nt_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004007000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2278.914945][T19489] FAULT_INJECTION: forcing a failure. [ 2278.914945][T19489] name failslab, interval 1, probability 0, space 0, times 0 [ 2278.927653][T19489] CPU: 0 PID: 19489 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2278.936059][T19489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2278.946112][T19489] Call Trace: [ 2278.949389][T19489] [ 2278.952310][T19489] dump_stack_lvl+0xd6/0x122 [ 2278.956908][T19489] dump_stack+0x11/0x1b 18:52:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2278.961108][T19489] should_fail+0x23c/0x250 [ 2278.965529][T19489] ? trace_probe_init+0x1bd/0x250 [ 2278.970586][T19489] __should_failslab+0x81/0x90 [ 2278.975424][T19489] should_failslab+0x5/0x20 [ 2278.980078][T19489] __kmalloc_track_caller+0x6d/0x370 [ 2278.985415][T19489] ? __kmalloc+0x25d/0x370 [ 2278.989831][T19489] ? kzalloc+0x16/0x20 [ 2278.993917][T19489] kstrdup+0x31/0x70 [ 2278.997813][T19489] trace_probe_init+0x1bd/0x250 [ 2279.002730][T19489] create_local_trace_uprobe+0xe3/0x3d0 [ 2279.008277][T19489] perf_uprobe_init+0xbe/0x140 18:52:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2279.013043][T19489] perf_uprobe_event_init+0xde/0x140 [ 2279.018394][T19489] perf_try_init_event+0x21a/0x400 [ 2279.023502][T19489] perf_event_alloc+0xa60/0x1740 [ 2279.028468][T19489] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2279.034151][T19489] ? proc_fail_nth_write+0x127/0x150 [ 2279.039557][T19489] ? preempt_count_add+0x41/0x90 [ 2279.044491][T19489] __x64_sys_perf_event_open+0x63/0x70 [ 2279.049952][T19489] do_syscall_64+0x44/0xa0 [ 2279.054402][T19489] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2279.060306][T19489] RIP: 0033:0x7ff6e6d13ae9 [ 2279.064785][T19489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2279.084389][T19489] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2279.092844][T19489] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2279.100915][T19489] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 18:52:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 10) [ 2279.108885][T19489] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2279.116850][T19489] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2279.124846][T19489] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2279.132811][T19489] [ 2279.135920][T19489] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 2279.143078][T19491] loop1: detected capacity change from 0 to 4 [ 2279.149563][T19492] loop4: detected capacity change from 0 to 264192 18:52:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2279.166349][T19492] EXT4-fs (loop4): #blocks per group too big: 475136 [ 2279.174979][T19491] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:52:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2279.211114][T19492] loop4: detected capacity change from 0 to 264192 [ 2279.218817][T19492] EXT4-fs (loop4): #blocks per group too big: 475136 [ 2279.226091][T19491] loop1: detected capacity change from 0 to 4 [ 2279.232716][T19491] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2279.243311][T19498] loop5: detected capacity change from 0 to 4 18:52:53 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2279.254069][T19498] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:52:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004008000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2279.313274][T19498] loop5: detected capacity change from 0 to 4 [ 2279.320217][T19498] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2279.342875][T19501] FAULT_INJECTION: forcing a failure. [ 2279.342875][T19501] name failslab, interval 1, probability 0, space 0, times 0 [ 2279.355514][T19501] CPU: 0 PID: 19501 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2279.363966][T19501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2279.374129][T19501] Call Trace: [ 2279.377394][T19501] [ 2279.380352][T19501] dump_stack_lvl+0xd6/0x122 [ 2279.384934][T19501] dump_stack+0x11/0x1b [ 2279.389078][T19501] should_fail+0x23c/0x250 [ 2279.393503][T19501] ? trace_probe_init+0x1e1/0x250 [ 2279.398524][T19501] __should_failslab+0x81/0x90 [ 2279.403386][T19501] should_failslab+0x5/0x20 [ 2279.407966][T19501] __kmalloc_track_caller+0x6d/0x370 [ 2279.413252][T19501] ? trace_probe_init+0x1bd/0x250 [ 2279.418269][T19501] kstrdup+0x31/0x70 [ 2279.422283][T19501] trace_probe_init+0x1e1/0x250 [ 2279.427135][T19501] create_local_trace_uprobe+0xe3/0x3d0 [ 2279.432688][T19501] perf_uprobe_init+0xbe/0x140 [ 2279.437511][T19501] perf_uprobe_event_init+0xde/0x140 [ 2279.442893][T19501] perf_try_init_event+0x21a/0x400 [ 2279.448006][T19501] perf_event_alloc+0xa60/0x1740 [ 2279.452971][T19501] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2279.458629][T19501] ? proc_fail_nth_write+0x127/0x150 [ 2279.463940][T19501] ? preempt_count_add+0x41/0x90 [ 2279.468884][T19501] __x64_sys_perf_event_open+0x63/0x70 [ 2279.474425][T19501] do_syscall_64+0x44/0xa0 [ 2279.478837][T19501] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2279.484734][T19501] RIP: 0033:0x7ff6e6d13ae9 [ 2279.489139][T19501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2279.508825][T19501] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2279.517301][T19501] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2279.525272][T19501] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2279.533289][T19501] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2279.541249][T19501] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2279.549214][T19501] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2279.557243][T19501] 18:52:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000004840000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:52:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 11) [ 2279.560307][T19501] trace_uprobe: Failed to allocate trace_uprobe.