ee25aaa9c68f9e4da618d1c6357fa56600277d2ea11babcd8049d2b3c2abeffbe30be148782b2c93c3c4ca804a27415e5b0b0ca24919686a3f5a6e7a81a3d2c88da89baeef86b19231c5f84498dd1659d178c488fd2acb35713e534c79b906fcca31dd898f5ce02604cb231172016a7a72bfaa316c7a1f32741b8a89251d73a5ecfc6f7041d31a13191c60a1f473ad3e071e77e5ba4582cef34d78d15f605569bd258a3d71dfd7b2958a4d9ae1b6f26bb1711621840d4f7df3f8b6ceee4713ecf9df486eeffc8782c592e308472e36ce7fca1223ce129b7639ae9fd27433a3836c0928bbd6159a0dc59d3aff9a3a49044a97bdc17f0e46b0b204754e8d856dcd1f29cd9f283407e88e7454a5a5469c4947cc6e69c39e51c54d3de66466eb887e225a00a6370d8f3a14fe0729952d2eb1231814960512b74f7d36fd232789808d6ca4ca6905b91b8d5e6ef8a129ee9aead04cba5c8e8c97e5ea4a3540e41432e591193dbc230b52eeef53a2a3c237deb931da727c501546ccf8f49dc9f02217249f18b648428b89e13fcf39d2cec1f956b9fd44518112c24851b37ece8ceee6676c3309525108447f2cc64f7407b37cd421eb5dbc849ec287d18ffe04524b101b74a8b18a52f465e1bb1d9b4498d95f77d44aa42a12d453622f11d24a1a8326b679eb3a0a16196639960720bbe62e29f533b2c3a69b5d9747caced8820db7ac8f4468c50865d4ad0860339fbbf49bec725056394d92314ce8d3a0eae8b2efdbb3e24e83e9e68d60aef1ab689323c58602e5958eba7528290a9de55172afc17546f1c835aae1a24abea9c40cfbff630076338f791ecf5b9d44755fb40493ff5f89107bf680ec2dda3efebb106abf897a330c0e47ded8cfd9d237c206644fb132c1c41322eaa87da80a90c274e8f032807330abbaff62abf5c93cad49bb75a08986fe55ac33d733a4f40d49f716aba247b8e030bc077d1c3eb6bd8012c82e0eb04705fe74ec1865c4c752f5a07005bdc683da1fd91d057127d9fc45a7c1610c7e4c7443bae6fe2ce76c7e8fb3c7bdc8c12dd5f1d0f54f98e759860fd9801c3c98e61abeef348673102cd11869b93900225e005b894a16b552a10017028d020788e65199c4294a1ab4127ab7a93217e8be5b7ef57151fb8204995c907eddc7c649f30c0d5165cf0f36efa7d7e4ecacf8c5bfdeaf8ab4b82752fdc21e1299806d31209f012fa153d7432bb8c9055a4b3048a6557ee4ba1f3ef2287be420765548079c8d0db57eec670aedd03eec9c917d628323749c28fd5fcc26418ee69c7170bfed18fa14c0b97e395337344f73a90f8b5ad3b8b23bc06f188f3f4389db2add87d8d11dede013cf0a2e096024d4ff0cc7e221787bc5025f31bdbbf0be91921de1659b91671ca88e5367a9361775825a62374ab8943bf8c1753920fd5d40b5a4302e61de4422fe9418141fd583e0339910b9d1777a73d248fae2bbcf1cbb05491b9606b1e5dc3f7b970dbf9c5b9b66627f5c30f5c4d7fd9d7ce3244d01c4b63d9f3847b9ff886a61bb9aa17d4c650cf0bc7da5d0b4edc2665601bd7f5af2a358870927a4b7ef89662fb33162da07356ddf8276d94fc1d39fc016cca2b2b84926e42bf4d868cb477fece4d3e477433cdc4bec321bc72aa71672a7d322b09b5d07c3541e0f828bca471e76ea4d89e6ff72e7f27d9219e41b56c2aeb3ec39e37308999bd5c9399e699aad164b4fad4965a51194e718fcc5afeca242f010c4738532ce8bf644632342ab6ac28030d9aec3139111105590cac79d579014f3f18c160be0608df7ec6c6f9cb58382181309e3fd5c105e1de5c13e3d4bd594329eb2eee4e015b8466493d997104cd75c402279cbccf5b5e0cfea4e66559352665ebca7e4aef3a0eadbc203e50afa72d715bf8c776b742917ae4f2052bb42a97afe69a1a4d7d73b94053a60d3922719263994f2c5b78764b1eecea5db0730ca33efdc0fbd54301c3b0399dc87b13bce76d5c9a1088163206629634e4c19487551c13f0a85cf58fa8480973add05197fb80e5d9322c6a203a8c43bb31d45e195fde70a53319287f4ad336cbc5e827a77b8478414bcafee1aba8358dc5bc229fa6bc603916c419ea19d97e82db9d97380ddac56f0e888a863a06d60830fd1ab5166cc4a1f8201a90c25164a4801f18fc564679a9ca166b3193f32acdb882cf5c60cf33ee76bd62e2d4cfdf890496b5435b9079ebeb5c6028e330c67f30a54cb3d95edd3405a3168871dfc7779a2cefec969dbe016091cf9ac3526d383791e2af7d018cb64bca5cc526e39ade33867db182d5a3203b15ea94fb608d8835bb54ef736e23fde0e5cbd394a8d2d493ce8c7cd26ce563f8f1a8426e0120137586ad589d03a8b074040c81c20ee94c50ae7bac6c2b6cd30c7037528ae7143fd90dec299daaab2b61b2cee46ba984da1e3d176436f051c7833b30960436f060b7c754f1d2a7090abf8e7a4c68286cbd8c840960d72af02e0dc5973ba69c73efe9f61ad953178095db43ca7b7e62b38a8a286bcf9db4cccbd07757e3b250a31a10aafa47cff48daa3353d3c7d52dd9b47899e7744735559e3f8ffbe462911ade5338b5c65fa2c8dd08c40bc47f1574e129fd03a2d2be2753bee"], 0x10034) 16:54:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20007a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 32) [ 206.218906][T19809] loop1: detected capacity change from 0 to 4096 [ 206.253648][T19809] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 206.263959][T19823] loop4: detected capacity change from 0 to 4096 [ 206.273356][T19822] FAULT_INJECTION: forcing a failure. [ 206.273356][T19822] name failslab, interval 1, probability 0, space 0, times 0 [ 206.277908][T19809] EXT4-fs (loop1): get root inode failed [ 206.286084][T19822] CPU: 1 PID: 19822 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 206.286108][T19822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.286117][T19822] Call Trace: [ 206.286124][T19822] dump_stack_lvl+0xd6/0x122 [ 206.291774][T19809] EXT4-fs (loop1): mount failed [ 206.300686][T19822] dump_stack+0x11/0x1b [ 206.300720][T19822] should_fail+0x23c/0x250 [ 206.332791][T19822] ? __kernfs_new_node+0x6a/0x330 [ 206.338159][T19822] __should_failslab+0x81/0x90 [ 206.342974][T19822] should_failslab+0x5/0x20 [ 206.347635][T19822] kmem_cache_alloc+0x4f/0x300 [ 206.352408][T19822] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 206.359361][T19822] __kernfs_new_node+0x6a/0x330 [ 206.364373][T19822] ? ___cache_free+0x3c/0x300 [ 206.369108][T19822] ? kfree+0xf8/0x1d0 [ 206.373073][T19822] kernfs_create_dir_ns+0x5e/0x140 [ 206.378394][T19822] internal_create_group+0x148/0x860 [ 206.384330][T19822] ? __invalidate_device+0xb0/0xc0 [ 206.389570][T19822] ? set_disk_ro+0x73/0x110 [ 206.394171][T19822] sysfs_create_group+0x1b/0x20 [ 206.399216][T19822] loop_configure+0xbcd/0xeb0 [ 206.404011][T19822] lo_ioctl+0x618/0x13e0 [ 206.408245][T19822] ? path_openat+0x18d4/0x1ec0 [ 206.413581][T19822] ? blkdev_common_ioctl+0x438/0x1110 [ 206.418954][T19822] ? selinux_file_ioctl+0x981/0xa10 [ 206.424683][T19822] ? lo_release+0x120/0x120 [ 206.429443][T19822] blkdev_ioctl+0x1d0/0x3f0 [ 206.434041][T19822] block_ioctl+0x6e/0x80 [ 206.438407][T19822] ? blkdev_iopoll+0x80/0x80 [ 206.443041][T19822] __se_sys_ioctl+0xcb/0x140 [ 206.447800][T19822] __x64_sys_ioctl+0x3f/0x50 [ 206.452505][T19822] do_syscall_64+0x44/0xa0 [ 206.457172][T19822] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 206.463698][T19822] RIP: 0033:0x7f7d5c352697 [ 206.468108][T19822] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 206.488611][T19822] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 206.497443][T19822] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 206.505397][T19822] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 206.513515][T19822] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 206.521554][T19822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 206.529608][T19822] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 206.538048][T19822] loop2: detected capacity change from 0 to 4096 [ 206.550345][T19823] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200060, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 33) [ 206.573872][T19822] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 206.599046][T19809] loop1: detected capacity change from 0 to 4096 16:54:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, 0x0, 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 206.620638][T19854] loop4: detected capacity change from 0 to 4096 [ 206.631783][T19809] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 206.645413][T19809] EXT4-fs (loop1): get root inode failed [ 206.651208][T19809] EXT4-fs (loop1): mount failed 16:54:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200068, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 206.665828][T19854] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 206.694640][T19863] FAULT_INJECTION: forcing a failure. [ 206.694640][T19863] name failslab, interval 1, probability 0, space 0, times 0 [ 206.707414][T19863] CPU: 0 PID: 19863 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 206.716468][T19863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.726825][T19863] Call Trace: [ 206.730088][T19863] dump_stack_lvl+0xd6/0x122 [ 206.734680][T19863] dump_stack+0x11/0x1b [ 206.738839][T19863] should_fail+0x23c/0x250 [ 206.743321][T19863] ? radix_tree_node_alloc+0x154/0x1f0 [ 206.748941][T19863] __should_failslab+0x81/0x90 [ 206.753790][T19863] should_failslab+0x5/0x20 [ 206.758332][T19863] kmem_cache_alloc+0x4f/0x300 [ 206.763088][T19863] radix_tree_node_alloc+0x154/0x1f0 [ 206.768515][T19863] idr_get_free+0x22a/0x5d0 [ 206.773068][T19863] ? try_to_wake_up+0x362/0x480 [ 206.777920][T19863] idr_alloc_cyclic+0xf4/0x2f0 [ 206.782681][T19863] __kernfs_new_node+0xb4/0x330 [ 206.787566][T19863] ? ___cache_free+0x3c/0x300 [ 206.792453][T19863] ? kfree+0xf8/0x1d0 [ 206.796427][T19863] kernfs_create_dir_ns+0x5e/0x140 [ 206.801798][T19863] internal_create_group+0x148/0x860 [ 206.807072][T19863] ? __invalidate_device+0xb0/0xc0 [ 206.812455][T19863] ? set_disk_ro+0x73/0x110 [ 206.817240][T19863] sysfs_create_group+0x1b/0x20 [ 206.822750][T19863] loop_configure+0xbcd/0xeb0 [ 206.827450][T19863] lo_ioctl+0x618/0x13e0 [ 206.831833][T19863] ? path_openat+0x18d4/0x1ec0 [ 206.836594][T19863] ? blkdev_common_ioctl+0x438/0x1110 16:54:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, 0x0, 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 206.842063][T19863] ? selinux_file_ioctl+0x981/0xa10 [ 206.847355][T19863] ? lo_release+0x120/0x120 [ 206.851945][T19863] blkdev_ioctl+0x1d0/0x3f0 [ 206.856458][T19863] block_ioctl+0x6e/0x80 [ 206.861050][T19863] ? blkdev_iopoll+0x80/0x80 [ 206.865755][T19863] __se_sys_ioctl+0xcb/0x140 [ 206.870379][T19863] __x64_sys_ioctl+0x3f/0x50 [ 206.874968][T19863] do_syscall_64+0x44/0xa0 [ 206.879530][T19863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 206.885447][T19863] RIP: 0033:0x7f7d5c352697 [ 206.889858][T19863] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 206.910064][T19863] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 206.918555][T19863] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 206.926603][T19863] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 206.934558][T19863] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 16:54:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20007e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 206.942520][T19863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 206.950671][T19863] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 206.959612][T19863] loop2: detected capacity change from 0 to 4096 [ 206.974765][T19870] loop4: detected capacity change from 0 to 4096 [ 207.003882][T19887] loop1: detected capacity change from 0 to 4096 [ 207.015606][T19887] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 207.033335][T19863] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 207.044921][T19887] EXT4-fs (loop1): get root inode failed 16:54:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, 0x0, 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c5", 0x1}], 0x1, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0), r4) sendmsg$NLBL_UNLABEL_C_STATICADD(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="84000000", @ANYRES16=r6, @ANYBLOB="010000000000000000000300000032000700756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a3a302d73303a63302e637171781f00000014000600736974300000000000000000000000001400020000000000000000000000ffffac1414aa140003"], 0x84}}, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 207.050637][T19887] EXT4-fs (loop1): mount failed [ 207.061523][T19870] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x7ffff000}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 34) 16:54:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20006c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 