(-12) 18:52:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:52:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2279.695261][T19510] loop4: detected capacity change from 0 to 264192 [ 2279.708115][T19511] loop1: detected capacity change from 0 to 4 [ 2279.717608][T19510] EXT4-fs (loop4): #blocks per group too big: 540672 [ 2279.725925][T19511] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2279.750640][T19510] loop4: detected capacity change from 0 to 264192 [ 2279.750918][T19514] FAULT_INJECTION: forcing a failure. [ 2279.750918][T19514] name failslab, interval 1, probability 0, space 0, times 0 [ 2279.769801][T19514] CPU: 0 PID: 19514 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2279.778213][T19514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2279.788267][T19514] Call Trace: [ 2279.791542][T19514] [ 2279.794463][T19514] dump_stack_lvl+0xd6/0x122 [ 2279.799124][T19514] dump_stack+0x11/0x1b [ 2279.803275][T19514] should_fail+0x23c/0x250 [ 2279.807763][T19514] ? create_local_trace_uprobe+0x247/0x3d0 [ 2279.813638][T19514] __should_failslab+0x81/0x90 [ 2279.818451][T19514] should_failslab+0x5/0x20 [ 2279.823029][T19514] __kmalloc_track_caller+0x6d/0x370 [ 2279.828309][T19514] kstrdup+0x31/0x70 [ 2279.830746][T19510] EXT4-fs (loop4): #blocks per group too big: 540672 [ 2279.832205][T19514] create_local_trace_uprobe+0x247/0x3d0 [ 2279.832232][T19514] perf_uprobe_init+0xbe/0x140 [ 2279.832258][T19514] perf_uprobe_event_init+0xde/0x140 [ 2279.832277][T19514] perf_try_init_event+0x21a/0x400 [ 2279.859685][T19514] perf_event_alloc+0xa60/0x1740 [ 2279.864651][T19514] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2279.870299][T19514] ? proc_fail_nth_write+0x127/0x150 [ 2279.875623][T19514] ? preempt_count_add+0x41/0x90 [ 2279.880567][T19514] __x64_sys_perf_event_open+0x63/0x70 [ 2279.886115][T19514] do_syscall_64+0x44/0xa0 [ 2279.890606][T19514] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2279.896501][T19514] RIP: 0033:0x7ff6e6d13ae9 [ 2279.900965][T19514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2279.918982][T19515] loop5: detected capacity change from 0 to 4 [ 2279.920693][T19514] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2279.920714][T19514] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2279.936354][T19515] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2279.943156][T19514] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2279.943171][T19514] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2279.968452][T19514] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2279.976425][T19514] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2279.984442][T19514] [ 2279.990843][T19511] loop1: detected capacity change from 0 to 4 18:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 12) 18:52:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004009000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:52:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:52:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2280.007737][T19515] loop5: detected capacity change from 0 to 4 [ 2280.023790][T19511] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2280.040151][T19515] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:52:54 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f0000000000007d0101000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:52:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000004c40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2280.139741][T19522] FAULT_INJECTION: forcing a failure. [ 2280.139741][T19522] name failslab, interval 1, probability 0, space 0, times 0 [ 2280.152495][T19522] CPU: 1 PID: 19522 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2280.160903][T19522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2280.170976][T19522] Call Trace: [ 2280.174246][T19522] [ 2280.177172][T19522] dump_stack_lvl+0xd6/0x122 [ 2280.181765][T19522] dump_stack+0x11/0x1b [ 2280.185912][T19522] should_fail+0x23c/0x250 [ 2280.190355][T19522] ? traceprobe_set_print_fmt+0x45/0x90 [ 2280.195963][T19522] __should_failslab+0x81/0x90 [ 2280.200745][T19522] should_failslab+0x5/0x20 [ 2280.205249][T19522] __kmalloc+0x6f/0x370 [ 2280.209467][T19522] ? __kmalloc_track_caller+0x25b/0x370 [ 2280.215013][T19522] traceprobe_set_print_fmt+0x45/0x90 [ 2280.220405][T19522] create_local_trace_uprobe+0x2fd/0x3d0 [ 2280.226036][T19522] perf_uprobe_init+0xbe/0x140 [ 2280.230799][T19522] perf_uprobe_event_init+0xde/0x140 [ 2280.236226][T19522] perf_try_init_event+0x21a/0x400 [ 2280.241354][T19522] perf_event_alloc+0xa60/0x1740 [ 2280.246293][T19522] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2280.251999][T19522] ? proc_fail_nth_write+0x127/0x150 [ 2280.257302][T19522] ? preempt_count_add+0x41/0x90 [ 2280.262300][T19522] __x64_sys_perf_event_open+0x63/0x70 [ 2280.267760][T19522] do_syscall_64+0x44/0xa0 [ 2280.272217][T19522] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2280.278119][T19522] RIP: 0033:0x7ff6e6d13ae9 [ 2280.282563][T19522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2280.302181][T19522] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2280.310593][T19522] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2280.318615][T19522] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2280.326576][T19522] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 18:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 13) [ 2280.334594][T19522] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2280.342569][T19522] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2280.350649][T19522] 18:52:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:52:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2280.426102][T19525] loop4: detected capacity change from 0 to 264192 [ 2280.452987][T19525] EXT4-fs (loop4): #blocks per group too big: 606208 [ 2280.500097][T19525] loop4: detected capacity change from 0 to 264192 [ 2280.507150][T19525] EXT4-fs (loop4): #blocks per group too big: 606208 18:52:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000400a000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2280.555498][T19530] loop1: detected capacity change from 0 to 4 [ 2280.562587][T19531] loop5: detected capacity change from 0 to 4 [ 2280.572795][T19530] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2280.586141][T19531] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2280.606974][T19533] FAULT_INJECTION: forcing a failure. [ 2280.606974][T19533] name failslab, interval 1, probability 0, space 0, times 0 [ 2280.619621][T19533] CPU: 1 PID: 19533 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2280.628028][T19533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2280.638153][T19533] Call Trace: [ 2280.641471][T19533] [ 2280.644387][T19533] dump_stack_lvl+0xd6/0x122 [ 2280.648970][T19533] dump_stack+0x11/0x1b [ 2280.653192][T19533] should_fail+0x23c/0x250 [ 2280.657635][T19533] ? __uprobe_register+0x10d/0x8a0 [ 2280.662796][T19533] __should_failslab+0x81/0x90 [ 2280.667552][T19533] should_failslab+0x5/0x20 [ 2280.672053][T19533] kmem_cache_alloc_trace+0x52/0x350 [ 2280.677406][T19533] __uprobe_register+0x10d/0x8a0 [ 2280.682329][T19533] ? _find_next_bit+0x188/0x190 [ 2280.687199][T19533] uprobe_register_refctr+0x29/0x40 [ 2280.692444][T19533] probe_event_enable+0x2be/0x7d0 [ 2280.697476][T19533] ? __uprobe_trace_func+0x440/0x440 [ 2280.702858][T19533] trace_uprobe_register+0x88/0x410 [ 2280.708094][T19533] perf_trace_event_init+0x34e/0x790 [ 2280.713364][T19533] perf_uprobe_init+0xf5/0x140 [ 2280.718111][T19533] perf_uprobe_event_init+0xde/0x140 [ 2280.723388][T19533] perf_try_init_event+0x21a/0x400 [ 2280.728587][T19533] perf_event_alloc+0xa60/0x1740 [ 2280.733545][T19533] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2280.739218][T19533] ? proc_fail_nth_write+0x127/0x150 [ 2280.744497][T19533] ? preempt_count_add+0x41/0x90 [ 2280.749430][T19533] __x64_sys_perf_event_open+0x63/0x70 [ 2280.754904][T19533] do_syscall_64+0x44/0xa0 [ 2280.759330][T19533] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2280.765218][T19533] RIP: 0033:0x7ff6e6d13ae9 [ 2280.769713][T19533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2280.789317][T19533] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2280.797746][T19533] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2280.805707][T19533] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2280.813666][T19533] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2280.821623][T19533] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2280.829601][T19533] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2280.837701][T19533] [ 2280.848482][T19531] loop5: detected capacity change from 0 to 4 18:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 14) 18:52:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:52:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2280.855020][T19530] loop1: detected capacity change from 0 to 4 [ 2280.877462][T19531] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2280.893681][T19530] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:52:55 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:52:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000006040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2280.995916][T19540] loop4: detected capacity change from 0 to 264192 [ 2281.016767][T19540] EXT4-fs (loop4): #blocks per group too big: 671744 [ 2281.057126][T19544] FAULT_INJECTION: forcing a failure. [ 2281.057126][T19544] name failslab, interval 1, probability 0, space 0, times 0 [ 2281.069896][T19544] CPU: 1 PID: 19544 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2281.078307][T19544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2281.088358][T19544] Call Trace: [ 2281.091632][T19544] [ 2281.094552][T19544] dump_stack_lvl+0xd6/0x122 [ 2281.099191][T19544] dump_stack+0x11/0x1b [ 2281.103341][T19544] should_fail+0x23c/0x250 [ 2281.107824][T19544] ? register_for_each_vma+0x372/0x890 [ 2281.113367][T19544] __should_failslab+0x81/0x90 [ 2281.118130][T19544] should_failslab+0x5/0x20 [ 2281.122720][T19544] kmem_cache_alloc_trace+0x52/0x350 [ 2281.128126][T19544] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2281.134154][T19544] register_for_each_vma+0x372/0x890 [ 2281.139435][T19544] ? kmem_cache_alloc_trace+0x24b/0x350 [ 2281.144977][T19544] __uprobe_register+0x392/0x8a0 [ 2281.149936][T19544] uprobe_register_refctr+0x29/0x40 [ 2281.155138][T19544] probe_event_enable+0x2be/0x7d0 [ 2281.160157][T19544] ? __uprobe_trace_func+0x440/0x440 [ 2281.165436][T19544] trace_uprobe_register+0x88/0x410 [ 2281.170632][T19544] perf_trace_event_init+0x34e/0x790 [ 2281.175943][T19544] perf_uprobe_init+0xf5/0x140 [ 2281.180730][T19544] perf_uprobe_event_init+0xde/0x140 [ 2281.186013][T19544] perf_try_init_event+0x21a/0x400 [ 2281.191136][T19544] perf_event_alloc+0xa60/0x1740 [ 2281.196144][T19544] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2281.201836][T19544] ? proc_fail_nth_write+0x127/0x150 [ 2281.207190][T19544] ? preempt_count_add+0x41/0x90 [ 2281.212145][T19544] __x64_sys_perf_event_open+0x63/0x70 [ 2281.217681][T19544] do_syscall_64+0x44/0xa0 [ 2281.222179][T19544] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2281.228104][T19544] RIP: 0033:0x7ff6e6d13ae9 [ 2281.232686][T19544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2281.252305][T19544] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2281.260948][T19544] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2281.269098][T19544] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2281.277152][T19544] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2281.285116][T19544] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2281.293081][T19544] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2281.301047][T19544] [ 2281.309366][T19540] loop4: detected capacity change from 0 to 264192 [ 2281.341180][T19540] EXT4-fs (loop4): #blocks per group too big: 671744 18:52:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:52:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 15) 18:52:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:52:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000400b000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2281.355285][T19550] loop1: detected capacity change from 0 to 4 [ 2281.365826][T19551] loop5: detected capacity change from 0 to 4 [ 2281.375840][T19550] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2281.388754][T19551] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:52:55 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2281.421342][T19550] loop1: detected capacity change from 0 to 4 [ 2281.428117][T19550] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2281.440246][T19551] loop5: detected capacity change from 0 to 4 [ 2281.447548][T19551] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:52:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000006840000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2281.547028][T19557] FAULT_INJECTION: forcing a failure. [ 2281.547028][T19557] name failslab, interval 1, probability 0, space 0, times 0 [ 2281.559796][T19557] CPU: 0 PID: 19557 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2281.568258][T19557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2281.578361][T19557] Call Trace: [ 2281.581634][T19557] [ 2281.584554][T19557] dump_stack_lvl+0xd6/0x122 [ 2281.589143][T19557] dump_stack+0x11/0x1b [ 2281.593296][T19557] should_fail+0x23c/0x250 [ 2281.597716][T19557] ? register_for_each_vma+0x372/0x890 [ 2281.603249][T19557] __should_failslab+0x81/0x90 [ 2281.608096][T19557] should_failslab+0x5/0x20 [ 2281.612660][T19557] kmem_cache_alloc_trace+0x52/0x350 [ 2281.618040][T19557] ? register_for_each_vma+0x372/0x890 [ 2281.623508][T19557] ? vma_interval_tree_iter_next+0x263/0x280 [ 2281.629483][T19557] register_for_each_vma+0x372/0x890 [ 2281.634897][T19557] __uprobe_register+0x392/0x8a0 [ 2281.639891][T19557] uprobe_register_refctr+0x29/0x40 [ 2281.645096][T19557] probe_event_enable+0x2be/0x7d0 [ 2281.650123][T19557] ? __uprobe_trace_func+0x440/0x440 [ 2281.655412][T19557] trace_uprobe_register+0x88/0x410 [ 2281.660610][T19557] perf_trace_event_init+0x34e/0x790 [ 2281.665890][T19557] perf_uprobe_init+0xf5/0x140 [ 2281.670657][T19557] perf_uprobe_event_init+0xde/0x140 [ 2281.675959][T19557] perf_try_init_event+0x21a/0x400 [ 2281.681061][T19557] perf_event_alloc+0xa60/0x1740 [ 2281.686044][T19557] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2281.691721][T19557] ? proc_fail_nth_write+0x127/0x150 [ 2281.697001][T19557] ? preempt_count_add+0x41/0x90 [ 2281.702024][T19557] __x64_sys_perf_event_open+0x63/0x70 [ 2281.707486][T19557] do_syscall_64+0x44/0xa0 [ 2281.711909][T19557] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2281.717870][T19557] RIP: 0033:0x7ff6e6d13ae9 [ 2281.722279][T19557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:52:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2281.741883][T19557] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2281.750391][T19557] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2281.758360][T19557] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2281.766328][T19557] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2281.774298][T19557] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2281.782319][T19557] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2281.790283][T19557] 