207.123983][T19887] loop1: detected capacity change from 0 to 4096 [ 207.152220][T19887] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 207.159611][T19913] FAULT_INJECTION: forcing a failure. [ 207.159611][T19913] name failslab, interval 1, probability 0, space 0, times 0 [ 207.175018][T19887] EXT4-fs (loop1): get root inode failed [ 207.177209][T19913] CPU: 1 PID: 19913 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 207.182977][T19887] EXT4-fs (loop1): mount failed [ 207.191732][T19913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.191748][T19913] Call Trace: [ 207.191754][T19913] dump_stack_lvl+0xd6/0x122 [ 207.191778][T19913] dump_stack+0x11/0x1b [ 207.219270][T19913] should_fail+0x23c/0x250 16:54:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280), 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 207.223734][T19913] ? __kernfs_new_node+0x6a/0x330 [ 207.229155][T19913] __should_failslab+0x81/0x90 [ 207.233931][T19913] should_failslab+0x5/0x20 [ 207.238715][T19913] kmem_cache_alloc+0x4f/0x300 [ 207.243493][T19913] ? __down_write_common+0x42/0x830 [ 207.248934][T19913] __kernfs_new_node+0x6a/0x330 [ 207.253794][T19913] ? up_write+0x25/0xc0 [ 207.258205][T19913] kernfs_new_node+0x5b/0xd0 [ 207.263064][T19913] __kernfs_create_file+0x45/0x1a0 [ 207.268163][T19913] sysfs_add_file_mode_ns+0x1c1/0x250 [ 207.273596][T19913] internal_create_group+0x2f4/0x860 [ 207.278888][T19913] ? set_disk_ro+0x73/0x110 [ 207.283374][T19913] sysfs_create_group+0x1b/0x20 [ 207.288356][T19913] loop_configure+0xbcd/0xeb0 [ 207.293114][T19913] lo_ioctl+0x618/0x13e0 [ 207.297357][T19913] ? path_openat+0x18d4/0x1ec0 [ 207.302108][T19913] ? blkdev_common_ioctl+0x438/0x1110 [ 207.307626][T19913] ? selinux_file_ioctl+0x981/0xa10 [ 207.312823][T19913] ? lo_release+0x120/0x120 [ 207.317397][T19913] blkdev_ioctl+0x1d0/0x3f0 16:54:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280), 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 207.321927][T19913] block_ioctl+0x6e/0x80 [ 207.326146][T19913] ? blkdev_iopoll+0x80/0x80 [ 207.330727][T19913] __se_sys_ioctl+0xcb/0x140 [ 207.335403][T19913] __x64_sys_ioctl+0x3f/0x50 [ 207.339975][T19913] do_syscall_64+0x44/0xa0 [ 207.344395][T19913] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 207.350273][T19913] RIP: 0033:0x7f7d5c352697 [ 207.354667][T19913] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 207.374698][T19913] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 207.383311][T19913] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 207.391482][T19913] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 207.399769][T19913] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 207.407816][T19913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 207.415881][T19913] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 16:54:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000fe, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 207.435382][T19935] loop4: detected capacity change from 0 to 4096 [ 207.445213][T19913] loop2: detected capacity change from 0 to 4096 [ 207.468676][T19935] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280), 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200074, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 207.481946][T19946] loop1: detected capacity change from 0 to 4096 [ 207.493071][T19946] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 207.509184][T19913] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 35) [ 207.544614][T19946] EXT4-fs (loop1): get root inode failed [ 207.550322][T19946] EXT4-fs (loop1): mount failed [ 207.591341][T19946] loop1: detected capacity change from 0 to 4096 [ 207.606343][T19946] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 207.613457][T19972] loop4: detected capacity change from 0 to 4096 [ 207.619229][T19946] EXT4-fs (loop1): get root inode failed [ 207.630750][T19946] EXT4-fs (loop1): mount failed [ 207.633646][T19975] FAULT_INJECTION: forcing a failure. [ 207.633646][T19975] name failslab, interval 1, probability 0, space 0, times 0 [ 207.649960][T19975] CPU: 0 PID: 19975 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 207.650965][T19972] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 207.659885][T19975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.659900][T19975] Call Trace: [ 207.659907][T19975] dump_stack_lvl+0xd6/0x122 16:54:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20007a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 207.659930][T19975] dump_stack+0x11/0x1b [ 207.659946][T19975] should_fail+0x23c/0x250 [ 207.659962][T19975] ? __kernfs_new_node+0x6a/0x330 [ 207.703315][T19975] __should_failslab+0x81/0x90 [ 207.708337][T19975] should_failslab+0x5/0x20 [ 207.713257][T19975] kmem_cache_alloc+0x4f/0x300 [ 207.718287][T19975] ? __down_write_common+0x42/0x830 [ 207.723671][T19975] __kernfs_new_node+0x6a/0x330 [ 207.728708][T19975] ? up_write+0x25/0xc0 [ 207.733297][T19975] kernfs_new_node+0x5b/0xd0 [ 207.738023][T19975] __kernfs_create_file+0x45/0x1a0 [ 207.743615][T19975] sysfs_add_file_mode_ns+0x1c1/0x250 [ 207.748968][T19975] internal_create_group+0x2f4/0x860 [ 207.754248][T19975] ? set_disk_ro+0x73/0x110 [ 207.759882][T19975] sysfs_create_group+0x1b/0x20 [ 207.764728][T19975] loop_configure+0xbcd/0xeb0 [ 207.769493][T19975] lo_ioctl+0x618/0x13e0 [ 207.773824][T19975] ? path_openat+0x18d4/0x1ec0 [ 207.778592][T19975] ? blkdev_common_ioctl+0x438/0x1110 [ 207.783942][T19975] ? selinux_file_ioctl+0x981/0xa10 [ 207.789231][T19975] ? lo_release+0x120/0x120 [ 207.793727][T19975] blkdev_ioctl+0x1d0/0x3f0 [ 207.798210][T19975] block_ioctl+0x6e/0x80 [ 207.802431][T19975] ? blkdev_iopoll+0x80/0x80 [ 207.807152][T19975] __se_sys_ioctl+0xcb/0x140 [ 207.811790][T19975] __x64_sys_ioctl+0x3f/0x50 [ 207.816916][T19975] do_syscall_64+0x44/0xa0 [ 207.821649][T19975] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 207.827923][T19975] RIP: 0033:0x7f7d5c352697 [ 207.832711][T19975] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 207.852803][T19975] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 207.861409][T19975] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 207.869383][T19975] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 207.877496][T19975] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 16:54:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{0x0}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:15 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/186, 0xba) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$EXT4_IOC_CLEAR_ES_CACHE(r2, 0x6628) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRES16=r5, @ANYRES16=r0, @ANYRESDEC=r4], 0x10034) [ 207.885541][T19975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 207.893666][T19975] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 207.909085][T19975] loop2: detected capacity change from 0 to 4096 [ 207.927472][T19975] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x7, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200184, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 36) 16:54:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) writev(0xffffffffffffffff, &(0x7f0000003500)=[{&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000000140)="d2bc889c134dc952aaefa3edb1855f5341e7a6ae6f6c0cc5b7a7cc3ec8769574454331093009044f59b94bd00ce49f59322741eadcee946be2a609abfd013db19c3acc097d392910ffdce4dae331f3f0328905802997155c342e73dec493adf7d8e39707427e7eb1103f9afb1865b2868abcebea7053abf53b2e0d3dc1645cb64f992b6d66c6c5862c7d3e1052f830ff5275998dfe9abcd6af241d37e08c393f428009d1895d57d4869d9fc8ce26eff2e878e05d30cde5e08d2f1730eb90a2f8477c0bea69e92369fb66f24a0649751b49df5573ba802002e8b8ce5222cdc563649968", 0xe3}, {&(0x7f0000002380)="088a7ce6cb42c70959ade741755e4b18bf0e0a4ca6b49dfd73a701729a33814cf24da1e128b8d9236071a8033f34efe4355b85bb59043e21bfd8bbacc443776dc35fedfbc5af1767a5ace5aa07813b4312d19b4b6cefab32a113e8248133b7f8e5935c8b185eba9696c5b3ca2171e63917cb1203ec35ce34b4b41454cef9850e54d8816c9f745ec3f4beb76c74e2", 0x8e}, {&(0x7f0000000000)="b197800f65d7b72f083d86602408e98f729a09885e35a670e8a9549ccc07719d163c32d647faea9bda83868e", 0x2c}, {&(0x7f0000002440)="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", 0x1000}, {&(0x7f0000003580)="629ce1abb753750b717f99d5b26110ec6037200ed5a735728be3f2d4a4bcc76d3b16e72a2df1249b262150525c3b7b38ee201696eda7b5b5d23d68ce2c8dac66b1e2970b3fec89a07df2e6dafcba3c4d3ad5ed19e167eada46f652f1a8058288be1497f82c52af3e7be981100230b8fdcdeebfc695cd19c2c9985b8f87d2a2fb0074b7e37c7f15750d9fc1c1d822dd74d20b38933c5b3ab44c12873ebfeeea16f1b1161f5b7a60eb2103", 0xaa}], 0x6) write(r2, &(0x7f0000000380)="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", 0x1000) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 207.985828][T19995] loop4: detected capacity change from 0 to 4096 [ 208.031506][T20012] FAULT_INJECTION: forcing a failure. [ 208.031506][T20012] name failslab, interval 1, probability 0, space 0, times 0 [ 208.033943][T19995] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 208.044443][T20012] CPU: 1 PID: 20012 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 208.062841][T20011] loop1: detected capacity change from 0 to 4096 [ 208.064233][T20012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.064245][T20012] Call Trace: [ 208.064252][T20012] dump_stack_lvl+0xd6/0x122 [ 208.088711][T20012] dump_stack+0x11/0x1b [ 208.092951][T20012] should_fail+0x23c/0x250 [ 208.097392][T20012] ? __kernfs_new_node+0x6a/0x330 [ 208.102415][T20012] __should_failslab+0x81/0x90 [ 208.107170][T20012] should_failslab+0x5/0x20 [ 208.111658][T20012] kmem_cache_alloc+0x4f/0x300 [ 208.116668][T20012] ? __down_write_common+0x42/0x830 [ 208.121860][T20012] __kernfs_new_node+0x6a/0x330 [ 208.127218][T20012] ? up_write+0x25/0xc0 [ 208.131440][T20012] kernfs_new_node+0x5b/0xd0 [ 208.136112][T20012] __kernfs_create_file+0x45/0x1a0 [ 208.141212][T20012] sysfs_add_file_mode_ns+0x1c1/0x250 [ 208.146575][T20012] internal_create_group+0x2f4/0x860 [ 208.151844][T20012] ? set_disk_ro+0x73/0x110 [ 208.156382][T20012] sysfs_create_group+0x1b/0x20 [ 208.161345][T20012] loop_configure+0xbcd/0xeb0 [ 208.166011][T20012] lo_ioctl+0x618/0x13e0 [ 208.170281][T20012] ? path_openat+0x18d4/0x1ec0 [ 208.175053][T20012] ? blkdev_common_ioctl+0x438/0x1110 [ 208.180495][T20012] ? selinux_file_ioctl+0x981/0xa10 [ 208.185808][T20012] ? lo_release+0x120/0x120 [ 208.190309][T20012] blkdev_ioctl+0x1d0/0x3f0 [ 208.194879][T20012] block_ioctl+0x6e/0x80 [ 208.199232][T20012] ? blkdev_iopoll+0x80/0x80 [ 208.203835][T20012] __se_sys_ioctl+0xcb/0x140 [ 208.208427][T20012] __x64_sys_ioctl+0x3f/0x50 [ 208.213000][T20012] do_syscall_64+0x44/0xa0 [ 208.217417][T20012] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 208.223613][T20012] RIP: 0033:0x7f7d5c352697 [ 208.228158][T20012] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 208.247837][T20012] RSP: 002b:00007f7d5a0c9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 208.256232][T20012] RAX: ffffffffffffffda RBX: 00007f7d5c39ccc0 RCX: 00007f7d5c352697 [ 208.264201][T20012] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 208.272327][T20012] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 16:54:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{0x0}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 208.280281][T20012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 