18:52:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:52:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 16) [ 2281.842235][T19563] loop1: detected capacity change from 0 to 4 [ 2281.849230][T19564] loop5: detected capacity change from 0 to 4 [ 2281.855737][T19565] loop4: detected capacity change from 0 to 264192 [ 2281.866981][T19563] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2281.876209][T19564] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2281.885852][T19565] EXT4-fs (loop4): #blocks per group too big: 737280 [ 2281.902028][T19563] loop1: detected capacity change from 0 to 4 [ 2281.908528][T19563] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2281.921181][T19565] loop4: detected capacity change from 0 to 264192 [ 2281.921569][T19564] loop5: detected capacity change from 0 to 4 [ 2281.933983][T19565] EXT4-fs (loop4): #blocks per group too big: 737280 18:52:56 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2281.950730][T19564] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:52:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000006c40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2282.027905][T19572] FAULT_INJECTION: forcing a failure. [ 2282.027905][T19572] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.040558][T19572] CPU: 0 PID: 19572 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2282.048967][T19572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2282.059032][T19572] Call Trace: [ 2282.062352][T19572] [ 2282.065277][T19572] dump_stack_lvl+0xd6/0x122 [ 2282.069867][T19572] dump_stack+0x11/0x1b [ 2282.074014][T19572] should_fail+0x23c/0x250 [ 2282.078422][T19572] ? register_for_each_vma+0x372/0x890 [ 2282.083882][T19572] __should_failslab+0x81/0x90 [ 2282.088704][T19572] should_failslab+0x5/0x20 [ 2282.093260][T19572] kmem_cache_alloc_trace+0x52/0x350 [ 2282.098569][T19572] ? register_for_each_vma+0x372/0x890 [ 2282.104070][T19572] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2282.110073][T19572] register_for_each_vma+0x372/0x890 [ 2282.115361][T19572] __uprobe_register+0x392/0x8a0 [ 2282.120320][T19572] uprobe_register_refctr+0x29/0x40 [ 2282.125571][T19572] probe_event_enable+0x2be/0x7d0 [ 2282.130597][T19572] ? __uprobe_trace_func+0x440/0x440 [ 2282.135961][T19572] trace_uprobe_register+0x88/0x410 [ 2282.141340][T19572] perf_trace_event_init+0x34e/0x790 [ 2282.146623][T19572] perf_uprobe_init+0xf5/0x140 [ 2282.151384][T19572] perf_uprobe_event_init+0xde/0x140 [ 2282.156733][T19572] perf_try_init_event+0x21a/0x400 [ 2282.161850][T19572] perf_event_alloc+0xa60/0x1740 [ 2282.166792][T19572] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2282.172480][T19572] ? proc_fail_nth_write+0x127/0x150 [ 2282.177808][T19572] ? preempt_count_add+0x41/0x90 [ 2282.182840][T19572] __x64_sys_perf_event_open+0x63/0x70 [ 2282.188301][T19572] do_syscall_64+0x44/0xa0 [ 2282.192780][T19572] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2282.198709][T19572] RIP: 0033:0x7ff6e6d13ae9 [ 2282.203119][T19572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:52:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000400c000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:52:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:52:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2282.222779][T19572] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2282.231209][T19572] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2282.239173][T19572] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2282.247140][T19572] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.255105][T19572] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2282.263070][T19572] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2282.271050][T19572] 18:52:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 17) [ 2282.348663][T19574] loop1: detected capacity change from 0 to 4 [ 2282.376602][T19574] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:52:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2282.404543][T19582] loop4: detected capacity change from 0 to 264192 [ 2282.414893][T19583] loop5: detected capacity change from 0 to 4 [ 2282.431842][T19583] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2282.445766][T19574] loop1: detected capacity change from 0 to 4 18:52:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2282.452630][T19574] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2282.462289][T19582] EXT4-fs (loop4): #blocks per group too big: 802816 [ 2282.480117][T19583] loop5: detected capacity change from 0 to 4 [ 2282.486930][T19583] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:52:56 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2282.500187][T19582] loop4: detected capacity change from 0 to 264192 [ 2282.508432][T19582] EXT4-fs (loop4): #blocks per group too big: 802816 [ 2282.515656][T19585] FAULT_INJECTION: forcing a failure. [ 2282.515656][T19585] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.528275][T19585] CPU: 0 PID: 19585 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2282.536762][T19585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2282.546863][T19585] Call Trace: [ 2282.550133][T19585] [ 2282.553053][T19585] dump_stack_lvl+0xd6/0x122 [ 2282.557645][T19585] dump_stack+0x11/0x1b [ 2282.561812][T19585] should_fail+0x23c/0x250 [ 2282.566229][T19585] ? register_for_each_vma+0x372/0x890 [ 2282.571714][T19585] __should_failslab+0x81/0x90 [ 2282.576482][T19585] should_failslab+0x5/0x20 [ 2282.580986][T19585] kmem_cache_alloc_trace+0x52/0x350 [ 2282.586274][T19585] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2282.592261][T19585] register_for_each_vma+0x372/0x890 [ 2282.597557][T19585] __uprobe_register+0x392/0x8a0 [ 2282.602503][T19585] uprobe_register_refctr+0x29/0x40 [ 2282.607721][T19585] probe_event_enable+0x2be/0x7d0 [ 2282.612758][T19585] ? __uprobe_trace_func+0x440/0x440 [ 2282.618060][T19585] trace_uprobe_register+0x88/0x410 [ 2282.623328][T19585] perf_trace_event_init+0x34e/0x790 [ 2282.628636][T19585] perf_uprobe_init+0xf5/0x140 [ 2282.633390][T19585] perf_uprobe_event_init+0xde/0x140 [ 2282.638673][T19585] perf_try_init_event+0x21a/0x400 [ 2282.643844][T19585] perf_event_alloc+0xa60/0x1740 [ 2282.648875][T19585] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2282.654586][T19585] ? proc_fail_nth_write+0x127/0x150 [ 2282.659931][T19585] ? preempt_count_add+0x41/0x90 [ 2282.664933][T19585] __x64_sys_perf_event_open+0x63/0x70 [ 2282.670392][T19585] do_syscall_64+0x44/0xa0 [ 2282.674808][T19585] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2282.680723][T19585] RIP: 0033:0x7ff6e6d13ae9 [ 2282.685136][T19585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.704797][T19585] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2282.713202][T19585] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2282.721214][T19585] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2282.729178][T19585] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.737139][T19585] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2282.745109][T19585] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2282.753110][T19585] 18:52:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 18) 18:52:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000400d000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:52:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000007440000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:52:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:52:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2282.972334][T19593] loop1: detected capacity change from 0 to 4 [ 2282.990429][T19593] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2283.000923][T19596] FAULT_INJECTION: forcing a failure. [ 2283.000923][T19596] name failslab, interval 1, probability 0, space 0, times 0 [ 2283.013838][T19596] CPU: 1 PID: 19596 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2283.022254][T19596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2283.032345][T19596] Call Trace: [ 2283.035613][T19596] [ 2283.038532][T19596] dump_stack_lvl+0xd6/0x122 [ 2283.043140][T19596] dump_stack+0x11/0x1b [ 2283.047289][T19596] should_fail+0x23c/0x250 [ 2283.051708][T19596] ? register_for_each_vma+0x372/0x890 [ 2283.057166][T19596] __should_failslab+0x81/0x90 [ 2283.061927][T19596] should_failslab+0x5/0x20 [ 2283.066492][T19596] kmem_cache_alloc_trace+0x52/0x350 [ 2283.071790][T19596] ? register_for_each_vma+0x372/0x890 [ 2283.077251][T19596] ? vma_interval_tree_iter_next+0x263/0x280 [ 2283.083274][T19596] register_for_each_vma+0x372/0x890 [ 2283.088646][T19596] __uprobe_register+0x392/0x8a0 [ 2283.093604][T19596] uprobe_register_refctr+0x29/0x40 [ 2283.098834][T19596] probe_event_enable+0x2be/0x7d0 [ 2283.103930][T19596] ? __uprobe_trace_func+0x440/0x440 [ 2283.109285][T19596] trace_uprobe_register+0x88/0x410 [ 2283.114538][T19596] perf_trace_event_init+0x34e/0x790 [ 2283.119818][T19596] perf_uprobe_init+0xf5/0x140 [ 2283.124602][T19596] perf_uprobe_event_init+0xde/0x140 [ 2283.129888][T19596] perf_try_init_event+0x21a/0x400 [ 2283.135055][T19596] perf_event_alloc+0xa60/0x1740 [ 2283.139991][T19596] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2283.145625][T19596] ? proc_fail_nth_write+0x127/0x150 [ 2283.150909][T19596] ? preempt_count_add+0x41/0x90 [ 2283.155901][T19596] __x64_sys_perf_event_open+0x63/0x70 [ 2283.161411][T19596] do_syscall_64+0x44/0xa0 [ 2283.165893][T19596] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2283.171848][T19596] RIP: 0033:0x7ff6e6d13ae9 [ 2283.176261][T19596] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2283.195960][T19596] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2283.204367][T19596] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2283.212587][T19596] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2283.220562][T19596] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2283.228589][T19596] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2283.236706][T19596] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2283.244775][T19596] 18:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 19) 18:52:57 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2283.276464][T19593] loop1: detected capacity change from 0 to 4 [ 2283.283601][T19593] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2283.303432][T19597] loop4: detected capacity change from 0 to 264192 [ 2283.317779][T19598] loop5: detected capacity change from 0 to 4 [ 2283.351073][T19597] EXT4-fs (loop4): #blocks per group too big: 