208.288234][T20012] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 208.307294][T20012] loop2: detected capacity change from 0 to 4096 16:54:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000fe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 208.350612][T20012] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 37) [ 208.392135][T20011] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 208.409238][T20011] EXT4-fs (loop1): get root inode failed [ 208.415214][T20011] EXT4-fs (loop1): mount failed 16:54:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{0x0}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 208.455087][T20049] loop4: detected capacity change from 0 to 4096 [ 208.457700][T20011] loop1: detected capacity change from 0 to 4096 [ 208.486652][T20060] loop2: detected capacity change from 0 to 4096 [ 208.486873][T20049] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 208.509314][T20011] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 208.524634][T20060] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 208.550795][T20011] EXT4-fs (loop1): get root inode failed 16:54:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200187, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 208.556515][T20011] EXT4-fs (loop1): mount failed 16:54:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200186, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 208.604306][T20073] loop2: detected capacity change from 0 to 4096 [ 208.613743][T20081] loop4: detected capacity change from 0 to 4096 [ 208.628899][T20073] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 208.641517][T20081] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 208.663423][T20092] loop1: detected capacity change from 0 to 4096 [ 208.692689][T20092] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 208.710209][T20092] EXT4-fs (loop1): get root inode failed [ 208.716008][T20092] EXT4-fs (loop1): mount failed 16:54:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200003, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x8, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 208.868090][T20117] loop2: detected capacity change from 0 to 4096 [ 208.878863][T20117] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x3f, 0xff, 0x7f, 0x2}, {0x1, 0x1, 0xf9, 0x1}, {0x2, 0x0, 0x9d, 0x2}]}, 0x10) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0xcbb1c5c5b8448d1e, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x4) syz_io_uring_setup(0x1152, &(0x7f0000000900), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r6, r7, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0xcbb1c5c5b8448d1e, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x4) r8 = accept4(r0, 0x0, &(0x7f0000000200), 0x800) syz_io_uring_submit(r4, r7, &(0x7f0000000240)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, r8}, 0x7) pipe(&(0x7f0000000140)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e20}, 0x6e) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001ab, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200189, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200004, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 209.170677][T20136] loop2: detected capacity change from 0 to 4096 [ 209.181795][T20145] loop1: detected capacity change from 0 to 4096 [ 209.185142][T20146] loop4: detected capacity change from 0 to 4096 16:54:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001ac, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200005, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 209.210427][T20146] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 209.224009][T20136] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 209.227732][T20145] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 209.248010][T20145] EXT4-fs (loop1): get root inode failed [ 209.253859][T20145] EXT4-fs (loop1): mount failed [ 209.279893][T20145] loop1: detected capacity change from 0 to 4096 [ 209.290770][T20145] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 209.303250][T20145] EXT4-fs (loop1): get root inode failed [ 209.308950][T20145] EXT4-fs (loop1): mount failed [ 209.314505][T20164] loop4: detected capacity change from 0 to 4096 16:54:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 209.324197][T20164] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001d0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001b6, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 209.361047][T20185] loop2: detected capacity change from 0 to 4096 [ 209.388092][T20185] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 209.388321][T20193] loop1: detected capacity change from 0 to 4096 [ 209.427445][T20193] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 209.442475][T20193] EXT4-fs (loop1): get root inode failed [ 209.448205][T20193] EXT4-fs (loop1): mount failed [ 209.461885][T20203] loop4: detected capacity change from 0 to 4096 [ 209.483200][T20193] loop1: detected capacity change from 0 to 4096 [ 209.501542][T20193] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 209.504477][T20203] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 209.519939][T20193] EXT4-fs (loop1): get root inode failed [ 209.530183][T20193] EXT4-fs (loop1): mount failed 16:54:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x600, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200006, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 209.717044][T20229] loop2: detected capacity change from 0 to 4096 [ 209.731947][T20229] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001ce, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200204, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200007, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x20000081, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 210.063952][T20257] loop2: detected capacity change from 0 to 4096 [ 210.069847][T20256] loop1: detected capacity change from 0 to 4097 [ 210.071282][T20261] loop4: detected capacity change from 0 to 4096 [ 210.092322][T20257] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200008, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001df, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 210.116778][T20256] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 210.128903][T20261] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 210.131267][T20256] EXT4-fs (loop1): get root inode failed [ 210.145779][T20256] EXT4-fs (loop1): mount failed [ 210.177465][T20256] loop1: detected capacity change from 0 to 4097 [ 210.192626][T20289] loop2: detected capacity change from 0 to 4096 [ 210.205540][T20256] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated 16:54:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x7ffff000, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20022f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 210.226753][T20289] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 210.232331][T20256] EXT4-fs (loop1): get root inode failed [ 210.243918][T20256] EXT4-fs (loop1): mount failed [ 210.245751][T20297] loop4: detected capacity change from 0 to 4096 16:54:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200009, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001e0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 210.288819][T20297] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 210.333105][T20312] loop1: detected capacity change from 0 to 4097 [ 210.342485][T20312] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 210.368671][T20312] EXT4-fs (loop1): get root inode failed [ 210.374394][T20312] EXT4-fs (loop1): mount failed 16:54:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 210.392691][T20324] loop2: detected capacity change from 0 to 4096 [ 210.403910][T20329] loop4: detected capacity change from 0 to 4096 [ 210.417927][T20329] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 210.434535][T20324] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 210.483981][T20340] loop1: detected capacity change from 0 to 4097 [ 210.496113][T20340] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 210.509000][T20340] EXT4-fs (loop1): get root inode failed [ 210.514988][T20340] EXT4-fs (loop1): mount failed 16:54:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001f0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x7) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2003c1, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 210.944810][T20368] loop1: detected capacity change from 0 to 4097 [ 210.946678][T20367] loop2: detected capacity change from 0 to 4096 [ 210.952712][T20372] loop4: detected capacity change from 0 to 4096 [ 210.968972][T20367] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 210.974988][T20368] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated 16:54:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000b, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001f8, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 210.995170][T20372] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 211.009606][T20368] EXT4-fs (loop1): get root inode failed [ 211.015397][T20368] EXT4-fs (loop1): mount failed [ 211.066808][T20368] loop1: detected capacity change from 0 to 4097 [ 211.075493][T20368] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 211.088019][T20395] loop4: detected capacity change from 0 to 4096 [ 211.106536][T20368] EXT4-fs (loop1): get root inode failed 16:54:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0xf) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 211.110124][T20395] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 211.112315][T20368] EXT4-fs (loop1): mount failed 16:54:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001fe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200402, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 211.157129][T20415] loop2: detected capacity change from 0 to 4096 [ 211.180419][T20415] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 211.231471][T20432] loop4: detected capacity change from 0 to 4096 [ 211.240607][T20433] loop1: detected capacity change from 0 to 4098 [ 211.259926][T20433] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 211.279121][T20433] EXT4-fs (loop1): get root inode failed [ 211.282735][T20432] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 211.284857][T20433] EXT4-fs (loop1): mount failed [ 211.316985][T20449] loop2: detected capacity change from 0 to 4096 [ 211.329907][T20433] loop1: detected capacity change from 0 to 4098 [ 211.341547][T20449] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 211.356885][T20433] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 211.382128][T20433] EXT4-fs (loop1): get root inode failed [ 211.387843][T20433] EXT4-fs (loop1): mount failed 16:54:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x99\xb0\x03n\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b') ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000400)=0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r7) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ppoll(&(0x7f0000000940)=[{r10, 0x5091}, {r9, 0x1000}, {r3, 0x100a}, {r9, 0x100}, {0xffffffffffffffff, 0x8330}, {0xffffffffffffffff, 0x9040}, {0xffffffffffffffff, 0x4400}, {0xffffffffffffffff, 0x8104}], 0x8, &(0x7f0000000980), &(0x7f00000009c0)={[0x2]}, 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f00000001c0)="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", 0xfb}], 0x1, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3]}}, @cred={{0x1c, 0x1, 0x2, {r5, r7, r8}}}], 0x70, 0x4840}}, {{&(0x7f0000000580)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000600)="f0ff3e973e69836320b204b476c069680461d873e5add50ced3ef8a96e51a1c8af183021eb4978cacf4611076438d66d28e9ebe39657fe6b21934943252baecefd6cf69bbd6336464a736b33a3120c467f320b7791ba2541264288e30a16aaebbaee7094cc0d4c2bd38d098dd98f9a6c66f1975135e10456f0f02c3a046d77d3c5287e2ab004eb434eece39abf57b4ce2fddf1ec5135f603c376afed03fd0d695ec35e", 0xa3}], 0x1, 0x0, 0x0, 0x80}}, {{&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001d80), 0x0, 0x0, 0x0, 0x4000008}}, {{&(0x7f0000001e40)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002040)=[{&(0x7f0000001ec0)="cf0c99258deea7408420b68b64ea1e04a30c5946d6a8700fa481f944ae200ac9a381f9beb1f6501f0bb0a5e0ec1908fc8e73a89b3c4decb2cda2956a68c48365fdef94945adfca490174a569b15d3a88829bf988316a66a97536c2f6858a0cf998e9e8beac6756e49233027759aa17d53dce701440f4b15367859093be3dbc5b4454e7a9cb5ca4518a0701a6eccdf8d4adeaa44219f91a992bc1783e72f36df1d2920226b121bae4ea43c82af06c341f1b92b1cd29e88440a12f69f8e03f30e37c57", 0xc2}, {&(0x7f0000001fc0)="11ff84171f83ef538c358a", 0xb}, {&(0x7f0000002000)="3c12ed6668dab7f682", 0x9}], 0x3, &(0x7f0000002500)=ANY=[@ANYBLOB="24000000000000000103000000000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0x28, 0x184}}, {{0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000002540)}, {&(0x7f0000002580)="290d813bea8374130412", 0xa}, {&(0x7f00000025c0)="7da910a570a11854040ce41a886c0b0681fac48ea268ac9789135fb7d6dfed8f3b8de8d3b48193e75ec341a5638b3b44dffadfc4840a3a0a1a7ca4ada38411ea5367a60f7ad30ff2cf270ccabab79ad47a8e3f852f73e78d34e24a51af0f39e4965e9ab93de4996ab533ca5d7710a292563672", 0x73}, {&(0x7f0000002640)="1fe976dbbea3ba8af05e725934a17f286daf34cd869ff5347d38bc97", 0x1c}, {&(0x7f0000002680)="4f599d2b4b0e863095a28deef09bf3ddd70e548789ed250a0f25a51f87547d100f766e1891054d9783d1f90d7146ed2685e4af75a33274d8176493fd4a0d84560b7cf17d40ce459438facc3ec575db07d4b70f401a4ec7e5d380f9336b8f2d0c7fadea36283b1c4738a21602c03b54451b7dd6ce22c137666dc14eefc2d1382594829524e6c90b433c91dc7cdeeb3dc38c53b668617dfb5dcfe46a96ba5c4826ea0649a971628bf19351c98878d00a2fe362e2f99d5f2fe26d6b1bbcdcbe78f8e4e95a7d7567b1cebd580f723fefa9b97069ed2b7e86a038", 0xd8}, {&(0x7f0000002780)="b743b3a105653624aac484bed469c6c63e8ead446ffae459f61375de3e5f73e9326d11548175e67c546c9ed6d3071a1bd7d85f140628b52e7883506f8dad90c1679dfaa09f89fde157c7e2f3dcbb091530e6c39f45b27cf4053ca17df68b24ec4155c4d254ebdd70459f15a38c964ec7c6c9213508840bb10606d7a7", 0x7c}], 0x6, &(0x7f0000002880), 0x0, 0x8000}}], 0x5, 0x0) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) openat$cgroup_int(r3, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200204, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x700) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200406, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 211.793434][T20479] loop1: detected capacity change from 0 to 4098 [ 211.796256][T20478] loop4: detected capacity change from 0 to 4097 [ 211.800390][T20481] loop2: detected capacity change from 0 to 4096 [ 211.822250][T20481] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000e, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200300, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 211.823711][T20479] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 211.859204][T20479] EXT4-fs (loop1): get root inode failed [ 211.864918][T20479] EXT4-fs (loop1): mount failed [ 211.873183][T20478] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:54:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 211.909922][T20479] loop1: detected capacity change from 0 to 4098 [ 211.918054][T20479] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 211.931516][T20479] EXT4-fs (loop1): get root inode failed [ 211.937303][T20479] EXT4-fs (loop1): mount failed [ 211.942514][T20507] loop4: detected capacity change from 0 to 4097 16:54:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2003c1, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0xf00) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000f, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 211.982731][T20524] loop2: detected capacity change from 0 to 4096 [ 212.015405][T20535] loop1: detected capacity change from 0 to 4098 [ 212.040637][T20535] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 212.044415][T20542] loop4: detected capacity change from 0 to 4097 [ 212.055732][T20535] EXT4-fs (loop1): get root inode failed [ 212.065468][T20535] EXT4-fs (loop1): mount failed [ 212.087189][T20550] loop2: detected capacity change from 0 to 4096 [ 212.116050][T20535] loop1: detected capacity change from 0 to 4098 [ 212.131539][T20535] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 212.144593][T20535] EXT4-fs (loop1): get root inode failed [ 212.150274][T20535] EXT4-fs (loop1): mount failed 16:54:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2003c3, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200010, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x1000000) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) poll(&(0x7f0000000100)=[{}], 0x1, 0x603) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000018c0)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@private}}, &(0x7f0000001700)=0xe8) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb55631d64c0c2665) setregid(0xffffffffffffffff, r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r7) sendmsg$unix(r0, &(0x7f0000001880)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000000380)="8dabab669f29407db0207828497b908faa32e039326cb9936112ed047736297c698257db9923d77d0b3dd9afd7329e4992decd94ab03270471e8d3241f2f1fb203633c77b6c1fda57e41e1b832a34f82df067dac0c42183f5e70851f8125adabc7b52f33a382de29c08527d093462a5b875063de4e5618e5853810825e69a5a5ee8bb1fa25da5db90f4c5e9b02cfdbc248be88b95c28b9fc722e904e32e982caa01c12103ababb1071a011b26f84dc97d205b1cd41e740f7496f66d0e4698680c49e23e7875015f23de29c59f8937f", 0xcf}, {&(0x7f0000000000)="687174e81d3f2f73e4a8be812b60fdb4cfcf8282e92035ebb081bc731fea136aacedca934d069447dff3c7", 0x2b}, {&(0x7f00000001c0)="762ae25cce3825577b300c69100206b508e2859c2b6684e9f1965a37585c8010f0c630af1637e9451389fd51c6742ae7fcf70f2f85c0a1770842d89c03c733de4e6303260cfad5a35fa072e14951588ecea27cdc8fe8d415b2d69c3cb3ef278afeb7badbcd08cf003756dc001368660431bc03ef302b490dc5f6e44597a95ba5d5a4d3ebc8b06033dad1cecaa790519c18ae72acab66b97f8ba6714f1e4b0a", 0x9f}, {&(0x7f0000000480)="47a9cd694bd9d7d23360fc98d15c4d41139f26305f580e2c6c70b7fed0b04e369d34abee56d0628b9d43c173235df94e064a5038f2d0718519b3030ad7d4f6bb3e2d4dd2ed8161a72776cd87c1dc083d475319bc1a12adaee347e7b0134fc7802505e450c0cd9f03b8978995198b080df941fada9097d1228c88a35c9ee928cccd0e71f418b52a7757d57f57f0cdeb010bef485c2c782f9f0c105a18fb475c7f981d4c364447940fbb95afec6284255317e477cdf8ff64eeaf9f86b821e53a79081c06d06685362bf7e6b7447ed1bcdef1ed48869c301325a9544a9fa600"/233, 0xe9}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="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", 0xff}], 0x6, &(0x7f00000017c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r7}}}], 0x80, 0x4800}, 0x4085) 16:54:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2003c5, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200011, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 212.689001][T20585] loop4: detected capacity change from 0 to 4097 [ 212.690501][T20591] loop2: detected capacity change from 0 to 4096 [ 212.700760][T20586] loop1: detected capacity change from 0 to 4099 [ 212.740453][T20586] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 212.753054][T20586] EXT4-fs (loop1): get root inode failed [ 212.758817][T20586] EXT4-fs (loop1): mount failed 16:54:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2003c6, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 212.787627][T20615] loop4: detected capacity change from 0 to 4097 [ 212.789158][T20616] loop2: detected capacity change from 0 to 4096 [ 212.826181][T20586] loop1: detected capacity change from 0 to 4099 16:54:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200012, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x7000000) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 212.843724][T20586] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 212.872767][T20586] EXT4-fs (loop1): get root inode failed [ 212.878463][T20586] EXT4-fs (loop1): mount failed 16:54:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2003c7, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 212.889210][T20641] loop4: detected capacity change from 0 to 4097 [ 212.962793][T20659] loop2: detected capacity change from 0 to 4096 [ 212.976577][T20662] loop4: detected capacity change from 0 to 4097 16:54:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200604, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200018, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2003c8, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0xf000000) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') close(r4) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 213.555715][T20686] loop2: detected capacity change from 0 to 4096 [ 213.562687][T20687] loop1: detected capacity change from 0 to 4099 [ 213.570867][T20690] loop4: detected capacity change from 0 to 4097 16:54:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200019, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 213.594080][T20687] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 213.612609][T20687] EXT4-fs (loop1): get root inode failed [ 213.618391][T20687] EXT4-fs (loop1): mount failed [ 213.643602][T20687] loop1: detected capacity change from 0 to 4099 16:54:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2003c9, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 213.652084][T20687] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 213.668489][T20687] EXT4-fs (loop1): get root inode failed [ 213.674203][T20687] EXT4-fs (loop1): mount failed 16:54:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200022, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 213.702174][T20727] loop2: detected capacity change from 0 to 4096 [ 213.734022][T20740] loop1: detected capacity change from 0 to 4099 [ 213.739804][T20735] loop4: detected capacity change from 0 to 4097 16:54:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2003fd, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x100000000000000) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 213.758698][T20740] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 213.771131][T20740] EXT4-fs (loop1): get root inode failed [ 213.776945][T20740] EXT4-fs (loop1): mount failed [ 213.805410][T20754] loop2: detected capacity change from 0 to 4096 [ 213.822500][T20729] ================================================================== [ 213.830773][T20729] BUG: KCSAN: data-race in copy_page_to_iter / ext4_fill_super [ 213.838519][T20729] [ 213.840830][T20729] write to 0xffff8881383b040c of 4 bytes by task 20754 on cpu 0: [ 213.848921][T20729] ext4_fill_super+0x692c/0x7830 [ 213.853852][T20729] mount_bdev+0x1e8/0x290 [ 213.858357][T20729] ext4_mount+0x2d/0x40 [ 213.862657][T20729] legacy_get_tree+0x70/0xc0 [ 213.867260][T20729] vfs_get_tree+0x4a/0x1a0 [ 213.871928][T20729] path_mount+0x11ec/0x1d20 [ 213.876419][T20729] __se_sys_mount+0x24b/0x2f0 [ 213.881090][T20729] __x64_sys_mount+0x63/0x70 [ 213.885820][T20729] do_syscall_64+0x44/0xa0 [ 213.890398][T20729] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 213.896401][T20729] [ 213.898801][T20729] read to 0xffff8881383b0000 of 1377 bytes by task 20729 on cpu 1: [ 213.906738][T20729] copy_page_to_iter+0x2cb/0x950 [ 213.911726][T20729] filemap_read+0xee6/0x1220 [ 213.916338][T20729] generic_file_read_iter+0x75/0x2c0 [ 213.921720][T20729] blkdev_read_iter+0xb9/0xf0 [ 213.926443][T20729] vfs_read+0x66c/0x750 [ 213.930690][T20729] ksys_read+0xd9/0x190 [ 213.935056][T20729] __x64_sys_read+0x3e/0x50 [ 213.939701][T20729] do_syscall_64+0x44/0xa0 [ 213.944203][T20729] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 213.950219][T20729] [ 213.952620][T20729] Reported by Kernel Concurrency Sanitizer on: [ 213.958926][T20729] CPU: 1 PID: 20729 Comm: systemd-udevd Not tainted 5.15.0-rc4-syzkaller #0 [ 213.967578][T20729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.977616][T20729] ================================================================== [ 213.999438][T20740] loop1: detected capacity change from 0 to 4099 [ 214.019251][T20773] loop4: detected capacity change from 0 to 4097 [ 214.023073][T20740] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 214.049244][T20740] EXT4-fs (loop1): get root inode failed [ 214.055080][T20740] EXT4-fs (loop1): mount failed 16:54:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200025, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2003fe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept$unix(r1, 0x0, &(0x7f00000000c0)) bind$unix(r2, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20002e, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 214.419779][T20794] loop1: detected capacity change from 0 to 4100 [ 214.427244][T20799] loop2: detected capacity change from 0 to 4096 [ 214.442980][T20798] loop4: detected capacity change from 0 to 4097 16:54:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200402, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200048, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 214.479437][T20794] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 214.492334][T20794] EXT4-fs (loop1): get root inode failed [ 214.498201][T20794] EXT4-fs (loop1): mount failed [ 214.506525][T20814] loop2: detected capacity change from 0 to 4096 16:54:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200406, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20004c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 214.559645][T20794] loop1: detected capacity change from 0 to 4100 [ 214.566173][T20836] loop4: detected capacity change from 0 to 4098 [ 214.573447][T20834] loop2: detected capacity change from 0 to 4096 [ 214.594988][T20794] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated 16:54:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x700000000000000) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 214.632756][T20794] EXT4-fs (loop1): get root inode failed [ 214.638559][T20794] EXT4-fs (loop1): mount failed 16:54:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200a00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 214.687886][T20862] loop4: detected capacity change from 0 to 4098 [ 214.703654][T20866] loop2: detected capacity change from 0 to 4096 [ 214.708025][T20867] loop1: detected capacity change from 0 to 4101 [ 214.738725][T20867] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 214.760947][T20867] EXT4-fs (loop1): get root inode failed [ 214.766970][T20867] EXT4-fs (loop1): mount failed 16:54:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200500, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200060, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200b00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x654d0a8c23375b14) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) creat(&(0x7f00000000c0)='./file0\x00', 0x104) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 215.272120][T20895] loop1: detected capacity change from 0 to 4101 [ 215.285320][T20895] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 215.287809][T20899] loop4: detected capacity change from 0 to 4098 [ 215.308046][T20900] loop2: detected capacity change from 0 to 4096 16:54:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200600, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200068, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 215.340977][T20895] EXT4-fs (loop1): get root inode failed [ 215.346728][T20895] EXT4-fs (loop1): mount failed [ 215.418901][T20895] loop1: detected capacity change from 0 to 4101 [ 215.426181][T20925] loop2: detected capacity change from 0 to 4096 [ 215.446734][T20940] loop4: detected capacity change from 0 to 4099 16:54:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0xf00000000000000) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200604, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20006c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 215.480818][T20895] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 215.495039][T20895] EXT4-fs (loop1): get root inode failed [ 215.500744][T20895] EXT4-fs (loop1): mount failed 16:54:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200c00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 215.571361][T20964] loop2: detected capacity change from 0 to 4096 [ 215.575108][T20967] loop4: detected capacity change from 0 to 4099 [ 215.580676][T20969] loop1: detected capacity change from 0 to 4102 [ 215.604346][T20969] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 215.629015][T20969] EXT4-fs (loop1): get root inode failed [ 215.634756][T20969] EXT4-fs (loop1): mount failed [ 215.686067][T20969] loop1: detected capacity change from 0 to 4102 [ 215.695317][T20969] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 215.716132][T20969] EXT4-fs (loop1): get root inode failed [ 215.721871][T20969] EXT4-fs (loop1): mount failed 16:54:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200700, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200074, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200c13, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200900, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 216.144050][T21003] loop2: detected capacity change from 0 to 4096 [ 216.146053][T21007] loop4: detected capacity change from 0 to 4099 [ 216.158609][T21008] loop1: detected capacity change from 0 to 4102 16:54:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20007a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200a00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 216.193281][T21008] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 216.206564][T21008] EXT4-fs (loop1): get root inode failed [ 216.212791][T21008] EXT4-fs (loop1): mount failed [ 216.219038][T21023] loop4: detected capacity change from 0 to 4100 [ 216.277210][T21008] loop1: detected capacity change from 0 to 4102 [ 216.306608][T21051] loop4: detected capacity change from 0 to 4101 [ 216.306688][T21008] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated 16:54:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) r4 = accept$inet(r3, &(0x7f0000000040)={0x2, 0x0, @private}, &(0x7f00000001c0)=0x10) r5 = accept4(r1, &(0x7f000000aa80)=@ll, &(0x7f000000ab00)=0x80, 0x800) sendmmsg(r4, &(0x7f000000be80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000240)="c32c16902027eeb47108cfa1895b56b19dcfbff76c7f1359cff1789c550096d0056d87afe62f690f3307e6e60c1f0f3b678fd822ce42cc0b4fd758a09783b69ef788aa6eb1fcb953b5570138fd84619bdfc27d062bc44dfae55fd3a3ba40574aeea22a131af724a513d7f1", 0x6b}, {&(0x7f0000000380)="dac0dee3c3934613c12c80d474f92625e40766ddb4f6c9897ac2be3bfcffa18a6ebc289e9708a1f2ce10a27a98c6a654086fce1047790318614281c8a84018c4902a0d286a15b5bea14b26", 0x4b}], 0x2}}, {{&(0x7f0000000440)=@l2tp6={0xa, 0x0, 0x57401660, @empty, 0x4, 0x4}, 0x80, &(0x7f0000000a00)=[{&(0x7f00000004c0)="3e34b6a34becb6e531112fc53e9f62efae0740eb63b215a84f6bd9905a86becf34ee62c6c96a40e9c3ba2c17a630f3bd9d7691611fd4988d9176646e046b0ed0160d", 0x42}, {&(0x7f0000000540)="5e05aa6b906719471dab6ab40e0933f9f1912fcd957b15148635245f5a53a4a6ae78ab357995939df604532c0dfa8ed07db75c6f7ca9b6501097eda053c9abcb314ef3f363596220d11725883e3dcbf76a3c3e63d317b191a2e4eab0c9d36979ae242873d3b7984bc1b39484", 0x6c}, {&(0x7f00000005c0)="30dc5950e484be2e514ced4674018f937ae0f5f284ac2f907917baa5c3f5340d69c904", 0x23}, {&(0x7f0000000600)="95060ca63dff0d49507f870ab61747e3da8f0a3f36b100ea6388a8ef0c9e980a53f0201c0941f5d3307f70053fbd2b415e34b6a6476d65c3ecab29496c688194b3ce4e6f0cc98d927bd87b9dfb7442a1dee5f921bafc96307f377b6470b756ddf6eb2360255017840db9b24e8cec63946004bf03502e14a74a7c40933cd525fa63e010000a6f176f52064729a7d8ef97ee250cb04d77390fd5fd3befedc2296faeb7d488a948db47d4f1c944abadc832a8c046713785a1115b994c548ca4a491321859", 0xc3}, {&(0x7f0000000700)="7f5830b6684d6ad20e68409e6178d24ef9e3d1b94f85ce3363da6390ba1a037fa0d4d921c3c75f0fefdc", 0x2a}, {&(0x7f0000000740)="0349a799295891cb7765578d646ead96a5dc07a0a85407b123095bdc1a65c019279e62a5212141eed05591d826c79d225052f8dd81bed882cf14f1a5fee807e7e9a68304b40f2c7f1190ad7a53e0f63c5799167d083d8571cf9e74d750a5fb4852876d0b0f5b231993628c9f4fca49fbaee05b48bcc4a15e2b8f8a424711c6ba618bb23d81df239e360a068895ba0faac7458f63cb4a9668f7796de6", 0x9c}, {&(0x7f0000000800)="8072efb876585ab5b95dd2f643c92848abcb7f81659cd69e687bd9b07d558754e8c74547be6da8f4c662d13c242ca1ac2c55414e93fb2ec8f852fff8350caa7a3605f70638888b29a7f97d3867897e5525969c31a94c877868c73103adf96d0186bf6d308c9b62a99f7b24cf8b99925c7934f0e9fa62d423c21a6b58bbe7c68e7faecb6446de734c72ed626d2ef4ccf762fe114e2c798a9bf013f9c9658fbe125f", 0xa1}, {&(0x7f00000008c0)="f9a6a4efb4db1ff975642c3a54d52f1a849347890d75031559aae3590ef6fd5c0bb216a64e7662ca376c56b1a1865295b75c8fe22ecfaba96f79dfd4893260e045ac456c916ac92795963831e3c3a380856d014f29ddf43648e7ca70b6f234ab52507773e0d45ffa029a240f108c3c7c4bf131d653b4d1149822af216965c815b2e4d45103d933308e7341aab50d175ccbcc275b42524e34d0853161b07c8356f5de776f5c342725f398ecbb7a40740e758a8fd3534ed16dd055af8a05720dd6417e4ac268568a5b725bb0418930074977618c2ced4a28", 0xd7}, {&(0x7f00000009c0)="59d8cdb0ba91fb55fc21784ebf0fe9eeff201bd0d84abd7694dc9adcc071d56f932d6f344c0a31fd32d921be465da3c81f792c", 0x33}], 0x9, &(0x7f0000000ac0)=[{0x1010, 0x117, 0x0, "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"}, {0x68, 0x88, 0x6, "762ef0b77f10c112e189e12c94920d24def4a8f95049c504f8ae80b38a354e71b6335bbe5b35f20dd8f482248857b0915ecbd2d5377bea66ae8b1458cded695b99b3222d2236834ec77fac477cbf9f5c922644b7"}, {0xd8, 0x112, 0xffffffff, "2a8ea135c24608490a7f0df1ab1e3e3cc0a2bfd7420def2365ff73b1f734bf0da5488e1e798fc0286238ede253a641564e402130b94077b282de95e90846f796fdcc45f97c558aa8c1f0b51d2c3196dfc72aeafb95d7ff6bd86a5d51924364bf673e29cc5efded2453877406d3ed3b953b7863f47a9d6b3c727c9660c9f03b22096e7cbd9b5d6af33920073e60a3c32436a38d9b386104d4b45b7e92ed1bb5d5a81b3266e5678bb0f811798aa2df95f487d4a9365e29445292d8f77a3f0a0439dd0d240b8ee9"}, {0x88, 0x1, 0x1f4, "56b01619574991842c3d61a16274d3ed9741ac61be95ee633a1c292d1a003b37bac38a634b37bdea392dd80604bda8e5d1eac0362a8aa8c1331ef6217f91ca8032d5bbc4b6d656afb7ff4a6c05105ffba847455ad577e6c91facec63e626cc6ab0e50b1b7ed978eee108a11459cbaae10ad21fce7c"}, {0x30, 0x113, 0x4, "0c79e0c59359559383ecf96bebadb215d084fcdce1c07c3cc032d5"}, {0xc0, 0x115, 0x8, "1f3518d772979f689e2bb06aa22c3758795b9c9416abf30cd9ab19188351e6c4649f80c3b7082c8881a1c7d4565528a08bb5c84564790606fbcd76f624a54727b6ab670ffa454282ebdf6b243d9b78b249e90c7cbd4da1dde13fa2f4fd53459453a940e9e9744b6af89fe3517078e3d88c572afe52fc644b25c212302948ea72d5bc78c3e4aabe4c82912f2bef39d34b762cc19f17cdbfe52ae2b150de2233853a23382875be53449236c5253f"}, {0x110, 