868352 [ 2283.357850][T19598] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2283.387128][T19597] loop4: detected capacity change from 0 to 264192 [ 2283.394515][T19598] loop5: detected capacity change from 0 to 4 [ 2283.406090][T19597] EXT4-fs (loop4): #blocks per group too big: 868352 [ 2283.413428][T19598] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:52:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000400e000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:52:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000007a40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:52:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2283.553184][T19606] FAULT_INJECTION: forcing a failure. [ 2283.553184][T19606] name failslab, interval 1, probability 0, space 0, times 0 [ 2283.565836][T19606] CPU: 0 PID: 19606 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2283.574305][T19606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2283.584361][T19606] Call Trace: [ 2283.587658][T19606] [ 2283.590582][T19606] dump_stack_lvl+0xd6/0x122 [ 2283.595186][T19606] dump_stack+0x11/0x1b [ 2283.599341][T19606] should_fail+0x23c/0x250 [ 2283.603862][T19606] ? register_for_each_vma+0x372/0x890 [ 2283.609331][T19606] __should_failslab+0x81/0x90 [ 2283.614098][T19606] should_failslab+0x5/0x20 [ 2283.618604][T19606] kmem_cache_alloc_trace+0x52/0x350 [ 2283.623912][T19606] ? register_for_each_vma+0x372/0x890 [ 2283.629398][T19606] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2283.635387][T19606] register_for_each_vma+0x372/0x890 [ 2283.640684][T19606] __uprobe_register+0x392/0x8a0 [ 2283.645663][T19606] uprobe_register_refctr+0x29/0x40 18:52:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2283.651062][T19606] probe_event_enable+0x2be/0x7d0 [ 2283.656095][T19606] ? __uprobe_trace_func+0x440/0x440 [ 2283.661382][T19606] trace_uprobe_register+0x88/0x410 [ 2283.666589][T19606] perf_trace_event_init+0x34e/0x790 [ 2283.672055][T19606] perf_uprobe_init+0xf5/0x140 [ 2283.676828][T19606] perf_uprobe_event_init+0xde/0x140 [ 2283.682184][T19606] perf_try_init_event+0x21a/0x400 [ 2283.687308][T19606] perf_event_alloc+0xa60/0x1740 [ 2283.692263][T19606] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2283.697905][T19606] ? proc_fail_nth_write+0x127/0x150 [ 2283.703247][T19606] ? preempt_count_add+0x41/0x90 [ 2283.708193][T19606] __x64_sys_perf_event_open+0x63/0x70 [ 2283.713700][T19606] do_syscall_64+0x44/0xa0 [ 2283.718128][T19606] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2283.724105][T19606] RIP: 0033:0x7ff6e6d13ae9 [ 2283.728517][T19606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2283.748343][T19606] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2283.756783][T19606] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2283.764771][T19606] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2283.772736][T19606] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2283.780712][T19606] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2283.788678][T19606] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2283.796748][T19606] [ 2283.800700][T19607] loop1: detected capacity change from 0 to 4 [ 2283.819500][T19607] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 20) 18:52:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2283.849330][T19612] loop5: detected capacity change from 0 to 4 [ 2283.865148][T19616] loop4: detected capacity change from 0 to 264192 [ 2283.873580][T19607] loop1: detected capacity change from 0 to 4 [ 2283.879993][T19612] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2283.888861][T19607] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:52:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2283.906865][T19616] EXT4-fs (loop4): #blocks per group too big: 933888 18:52:58 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2283.954808][T19612] loop5: detected capacity change from 0 to 4 [ 2283.957898][T19616] loop4: detected capacity change from 0 to 264192 [ 2283.968895][T19612] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2283.980459][T19616] EXT4-fs (loop4): #blocks per group too big: 933888 [ 2284.037448][T19619] FAULT_INJECTION: forcing a failure. [ 2284.037448][T19619] name failslab, interval 1, probability 0, space 0, times 0 [ 2284.050191][T19619] CPU: 1 PID: 19619 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2284.058605][T19619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2284.068845][T19619] Call Trace: [ 2284.072140][T19619] [ 2284.075075][T19619] dump_stack_lvl+0xd6/0x122 [ 2284.079734][T19619] dump_stack+0x11/0x1b [ 2284.083879][T19619] should_fail+0x23c/0x250 [ 2284.088441][T19619] ? register_for_each_vma+0x372/0x890 [ 2284.093899][T19619] __should_failslab+0x81/0x90 [ 2284.098673][T19619] should_failslab+0x5/0x20 [ 2284.103182][T19619] kmem_cache_alloc_trace+0x52/0x350 [ 2284.108462][T19619] ? register_for_each_vma+0x372/0x890 [ 2284.113929][T19619] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2284.119917][T19619] register_for_each_vma+0x372/0x890 [ 2284.125231][T19619] __uprobe_register+0x392/0x8a0 [ 2284.130176][T19619] uprobe_register_refctr+0x29/0x40 [ 2284.135449][T19619] probe_event_enable+0x2be/0x7d0 [ 2284.140478][T19619] ? __uprobe_trace_func+0x440/0x440 [ 2284.145808][T19619] trace_uprobe_register+0x88/0x410 [ 