0x108, 0xa6, "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"}, {0x1010, 0x115, 0x0, "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"}], 0x23e8}}, {{&(0x7f0000002ec0)=@ax25={{0x3, @bcast, 0x8}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @bcast]}, 0x80, &(0x7f0000003080)=[{&(0x7f0000002f40)="5f9ef7687175f171cda51cfdaea91d5bed7c82e2c61152254e6f3a369a6c8a3bdb06503fe51496133156bb432bcfdde7e68e407649bd6358047b18f805f53f784f77b12c49e3a160d36fd744fbf7830dd400da885b279b0a679fa4785b1e7eb73e16048ae15d80a7ae79004e573df8d642287b41c09272a1d09be56daae4c0f3a6fa7235f03475ff5971a5606990cbb20aac56a121e390", 0x97}, {&(0x7f0000003000)="badfef0be8d755ed471c0dd6b94f35b24978922ed825b9e7590a253f1af5591a602946960a0810cc0f4f5aaf11dec0f11cfefdb0f2f9a3761cd427a10e9a95144c54d542b93014693ac8f859045d27177ff4cf046a", 0x55}], 0x2, &(0x7f00000030c0)=[{0x90, 0x6, 0xfff, "26e6b0d3d20cb88c7163607d395164f58f1240f93c255b5dc6507d594bba23b67466cf305b1f2ba04fea9dd6f739b0be6685b935a7aa626629495975e1ca980977b38fb4e86991c5826c86887a7d4cec60c930c4d11fa1846442cdd6dd94dc2e98a68a660da9f55076146c7fde22a344644af70e9c5ad69cb20c8d794008"}, {0xe8, 0x104, 0x5, "408271d717bcca16a3ccb33a99da367ea9cc7931e4f8857844decbb77dc5cce693d355f3b7aee325a22e09d8a5b261212b62a2249343119188d0a36a124661c27b79c56fa5a7c98893a9d9ec17ca2f36f9d1baea2c211e04a09d558e6c5d2115a3c89386390cd59283b5d88499747c3abd0863b43bbbee36b0ab405f55a21091362c32f66f2bca9584c0e10faf81549d31a39d2fc5e003fec98203b162b754ea39b60898818e35e25c64b36f43fd7386ca2a1f1744e2c7b783d69e76c52cddd93f2592a3d5af93a8aacc5a9f430a3f431648385da5f9d8"}, {0x108, 0x119, 0x1, "31e8e9d48c3dfa8a86230d49d3bb4875c483a6b6788e2d7f3f50484e826e6cb0e46248bc6bd702fbb3e830e05780f73045fe8ad01cb1098ff3436567e2bed7de7d3c5175dfef098618dea53fd8ec67f0fb73f96b12cd61dce0450d638610e1c9d9dba373ea810a68cbf91facd3d8d3644c14aadc4f8c897b39a44b2208ffa43553435f4b95b1eab7ab4aac2f8d40b15f3c1d4d662817bd69d9a21fa1a74a368af2bbac2ccee9c65b6992996a7ae12b868f46921fb5c1d49d958cf15f0931657bf295b92dc391f6f86df9208689596384cfcb54ec57d0ee1271ceee383b5678e4f2419f0b14e6326c31ac2eeccb7ca2959491f02316"}, {0xc8, 0x117, 0x4, "a676c671af0aef6744c5baa34d88a05be2728b34a3f743b26059b77f2d74740a32139b7bdf6737f5b33875f8f2b0e898b60959441255744fb58a67d099711d0263b6ce78081d0912d2bfb715840867231aac531ae5510e87b0117fec4f3528637c5c7a511c0e5631acd3efe1673a22c2ed56531cab97fe4e63583508e241aa1956d6242c67a76630552f733d265887a970af842758d10ef5c98263c771fc73d485b430d4fc494ebaeb73b247d102c97698"}, {0xf0, 0x29, 0x8001, "cb3d5da44bffec3ae83e557e7782a4bc8e402a3735ddc1da4cc832944dfb657ea79ffc2b18560460c1e953a4eaf66863b476138147a77c5af94b97ddac9102d0fd5cb2cec88b001cedabb37a706a4eae0098c95544a68c52b309b9ea48761c5ba273da11ea0a0dc2d9da9f1714c8fa7da0fb3f35522ae05da61ebacb51af3a24d08a28bd49ac2ef4a6fe1f1b0f2aabdbd9b4344b9b147372e14f8ed23ae7e458199b5c55039628a7234b980dd41ec9c00a7e9e28000231caaa3cd670fc1b3e64d6a7d3a6509e0f87829af9024b89155f6238da5f5461f44919b0f5239994db"}, {0xa8, 0x117, 0xaf, "0ea828a2a05d6363d0f8ae9ce7c9ab2a9b308015cde2e4924f74d089397248c73e901e8178b89fa2a9b9f6dc3cc672b98e22c2a4adbb32767e7a9528578c377fdddef92af2bf58fe394866bc2d787f532d470a9710aeeb00063cf4d34b44bfa7016f45fb7db228e342155aabb6ddc249480761c958df6614bceafdd44fe3a90126e369fda5b405f7a9dd3ff76593c8ed10e6020036"}], 0x4e0}}, {{&(0x7f00000035c0)=@l2={0x1f, 0x371, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x8000, 0x2}, 0x80, &(0x7f0000003940)=[{&(0x7f0000003640)="8a5aab120dc37e624894538ddd356df8747dcfe1383a20ead6abf1c4544b3d3514b0b1c37be29802a0ef0ee6f40eee4c6e5ddc0094b165fcd15084691c22867d659b912dcd6912522b83b5daae19e387084b1279c7e64b14cf8aa68e9477d8c9c1e0bf4a4acaaa3efb57fe8a12e84ff0a4d2", 0x72}, {&(0x7f00000036c0)="7b2137c0ac20739801c223d2f579cde65e83a2f6c8e90260e9fd3464a32503a2edfa6682000140a66b266694deb3691d62067b326bc6df8edb9ada24832e1c8be512aab756a6d51525c7bb0fcd2f42019493f43340c0caac1d58990a9d4a99acd82018153d4f2248e7a445b13010ffe1a0b94fe76cd8064e65b5ade89a26d8f34c2f3fdbb6387d7a5099625341e8485056", 0x91}, {&(0x7f0000003780)="dafde509ead73f3cdf9e519e5f77871b32dccaa939d7e0d28668daeefb13fa89edbfb9bfd1ec38744902dca3d989b7bc6b40be2019de78742ca6892f8858631ced60af15f8fc3bb1b137a5a13f4a61e1febd9dbf07337ee45d4fa8a26f0a97acdd5ec45755815667e9e0c27c1474e7146c541ac877bef7c44b2288b218fdbc31c3f8a988f863fafe3149dac22f7733981a627edd80ce2e9a8a5126fda835d4fb91a82ae346c98aca64d76105052cb1a6cd9c46f45cbd7e6c73f8fea6c4575a72f5e7c5578ede665db887261e3e5b06aec163836f59", 0xd5}, {&(0x7f0000003880)="8818e0c204655797f31c494d3ba6fd", 0xf}, {&(0x7f00000038c0)="76bc0f1939a214b3e29e5f13a0aeeed61aac3e90eee6dc257e79f803c246965643f30634803a1ee25faf62c93e53f8ca9c25ee432089421645c74fedddd87c63a8d2548edbe89ad3c2baf6a50617a6c0f411981e6243a8e3c15a26ba5199327ce05a73abb9f097a89c86bb6a86955dc3456920a293f5348b9b", 0x79}], 0x5}}, {{&(0x7f00000039c0)=@generic={0x2a, "e0439ea2b310958a960719ac5ba5151615d723524928b7c32d54a04cb73a1715cf0cb62c15cc0e75c9968f5f1743d582a3b74ef41097c108d67aad04180c49bd045fa11f3da1bc108a6a8aaf212bb0432709a458af2f444d625056168979c8fc180692687fc61ab1b05cd6866d84a2e052ce97c4c36c6d8e3e2e348cbace"}, 0x80, &(0x7f0000003b40)=[{&(0x7f0000003a40)="34c2b474a13bdbf75497d8c28b4ba468f342be38393824dc0b6100bee947458db23ba440b3129075d958d887fa67c0fae98e7d07fbd3dc9d9276754606595ed8645e2c6c949e0ee87c45498ba37548c1a1222870a38da03e7fb34040d7f9187b265d11f3890d92817acc3618648194ee7db2865dfaa76634ae61a4e0a7bdc6d2ff34d4aa0ed22e658f2d82f6bde3cd02586184fdcdffe00a", 0x98}, {&(0x7f0000003b00)="2ecdd38018e1726207303859fa2a7b40927b31bd6d65420dc84a277ace3500568e3663a174ecb417cb3fed33c956a68717e06ae2be", 0x35}], 0x2, &(0x7f0000003b80)=[{0xa8, 0x88, 0x4, "57935ebf2126ee3b11ae73dec9a277852edbff3cf0782a15b0e2a6b1499cfcd5796c3016a2443a9b29c97f5b89630391657800c318097dfe6b9fb2585a9c0574311840afe79f7cb6a6ab1ddab22657195c3d2d520ac982a711cb179cf796338da928237e59e857920a5cf47d547ada9e9d4c7b21b29ad369d889885e385562c54589fba33f823c10517c77592cf2d12fbed63efa9f5515b5"}, {0xb0, 0xff, 0x5, "764d2c14509c4e9f30d1d450e8013100dc17c784c188e74f920e628211d1a57da1c512572a04e5a6a0fe07e85390107c63d93b991d58c96ad5db84efeb4b6cc86509ebfd784fdf843d139e20f9212c982d0fbee217733ca272503869e1f723088471770c1db91a9120a6f2404db56f7ae5a7e7d8e91b8fb2fa2a19e1b74692e4081408ffeef4ab4041bdf41e1f9f8cc86141ae634d1116d7ce9868d22008f0"}, {0x1010, 0x10a, 0x5ab, "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"}, {0x1010, 0x10a, 0xfff, "a748d00cfbcfc1e6bf002cbaee448b49d1f769494d421efbbfc8eac16a1ac98bafbfcce2f19e2abb0348aa57b120c635d43d1fddbf46ec055164da39bb2f52d063e3e4c6ec226e9c050155adf38336eaed44bb7e4f6eb536673dcbe525a30064739ecc9c9946e5e20482905d1ff21a786a9565639c7f7ad407e23cf0d9d74d2e767eb5e4f12dc719d59804292276aec1709cde5c9ee47679cf7618f58b30de439de68d2f610e3ffe5bd383ac9ee79ba9fd75aea9af0678874d247c274ab2413756c222598a22c3cc1aa5a7c330bfd9c9564a8276ca221d9e6b87b2e48b6aa5eb2a698a87c16270d0fef8ef1b0743e556d9d726467fae060d6779cefca61b953f68b18f6db9d0b4a3a2d614a2f7dc47c334f21dd835d011c26b76ffb661c029037707d2589332f09ce1b93fe3789ebb7ede1226694e5b7a6f47722e8dc185a09ec093f7a7f8a2bda5b87723e4b877d1a681de4aee04f8a53ec14070242ba1393bba8d8563c20f050ca8e2b6fd5c85c2f816d5f61334c55f40745022a805ff8040a6e7480aed0de67ace538cd325142670a99737475a86e249b3a8a9e6df963d37d7f50ccfc058d475c16cfa524a7225caa2bd7f2dcf7b3b80b1d936d5cd9ebb93cb021280e11e74fe9f2dd77469512cfc9885d10e5f2897db79da6c6b1733d4680b06fceb72872c986f9166ea63da28e47e6be15599be7bf96306c2f40f0883e6435b495910376b269749094eb31d624ea1c1c90e520de8e955a14e2ec199ac412ede22d2f856ec02bc7a4f82ff292234633054e119af0cf2c8a1d5ea6fe0bf8d467e9fd27f958c5eff26dccf269e04fb5e76038c4daafc13841c1691582d0a79ee51eb45bdc6df653fedfa5e69b6ea0b3323d7d3a5e10ac4d592a42018251172b7e2b8e7b25f8062881fa8d4c8cc34557ec6c40850d91238dfa98d480277e48a538d5e246ac822e74a08569c6916812b7c92735c3d768f3bb28d5220f54ad799686f5a1873b45e4002413656c8e71725283165ae005cf37be1dc1eb14bb780a37a4d6ac33b26416c747e038fe1c6f44404ea639ad0e901fb0f8886f21b421ec6cb0b9b4263d9bdd6cce6b360dbaab2805cf105f96089bfb94a14715301f555b911c31a543015da038ffc647fed9b62038bb155edf515f5588a6f5fdaeca4154d9deeb81544897f0bebb8bddc2d553698656cc41f8085a3f3d8cd2383ebbbdd6caceee4bd5d024d9eea99be0e6ea0f13e6c0c2a2116cf884bdb3fa45b1f92ba6213067c6b05967dec7e15751cbed3a3ef85dd4c07432ccec8d5b7ac695a696af4e8756dbdab0e7fcbb0028e45c0d41d65699e7c621d0f07e427ba2c823ea3523bb901f5366b4282371e688aaea6b842ed6e5f828eded3f5d29125ea3c554828be0d703c52bce6d7c2cf6daf43c57227293ab195c4491d6ff4141d65e3251ffdcc3a11b924f3a45ec3680adad064400cc0844a396abe9f596eb002bc81ff963e7e826e71e718d4885fe72189daa52df1ed3fe3d1797dc8f153ddfb687cb2c2036e0a889dc77421ae65e9f05ac2b5158994b97f4352d4bf82e312adaccde5b03c7af4afc6d557ecab3a3ce11bd6a04e0a7f2e76fc36cb46eca24038c880a81ae11f1c8ede227702d144c52ac1a38541c71e9267e8951a1288458e53ffe5fd7e60ea6d24b0cb9ccf8bceeeb186d3075e64c96aec02ba67a72204e7c694e673ca4d0cb754e43929fc7547d22219963929af855f90d49b18750758cac288a2d3b72af9d0274635ed5f357ef139f9b309899ea684d1798d2ccf1fb66b5cb6b1bba9fd7bb799d6ff8c6c05b9fd6bbacff9a74b795fae6df69a82df1050ba2ad01b3cd9752fde63ad1f1ddf5cb0e659846816bc66afe81d72430b50693b05d3d49126d06b3aa9a60d9fbf3465d2e18b4a43a70708596d236db0751dbded70e27504d3db549f54c1a62b91964fc9c50d87779831996bf9a8265e16a5f54fae351dccf5071b4248cb2d4ca5497b9fa4b7b61b0b1e6dd1717cd4386c5b5bb32405ae489a8f650c4b7c2d1f9a1d73fe4b302d3b3417c556324330513fc2639c1134728ee5cb10b74eaa60bcb4450c9ea6d502876409ba18e175fa08b1475086767d3828f38bc28cdbfbda319562866d40df477677a6afd71c2e8962bc270b359ea2531c747e871cf18e249bab9acfb9f9a27685d90f661a33fbf30f94502d7429edf9724be3057b55e5d8391cbafe79db68d0885e2a48d4b26c428014f071819b23aecd91d5c9d7ec3bda581acd20d7ea499947b9500b1dcf6df02b0fb4498337c4b06a40744119139216120f3985c7c84147b511945f9fd9be804584ff465285460c1eb516b407dde1c0fbe6768d17d888da4abde346ff14c248f53ef9267607216a781f7a28f66f39f0f5e6d2454b0de7bbc3d12e49e44f9d51eda27d2f20aa1816de78ae0b741d079a1cfc7aff44b7e8d5c09964f987b48575a6a857854566277d1d68842549f703edfdd9f50d7b481a027aef111d29747116edbadbf0da6d25dcc5d66114d488e7cb59ed8a16bcbc71aab1803de9731eacf6cbbdaf82954de01641d3e6c6bbfe6d24ef84db224f8dc0262222d1429550f1fd4e407584c0017e3c87b358fa701be75aa1b693e1aa7a4f2c386b38599b507967a977d1387d8d9c0543453507a4f3cffa5c31c8b1b43e06be58b5bad3f0870a2c99f21f893ff2985c838f87c43d0386de9d25e0b02dab0aaf23db1cc69c254f24cc4c50b193ebad1a001a291defa52162082aa3cc08025264127f27d39619ddea6613a4bfb62e83ec8f9e25ce9da5f6c8e283f147f52d3290ae0f111a051d4466b1c2f2caad7ad5b5cbc8b5a64252e1d21bef23f62afc1c43883bd65697c5cb3b5a5934a93181f6629d0a541e68a6a190b10a2dd93b0a9a6110dc9cb84618b8380b1b512628f12e008f7d91f5371d7e69aa11ca4e296a4f677b4a8dffa731f975d637d56299cdc6e81aade45d1e912b2293b0c6e3c4a049f4b32e6330179ea44a16c9c1c9804dcd6ca1b7f2544b2a75141344468a32200422df52ac4f3ba0e6de8ead5f3cdba237790a3bba3628d55f434953f09864a7c321bbaed85b76aa4506f38d96614c5159d740f8a4f4b2d7ffa83f9a6d279cdd85f4d3502647ed5d954d71bc732703cdb2bca586c141e7282feff99f986c87f77538fd23fec5a85c263c4de2ca43cd3c3a5046c5c319f7e6de404d27500aa236541f72ae0eb4bb049bd71015169afe4c6795620263ccc5d0b5c1222c9e80b7193cba34cc53396e06f78e322e3a4e84532179d9bfe811d54eb3d535861b96de11c7ef99f37718a9bd93241201970fb450e76cd0ff70d6f6ab1ff74fcc4450aab4cf40d82bcb0ed18fa818dd6fa0a050ea7c0fcb154238b8ff6afd37a1df7e85f1f77fecdea06672f72040d1c3c7dcd8123645f5c519674ea8c5d66269d0afca9bc8599bdc7d50861ad3ae84bed7b19ae2e44ad413a948765e04e7bd866f41db9b7e9243785240442b3fa92010d2ebb538e2c83a0858ca3bbc58f27e396d28650a8b0b726059b2c8f154c8e11829d85e2054f9c885e73bc82e3ac4612d92f7eed7ec5e2b628b603e470aaa8c9dd9e3f65050553a9cccfe59dd66a301b4e11e9c50b0791589d5f9e5a3ba1cd4c6eb54ae3a05cb585a9af0df64ced9112476307cb6e4cf89ebd9ed2e19b465982850c810b3c692b74e9ab96b8b8fae1436f7c10cd19370a7a656079cc2e77950847576d1a1166d4b2d4a33b5732059220b48dbabeb4b8dec67cd88507038751989c8086fb4f186fd7ed4d884f161ca529b11f0472779b28f83c4c199471e9b0e37cb697c9083e20680399ce2b23c675e4ba19b51e4d698783843c0e71ba81bb07e50ef8ea9071f4935cd9d6ab94052ee679b050cb95ac11be658946b229ae6a0de7648ca9c8396462d96828727359d1cd1b18e8021410fa7a0e05de60d352e52f88fde4848ae2d57d0563e373ef04944fac475c07b4524a660e3b95cef2ad85f75dbe4eb4f0c56ffd6cabd211592b3bc6d32734b247303ee571f424d05a01bbcdc68436db7062a944c04d1d30d59018de833f3ff64d33841c50255be0662a0c42ad0f60e7366f5720b731cd851840aa5ee042c900e5b4b399e66b83aac0153885d59cd2fcc64254cd479a3d704466efc351fa71937a38b7a74977e95171673cce9abc6402f944ab1ff5abb6cb83e6d675388761d4cd05c0ed18f0b2c8bca1ad6ffebf286cef4a2adbb70fbc05119e0bc90fcd5e18529f4fee99c40958afa1116b543731743fe5087344ea63d30f8fd50708d40e393f51f73c47d1d9c5bd5b95bf3834c70646c162250e957bceaf4f2b4c1396b7ac6daf1a6a9109b6976e8105a17e679aea3447f2dff2b1e75b4e2a911cc9e40ef775b7fb6598992ae76de74cce6459193a01d3b88d692e77188ca02494fd3571a5915328d1fad4318deb8e69f66cc29434fba0dd50dc45c3225a96454a5486d46beec7c7f480559bf926e59d09143b36795d9b4a5d48f451d08861378fe8ed583149ced1026c2a8bc8c69de964cfe2f5adfc95ad9152e020925c62aa9c4abb797d49f3cf10807f67d54328ef1ddc95a1734b91b895905447e4ce4ed251fda97ddd15be00a7b43c16cf8c6336985986c8ad30c2672d2c12031f6554cad27a58b9b91f58ed44bf5e7ee5bcc07351cda09d06776fc9fac6060d0d9c23404fd8fd43047fce54e6511d0736406a57104b1c71581e5242773477a55a9c9d778f61df23208655f6585939641109a8287881568dd720ea1ac4ddc10bae313fa467e74c5b3d4afc5dc693478f5a6b61cfad82e1c9fc9876c02e45ee4820927fde163dc8ca58873606eb9c7204c5dfd09da308a34bd5315ec534905276e52462bc603058fd7da99c80bc516dc4bbd2442efe041fb8d893e303a15f795b5168ef7c7c940fd942e180b20dc6aec086cc58a557abab92afeca12476424df48025ed77df60a5a697380f3baf0113ff080a06d4a7eec0a6442f7a8b5831e1bc6b266c368882cb2a42d5e869a09515738486a213658ede6ba2fdba78e2e0662a02dc9335abe92f856a1c484ce2fb88ceb9af49833f0ef15a224eaaaa0bf61d1218d45c3356eda924d3e76e40dc3b3dc0550bbdf8cbc6934353159ec94b32cd0c7390debf314c8f9fcd39181652a6b796c909d6feec9cae5291febd215c5c1f063ea996bde3344a8e37abb2d161280c75b6b1a8214c7dd8a30e907a05f9ad83dd42e070fd5787179ab18d2cb45dcdcb49d4dc613110c95982ff516219e9ead886515c06e92c3375c55a2bccc50e75910736efd2d5e93f3834c4e3cee18e5389d12b2d11a309ee80078177b495a4dbde372b75b2f69c0a971ef422726c749352e487793186cd8546f1f003007ce772cdba73091fd0f66b887916d88389bc90b5b7cfe7313e5e11085bb5a6ccdaf952584b7d2bcba112418aa2d0fbd4dddd37337d9d08719b70e88cde7fe05f425e481cdcae8c0af48cedb64655964e8b6cfe4e5d35a9d6907324704c62ac02d378a9b1b2c93414207ce1e986172cf312ec68a3b532ec4a26d7e9efb2c26043938279634556a8f0a708ffb592ac99fe2a15d8dd5712542927831b9109395496d26f330194d6fb18e97ebe04febb9ba7e1922ed9798b1480d9185d1486ddfbaf38bd217a22f1b31ba46c0dfd725dc0fbeb0aeccdb199b6bde903a20980cc0afaaa7df0585fb10bbab4bbad2a5538d04ce9360742c36b8e222336e4f814c890b33ebde2580ec6cba83f8add4e1f95e306b1cc60de1"}, {0x18, 0x1, 0x25f, "b614c74289c8"}, {0x80, 0x10a, 0x81, "8616aa3ab11b7e811dad02773def1364b7793ed298a319ec10dea7ba7844ff477f30ab293875807f92c4dffff207261c2e3e7cd3c2f4190134a2d14f5b3eed3c48f5c79b0199c6743a25f79d60e65276d547c7f8935d94402016d0a5f999f9b7c29b2dc4794a224897a0adaca6"}, {0x60, 0x0, 0x6, "e266ef41ec81dd2152c4f8535b5aa5a35fe4dd227d3a1fa9849b5927352137d65b6afb6758b1d0b94cc37b8dc8860fee8b69c352e00a25d130762846331e7fa66ec5508214610f447f1cdab3021f"}, {0xc0, 0x115, 0x9, "7014117afdcbf32ec8077f7662aaa9d199668b95acda4c47300a2984b52a805375d6804fef6285ecbad4b09bf198918e4da4c8c6995cb96676a01352ffcfc601efb7e724e24513fa5a8c6ec445d4cac0731e5bdb4b91aaabed1338ec41e67632a420a678112dbb8ff0fc11ed1afc7bc8fe63a21aa15162b5d27ad45ba16f80e581c2a50e05b0d8c01943f484f773d571d31d2b475d607f061b2a7b3f250bf6897a66c3a0824a769254af"}], 0x2330}}, {{&(0x7f0000005ec0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x4, 0x1, 0x4, 0x3, {0xa, 0x4e22, 0x200, @mcast1, 0xffffffff}}}, 0x80, &(0x7f0000005f40), 0x0, &(0x7f0000005f80)=[{0xd8, 0x116, 0x1f, "97b1607e58e5cb81870375996a4a6591b77c040c1f3778a5726c9707acc3c20a5d790010745e3156367ce83c95a6c767210d27082f069373db2f1f51f01cbbcef3c00d53e0704a9c3f7194d29fd98145a873391bf4a157cd6327751beda0070479824adcd9f7cf79bfa8e6f40ac896cf8a587fcf0c961dac033d3f8613dc9f6af50bf33cb2bc66c411827e122ae4a46adf02500dfe5ac855a1545aef49bbb93f61f43e9b61a2876eb0c48438d5a4862ff9231f073b5ae7e0833b88c2e6f34bac82eb12d3414d"}, {0xa8, 0x84, 0x6, "59001a971ccfeb5175f755f8b6e653309ffb3a36326b4690104f38ab96354fe46beb49b576aef2118b83f00743b312e04c41c2327c33399e6a01bcf02c1551571479184fbf4567a8a2d9c76eecc5a40a351760e12e9d72984ef707f12fe2e4f9e0b8e4fb78cc10010f823f64c95e2dd756ad76ea5b1010b9440ba54798243a3b7461855dd5f4d15ae1bf8e6e86a2f8126965a7b7da1bfa"}, {0x1010, 0x113, 0x0, "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"}, {0xb8, 0x10f, 0x1, "bafc01f4603c83c21e62895cd4b6452a29e44ed046bd0e05b1111e4961848c77aebfa90c31bd6c2d7eafc4e76e5f4c819dde112d03e18f207cd6a5fa45c1e070317e7c174ad79590c2122d450c68bd1c9f1dc60041cf03289a0e94a58eb44195b55204201d169f6b35e0d886bf0c149220c247c42867133e6f2c817b047fa55caa612f12ca2508a1166684d88c37b555a696dedd675a276ac95189e30815a5a12efd131645ec6662"}], 0x1248}}, {{&(0x7f0000007200)=@generic={0x4, "ed695113a7f789f1e7fe6c48d7c57f6d553dcfa17e1948ed2b6427411538c63fcdf76d8b0fa4dd86b253709fcfafd0e010182f3690a011376e145b9ece120c2b86184775d872969a1906bf8527e4ecf6abbe417c1d16f78501c64087a916a83271702ba1056c38ff9c0ffaf7ce591a4c209d3c207332e6dd316f56de4c38"}, 0x80, &(0x7f0000008580)=[{&(0x7f0000007280)}, {&(0x7f00000072c0)="32e69f02e238c84571d40b8a3adac0056c30fa1a022e331fdbd81c45959071520da765c0b8fc7577103a2b3e828df3fef533daf5e0bdad6b17962b50492229482dd5d7b463f76fb90f9a6e89e99d331ba68f12606cde04a763cf76af45f8e0a30128cf595ec1d9ae55d7595c21f6c0aa831147a4446e4268346f6ad88820dd84e65abf3f6cb8d5e3", 0x88}, {&(0x7f0000007380)="1816d419c97f41951af485f6d9061ec0aadd87aee6bfd64ab317a4d5e8da39ee7027408dbcd2e8d47221a973e4c2fbdda9de243cb5f8e9015b207aaa2aa4ea68573f28f2ffcf2966d8979fcb743d65c3f2f831cb7c4653c44afe3144b05d5d6a0363c4737505be09dca94f0f2124ab1835df1729be4525c3a302abc93df5c87b1a20b4820a4d5ff557992de554f00bbf104e870ea7b89cfe090f30d6ed1bdccc7d8119528fb596043977fd269f5b5e0a71fc9192a40f147d3b7a6c355b2ac0a25c0eb650a8f7f1bd4614af780c9820c8716a79bdaff14b8957214c4f3626dfe6c087da88a2b62f6ddcc11cdd78", 0xed}, {&(0x7f0000007480)="9b2b251f5ab917b6d5588604f8bb399087ee278b1365bee07e4c814af5a64d451580291389f501bc9a999ae1a03a36308ad0e628c44c43afd7ebccfa7c7eb81655cb4fab570d5ccbdd87c74ba2e2d6112396458646506c248a87a92217ed9253b96ae6207cf1b728d2206f654be292a39393764b146971b8ec8b13690af02a54d78f726951fbb812797b79fee00135c3486c6fb83bf5b3391e41d1bed5697ce1c390f92618a56766b5dcc011d24a9bc9018c6b9d062dba633f90b8477f208d4cf81e86868a8f51a6fe31455740eb7cfc479170c379824183", 0xd8}, {&(0x7f0000007580)="a553d3b89f8258563f828e96f39f7eddf5eae1a4ab024c2b7e2adfec658b85556b2a0e43257c50f82d964a1cef26d83793eeb3f75a5a281e23148e930c969205f11c8ee68adaaa186fb8e83d734476bb3b599015d62fb3b344b918086128799d424570b0e67683b18a2aed1c9d0d98c47b5053d814384b8bf92e6855000f4bca307f124dae9a4474ca6da10fac91435d8d2898dbaa6a8e84b09fbd86d11d5816486c69a23d811b425d0bebb425cf9161fb4343de9b7c181d2e3c39cf2a3323ef5ec1dbdfdea26ca825b025f70f5a99ebfb62c0d1d320eb83f8f5420b40fd54a7344f380e8dc23358e8e45af2046170d468a5dc8a91b0bd91fc8b49982e504d41677ceb04b1db5ebb2e089f46e48680e3049b1c4fd2c036da608de284ee8ccd6431e5f5a1b4fa895bd337c6def574bc5c438707dbc0a696a388e22d4e556623ffd6ef4dbe6957ebbbc333280ccf8703c8611cdc31439891fac167a9a58387f4eec8d37a598641a870623505a15f8374c8d3682556716d500c5340595bf85e29763d476c2c73405e6ae6b2451f2a599550c3ebb9a2d49dc1d0872f2c818ef8128d533376def02a93a10da6a079206ab739b782a29a2d0e674407a94f9a8b109c8cde79fc5a3366cbc3743c9805acb2fb6e924097ed0375e8f3ef751c49829704bb02e9f4148b3d070bffeaac6ade606cb9f317e1dba221397f6c525512df9074d9de58d03162202326e2f7445b12aaca4b2168b1af4c1d4b16f624bcd96526573eb86d17fd1263b95df206f44839cb4cdf367c80bfa24065276100f12a1d852d04db631454d4df2c1c2e1733d44d86ac7b3fc26b4a05fbc7af354674ace0e94ea91c35d47cb49befd07c4ffe9d450264e9d8aa77265bd36d269b42216b2de5d8e0f3e2ac4ad3c2667ea29e5c4981d195bd65f13ec6879c5e827f754652b6bd5f876c52d2437d7fb53088706c9fc604b34de7e3494d0da4ded85a26ae02a29908f97f27328910b0bff16ef5c5eca823d518dc325210937ff2c5f2dd919915f87d2beea48d458847e9b3619085c8dac5f492e39bc59f7e19c2b8abbc707e873677b4265cb91e5cbd63968b57067be270f16f1d22366bad7b3e51621cc76e8f3599280cfd489052b9c671c71c1ccb33fe1253a1793feb1efee6b252351134458d73812e6e8b0e81d6994e0bbcf2f58b8e5995a9b8eea504917029a878b062249ac813f82bc61d2563b6f6b8d48c593360cd52443884a73dea76505d5fd4ec29126696cece4b2b20e52e405e622016e0ea421b67fbbe6df16965ee60cfedb2afa5d06cacb2afa71d735722b6a88115d9b985c0a3498315dc0e7a76983215f027bbf37c21613ccf8eb515400e5fc80e851662dc62a57ea4f661bc1332c750be4bd29a135f485ec551f2ead97738fcbcf2aa494016a84762e2491771e28d1213c0ed5248c55979b6c912bad05f4b3691e83f702f37c8f6e62cc4016b40daf2928c7efdcfe9197d6ad2793fb38efb2174218aa42c69a4eb4b053badb6e6e3659e6238b9153d968dcb29260ae59cff9ff095b24766980f4a2d30ba5505a061ced186ff6837ee79e950c627b75321ecd4c30cefe6ea7ca9da133b717aad1b74adf17f8a9e86c05c36970af747695652a70db876f19d134f8dee6c860c90414f8c3e9c0dee1d7f7c4f924c1e85940694a33a395c210f2f18fcb4a2e5238c682a5561ff2762a1f678c637b1cbdef6c696d05bf28ba4cb26988898a3fcdcb0832fcbf5f45ef656bf0ef051665cdf5eb18f10d28fe08fff049e0fe661af746a4ebe8bb2795132b692e8ecc4e2987aa0e14f2cd918743a3a2b0ea6865aa7ea15f60d4dd82bf138f0566a510697ecb66f6006c79ab56196d9023b2a11eac43e31902094366d9eb692d0f7e97393efee0e466cac406357ca9db002350be4ebdeb5a20d7d27270d676dc2512ea7ea9351e05da7dcb042776e855a24e597cc05791a6fe85b63f8a617f3e7c4392dcc02e241c93740e1f091de3fff00475596f1aa9a9e6887ed9b2bf71f0b9e5d0fc405d4184c334517ccf5a397d56d225324bd472d0cb7f6c8d50170193bf535221859dbdb61f48488c1cc7aa7da7a1f0322281c3c569a83f96d5922739a72c4a87ed23c3b12a346abdf367a5e517e7be1bacc4b3f2e9f41c0785f4d3cb2b3452c59b9d22a13cfd3656cfe12d5ff16fec8d25c0e12d3f73f53940bf15c9b68de353c6fe8f875bf1cd3ef8ece9b95d40e486853ffe837b0c4126c5074f62260017b03d49db66a8cdc86e1b7dfcc3a175accbdab60d09b59806d2db69f90f729b8ff1e9fbb3e01d99f6666973c9e36b9385b6becfe91bb5039682f3f47589fd78eb7110bb80715905d7cee9cd28197d3103f6879b8c9252fd5a21aa9a61bd58ccb707ba0d746993e581c9fe2928f2f56cb8dc91a0b757a1b05cb16342d9111bfbee87bdb11681ae07a02b7bcebecc2150970949306f7500ee6031360523b0310122afb6a91728efda83b6f5ff636c22760312e8b627d8b9ee1e2b8cd54f9daa111c8003f6051d3d2da7a1c996f7c54ae68e8127c453a556831d38dcfa0084dc64eb094b153d5a9a35232df38d718f423018232191f6b2840b41031e6e58daa862574a547b2b077478354f3fc4f79943146622b783fec74f53f55d8136d71b526db3c64374b4220c83298e268f0cb9f9eb012a708b4b24b4fb1ca589f88920888c0d047215c5f9782eaefcac6194993c9e8787b4f3d4828aac7cb1ba42fa2798147a32f5688ff35d26f39fae447561d0b98b05c5a56795417658029075055e15efdb6211bfa691d56cb484385b987b5f6578aeef4f68051754472a8cfafd3b0fc43d67276d4d02e90f0d695f1a0513c4b65a81ba50430da15ea4367667f02d42036243703a3afb1d0b5aed85b652966fdf43586476d6d08ca9ab07c8cb3aa7289d18041ed58a62fdaf1f39f08767a826dca70d8b0eda9702c9dbf8c02ab718ab9cc7f546f54310f6eeb9447ac44370b2568e041f087e150b908fbb44038012cd95ea01bfda252bc485bab54eae96d88b4efae98734a1f39601bc6a3d3c48c347ed4ed82900129726822a159263a1e6717d02823460a930f5c94573f3fbc3caa9545eb4d1905a8d50431a882fa716abad34d044e8f272358b53f9def9a753e80d50ab64f18985853f37ecc1766a5860e1ab968a320acb6ba56bffb888bdd595f44ad6896a6fc0c11aff1330f7b5147a6c13cab502b3ffa0004330a803b0c76de07bbe149f2ec9e6e33328a25faf6ae58a0ae003f43781dcab79ccce205ed76e925e66f1097b0874e83cc526c677976c07bfa651348e4a9b516dd0554f2437a8b9597c5da6a237ca618680c1f83386e99eaebfa0ab7ecdfd0f151a4629ba51fd81dee681fa2415bb32b33259524bc8cb095c2701d6138f8bbed1be87bf5f23733d764845feb49f3c28b92fbff7bebb9b035000606a1fb296a277854873eb4e4a48d8c7570d6f781db93b187548eb8506df1f770638d057a9e155a09bcef6c27919610b13b9ad247eb8a4e2205e06514dd31e8b2bf04cbe4a705bed66ba0f8ae0ecfea018aff7f4438a5468ac1a2d5712247bd29b7d4ee24b6d87a0cd73f1ecac8ee646b01d82a75cc703d2eeec7922a8176b8173ca06c41b5d4b35c91754fd80c5556d01b3aad95749600e0519c8da36d40b0d464071701fc92f575211c3b2a7303516ddce8181339a5ec72f6f4447fc6f13eb36bdf9afd92915bd0739e850c8ecf0f22feae679eb0869f2900c8c50c1ccd5274af8d0f4a254edbafb249cf2f168115035e760868d2ade1bbf0f26f75a4fd483c354d95b920604b1ffdaaed76727cb555755bd30b9855bbbf00cb76c00a0c6dcd66f7b7483ae48e65c88c90e52acc92136e06dfc1c3f9c0aff3a55cf4db8144a92586b90ba70751f2f5ca6c9a93b11e6a42c02e3d4dcaa617fca6be60c5dff80e4894938fa1ccfd85c97dde800667330b42bd7cc429e781fd0649a9d89e15f2b3fb29fb822b0b0d2dc8630612008c2d082fd5f8bf3434a0cbc237fc5ef2c6bef9f0c8f067ec3491886c2ff5ece81aa8467a611329b0eec505f07263e2ebafaea1981be218176daf6dae036a228781d287a6577d0831c41b81ca6a4ddeac3cd04e6577cb32564d52812fed3eae31023c630b5f145dcdf1a047172bbf8faa10e7294c421fbe7eb0b235ad346cfb0a3cc323a658ca3bd1896c6aa2361986605d77c00d623aa4fceafa1e5ba6eb4eddf9748d6fa8526b736e0924898419407aec3daf75a6ff9baedee13ca4e5dc90cb4005a4956e797c973a03506de1831cd093b7250c3dea9864c51f2d56b08b62ed525569e540166f225254511481cd4c72fed8979847381ad984f13dec73713b6faec72e4ecd70e70d792d130d2e78e344e83eec0cfbbaa0c5f30a0c6bbbe50a2dddc848f9700d280c32be522b42a01834a543601a6886ca022bfb9d440f3d2bd0501ab079c291ae88559b9e35402dec9940990f27139833dce420acf619425934030cec88130d40c8572ea31ebd91abefe1d6a16a236111f0c367c26352553293fc7dc311645658636b23a929f1b332ec48ef2e0241565ccc2d59e0082743a8567080756e7401eb2a9b14fae620b2071b2f6d241a7ef277b94e1ebb6d58b42fc28ff09b257e0fd248909ad22e145a818d137d3bf22a279adce25900fa5a57f69985e92c81e04983ee20851ff9cc71966f5b1fbb609c885153b1b71cdda566f8180412469d7808fb149a33e4e349674cbcb458ecb407d818ef5e6b23de7ac80b94635380ad3a38076a6b0a07b32a1babea26eb11dd8d00aff509b888d009c2a77f67b1861e972cafb2832801e7eee7db40c20315d97545bcba968364023b532d78c648c9e520d3cd677db0e3e4f3773520f3fdfdb5797af9745ae09ad314a979c6982850027e4c12ffb5c95834c63441e1429d16dff47d6dc613d8d1ac94143bb4bfd0958580498721e7ae234a5506f0e426bfe6ec3aa657387c1d43e825cee40a589279842fdcc069599636e62ce85e40a9b93cde443c8d82fac548069a0f64bd50362493bc65f923494dfb3714e0b8541045f68ebc84456de83fe0c6e41b4e8fe4e88f64b307fcc05cd641a1f7e5e1e556b488ed9d13b7daf5d6d8c9c0d9338dc258ed5a2e847053f2aed8056197989f4c885fbe97d39ccd8a9861b83e8c09fe408fd151f3fc2301495bcd099e5535a557fe49cd56b20634a3c115755829568a07f151e24a5d5235e8a991927b1f9716b7b355c49fc098c0728a1b9ecafea512e93bf76ec2a1872c33ad0bdd732cdd1e0af843b988484e3dfa530e6772f20491fbf317d870a306c362b20d12da81ad7c4ecef7a81eb3266c4294a53d8daf3af3f11248f9fa7b6fae66203b0179d1bec6e0fafd9ce640cc84d11bfa883c5f7b5abe6ccaa1349d9ff9a5a3ef3ab9cdfbadad7f3965e91932267c2a56237abc3628d486b46a8fa7aee181e3250178ec367dfd09030e562bc14bde17439a5527a771d5f1d906fc6f5b4774c704ec244167470afd4b1782c86152acf3a9335d58301e88780a3f071bc1bd53aa912d29d5fc641dfcf06dda454fd5b965397270966e39b89e9cc2d651c6a06787a45edca5e60be2f3a559bb624cb0a00c880b5a86b4fa6a376090fca62b03cb793d45ba76e8ccfefa19846f719791e4bb7e14a01bac45d09016dae638fad266fc3bfc4f4d32c79511cc8c1d2c5d9c46c6b4496508f973c418b3177bec1ba31c257898b5c2d02ef1efc8c174f3efca8e01f350aaf298", 0x1000}], 0x5, &(0x7f0000008600)=[{0xd8, 0x111, 0x0, "bd7d41bef8d44bbf1fa264b3d17750844ef582ba7d4205b9ae713a1ad5a074ab2a6aa15de8bb73ef11e7e02afec5cb4bcf5df68f10768d32ea17951ae114fe7082b367502a12cf1e428af2560dbdcd9ffc89feb87d2e91087d7bebab9fa82abd1416ac40647f07c6c44c88a9fc347076497764e14dac60a475d705acabfa063057527bc4ed408b39d58d2bbc76405164381032a864cf4ed4de2bb53e5e7912e9a2f3260083caf5f8639974b59b2d317cd2c374295bcf4c0d809273e0ecb2c51c6a"}, {0xa8, 0xff, 0x80000000, "7b719326a6d83ab9e6f317ea70624646d7582f68fd1eb0271adc53d813ad8d2d38c342965bd5ba69e85e8b62fc20237899de667c8811a34e32eb85c438363bd65c90c2b3c20e3db10fadbc622565c665de892a05fc71d08975eb236dd5dd7daf7ade025b655e937030b46d6a8096474a3ac6451d8d23d7890e137373b79c6636dc9d3ad0fe0e26bdf5b404bce28398fafcf7876d"}, {0xb8, 0xff, 0x8, "68d5f5cca4794b3f81c618ea976d722e0a8c2135e8627ff562ea51bab7d03622e3c4ef955c57ffc351b6c74688a831d5a0837a2c75a69f573ca6afe7d09c3f7e623107ad6f42d211af798d0afd132456c75f2d5b5a51cf2891254b3d2652d0672c46252436b3d90e79a2dfdc35be538dd42439da4e380db1ba2e5f40af7a36200353cee3b3b61df889e887aad9fa031779066b7e7db87f27d3b4836ccdfcf98d05"}, {0xd0, 0x2, 0x0, "0b9d371158e010e689a34e7e9ccbe9c0c2ac8d1a28ef32fe7036e83d8d67108879faa2271293c42c934f8238f129615a4b24483e8a7137b5e412098689fd6cb33aea8f869d5ab711bd06fb09b4d3a62095540f4b80467defb2b4ee3c7042ec5cc9760849a1f60f1aa8273c3a07fb7e4e9d2cd0586d0546580e05d97783a5ce655104f8c260170fbf50ed6486e689129b88e25d511a29ffa558d56b37b7644b87ea1d0b5bc5c186ef13752e8053ce4a9cce52fbcfa3a4d1b6b0763e85f0b3"}, {0x1010, 0x10b, 0x3f, "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"}, {0x10, 0x119, 0x6}, {0x1010, 0x9e, 0x180, "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"}, {0x58, 0x102, 0x527, "1a72d85a221acb279275f43ad509561a4266583ac9d814be20a2c4a49ca9295d8aa458997289568bf95c0b7f1d5ccdd0cd08f43051fc9554bc9a2cf708db7d6af5b36af1c554d1"}, {0xe0, 0x84, 0x0, "e4a87cf95c923a13e12a5cd7bc98c378896fa22a73cf07049c25cb3a8894812fb528bc99208a054ae225cb2e1a78163b2ab4a7ddb830c0426905ed27458d80c7ddbc790ace1cd3958289653ec077e1b1c3a29a79f62e125db23d385e5340e7b1405aac0e30c23a30ed36f184af6e267b53d35fda8daba4f183298a52971fd4f775bb646c747b0f78a526c5c78b685919e90dc9669da3c545524090fbfcd09addbb3b464c9bbf1b0b89d0f2ba70cf3ce4c9632343b8467f111be6abc243a37cfc470d71a1a329ef1463e6113b9e2f8a"}], 0x2470}}, {{&(0x7f000000ab40)=@pppol2tpv3in6={0x18, 0x1, {0x0, r5, 0x0, 0x1, 0x1, 0x2, {0xa, 0x4e22, 0x0, @loopback, 0x4}}}, 0x80, &(0x7f000000acc0)=[{&(0x7f000000abc0)="a7552166ec5821971bd55e80ef618e1a92040e9c4e69553824069b292168c0876bd9a15e3cfcd92f95dc805268bbae7c5361d6b92fe1325c654f5638a68e752ed17a364b05bdf7f66ff8f608f248e02b8d924401c35be365cf0d957f0d34f03f52ad9319e0e3a2", 0x67}, {&(0x7f000000ac40)="943c1d257e4c18991be0b9866aaa28edd36a12195a7ef9ce1cf259ab07ae0b2469649a35de92732f1335d86b19749d931fda8b3583ae963c4e13b521e0a462eb2f724c91dd849bc54859f5d0f49e86f86161aab01eefc982e94a97f665a3ff8bba3b2b390e4a303054110983fa5cf2", 0x6f}], 0x2, &(0x7f000000ad00)=[{0x1010, 0x105, 0x2, "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"}, {0x28, 0x11, 0x2856, "8ed40c32a4d7475cf0c90ae6c84bc818a9fb3c"}, {0xc0, 0x103, 0x59b1, "9e75ee93dc71051ba73b83d02c6b97f2b001ab6e4466cadac79b104e1297f3e1aecf33547c3101a17ef129cd328e3fc5bb677087b4611e9e17ab778f62116ccdd4d76fd0eb55aef9944611acb8f7448914d99158afccd570afeea0bd44f7dd15760b3cc7a39eca57f12ce11b383491b619e60d33ed5b3927ff0479dbc0ed9eb6af242c971c33b503aa7e75102aecf3033558edf75ee0093f42283129c26c81533cb72be1d8809ea8dc8394"}, {0x60, 0x88, 0x1, "d1e922167eb5b93439a9a785868d9e2806e3c379956ec0422224f7d007cadfeb7a7f4d99fda15a2369558ea8373f1cdf3d6e0c06d3f058c0c2c2e7d68423ac1c6078dafc7130c7f18f"}], 0x1158}}], 0x8, 0x4801) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000200)={0x0, @adiantum}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000080)="c1", 0x1}, {&(0x7f0000000140)="1515f05a3a6fc8c2018ff7a1652384b7f486fd80b19b62a19e88316c679ee47498903a485f9952720b69c7343ec7fc90d4b59b06776c1a3cbf0bbaf45d5ae69728512e", 0x43}], 0x2, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200b00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000fe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200d00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 216.333002][T21054] loop2: detected capacity change from 0 to 4096 [ 216.351804][T21008] EXT4-fs (loop1): get root inode failed [ 216.357705][T21008] EXT4-fs (loop1): mount failed [ 216.429648][T21081] loop1: detected capacity change from 0 to 4102 [ 216.440663][T21083] loop2: detected capacity change from 0 to 4096 [ 216.445284][T21085] loop4: detected capacity change from 0 to 4101 [ 216.469488][T21081] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 216.493554][T21081] EXT4-fs (loop1): get root inode failed [ 216.499431][T21081] EXT4-fs (loop1): mount failed [ 216.563423][T21081] loop1: detected capacity change from 0 to 4102 [ 216.571516][T21081] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated [ 216.584839][T21081] EXT4-fs (loop1): get root inode failed [ 216.591050][T21081] EXT4-fs (loop1): mount failed 16:54:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r1, &(0x7f00000002c0)=""/186, 0x1001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') bind$unix(r2, &(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r3, &(0x7f00000002c0)=""/186, 0xba) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_NO_ENOBUFS(r5, 0x10e, 0x5, &(0x7f00000000c0)=0x6, 0x4) connect$unix(r1, &(0x7f0000000200)=@abs={0x1, 0x0, 0x4e23}, 0x6e) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffffffffffeaf) preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000140)=""/143, 0x8f}], 0x1, 0x100000, 0x9) 16:54:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) r4 = dup3(r1, r3, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004cb00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004cd00)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {0x0, r7}], 0x1, "060cd6bed5f770"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r4, 0xc0709411, &(0x7f0000000140)={{r6, 0xffff, 0x58, 0xfffffffffffffffc, 0x6, 0x5, 0x6dc6, 0x6, 0x172, 0x8, 0x8, 0x10001, 0x1a3b, 0x3, 0x80000000}, 0x18, [0x0, 0x0, 0x0]}) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="c1", 0x1}], 0x1, 0x0) read(r2, &(0x7f00000002c0)=""/186, 0xba) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 16:54:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200c00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001f0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:54:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200d13, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 217.029498][T21118] loop1: detected capacity change from 0 to 4102 [ 217.040323][T21125] loop4: detected capacity change from 0 to 4102 [ 217.051748][T21124] loop2: detected capacity change from 0 to 4096 [ 217.061580][T21118] EXT4-fs error (device loop1): ext4_fill_super:4816: inode #2: comm syz-executor.1: iget: root inode unallocated 16:54:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200d00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 217.081297][T21118] EXT4-fs (loop1): get root inode failed [ 217.087199][T21118] EXT4-fs (loop1): mount failed [ 217.094900][ C1] sd 0:0:1:0: tag#7675 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 217.105026][ C1] sd 0:0:1:0: tag#7675 CDB: opcode=0xe5 (vendor) [ 217.111369][ C1] sd 0:0:1:0: tag#7675 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 217.120423][ C1] sd 0:0:1:0: tag#7675 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 16:54:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200204, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002000000060000000