2284.151055][T19619] perf_trace_event_init+0x34e/0x790 [ 2284.156378][T19619] perf_uprobe_init+0xf5/0x140 [ 2284.161226][T19619] perf_uprobe_event_init+0xde/0x140 [ 2284.166527][T19619] perf_try_init_event+0x21a/0x400 [ 2284.171729][T19619] perf_event_alloc+0xa60/0x1740 [ 2284.176671][T19619] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2284.182327][T19619] ? proc_fail_nth_write+0x127/0x150 [ 2284.187628][T19619] ? preempt_count_add+0x41/0x90 [ 2284.192586][T19619] __x64_sys_perf_event_open+0x63/0x70 [ 2284.198048][T19619] do_syscall_64+0x44/0xa0 [ 2284.202560][T19619] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2284.208474][T19619] RIP: 0033:0x7ff6e6d13ae9 [ 2284.212882][T19619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:52:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000400f000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:52:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000017d40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2284.232487][T19619] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2284.240894][T19619] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2284.248863][T19619] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2284.256826][T19619] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2284.264823][T19619] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2284.272830][T19619] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2284.280890][T19619] 18:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 21) 18:52:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:52:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2284.465988][T19625] loop1: detected capacity change from 0 to 4 [ 2284.485998][T19625] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2284.533826][T19631] loop4: detected capacity change from 0 to 264192 [ 2284.543241][T19625] loop1: detected capacity change from 0 to 4 [ 2284.551767][T19625] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2284.561451][T19633] loop5: detected capacity change from 0 to 4 [ 2284.568953][T19631] EXT4-fs (loop4): #blocks per group too big: 999424 [ 2284.576251][T19635] FAULT_INJECTION: forcing a failure. [ 2284.576251][T19635] name failslab, interval 1, probability 0, space 0, times 0 [ 2284.588891][T19635] CPU: 0 PID: 19635 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2284.597309][T19635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2284.607359][T19635] Call Trace: [ 2284.610634][T19635] [ 2284.613562][T19635] dump_stack_lvl+0xd6/0x122 [ 2284.618153][T19635] dump_stack+0x11/0x1b [ 2284.622342][T19635] should_fail+0x23c/0x250 [ 2284.626818][T19635] ? register_for_each_vma+0x372/0x890 [ 2284.632279][T19635] __should_failslab+0x81/0x90 [ 2284.637052][T19635] should_failslab+0x5/0x20 [ 2284.641642][T19635] kmem_cache_alloc_trace+0x52/0x350 [ 2284.647068][T19635] ? register_for_each_vma+0x372/0x890 [ 2284.652538][T19635] ? vma_interval_tree_iter_next+0x263/0x280 [ 2284.658506][T19635] register_for_each_vma+0x372/0x890 [ 2284.663834][T19635] __uprobe_register+0x392/0x8a0 [ 2284.668759][T19635] uprobe_register_refctr+0x29/0x40 [ 2284.673943][T19635] probe_event_enable+0x2be/0x7d0 [ 2284.678961][T19635] ? __uprobe_trace_func+0x440/0x440 [ 2284.684230][T19635] trace_uprobe_register+0x88/0x410 [ 2284.689419][T19635] perf_trace_event_init+0x34e/0x790 [ 2284.694698][T19635] perf_uprobe_init+0xf5/0x140 [ 2284.699461][T19635] perf_uprobe_event_init+0xde/0x140 [ 2284.704777][T19635] perf_try_init_event+0x21a/0x400 [ 2284.709963][T19635] perf_event_alloc+0xa60/0x1740 [ 2284.714930][T19635] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2284.720597][T19635] ? proc_fail_nth_write+0x127/0x150 [ 2284.725867][T19635] ? preempt_count_add+0x41/0x90 [ 2284.730876][T19635] __x64_sys_perf_event_open+0x63/0x70 [ 2284.736408][T19635] do_syscall_64+0x44/0xa0 [ 2284.740962][T19635] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2284.746905][T19635] RIP: 0033:0x7ff6e6d13ae9 [ 2284.751397][T19635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2284.770995][T19635] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2284.779421][T19635] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2284.787374][T19635] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2284.795329][T19635] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2284.803369][T19635] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2284.811337][T19635] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2284.819294][T19635] [ 2284.825451][T19633] EXT4-fs (loop5): #blocks per group too big: 16793600 18:52:58 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2284.835749][T19631] loop4: detected capacity change from 0 to 264192 [ 2284.844968][T19631] EXT4-fs (loop4): #blocks per group too big: 999424 [ 2284.862299][T19633] loop5: detected capacity change from 0 to 4 18:52:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004010000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:52:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 22) 18:52:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2284.884031][T19633] EXT4-fs (loop5): #blocks per group too big: 16793600 18:52:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000027d40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2284.930166][T19638] loop1: detected capacity change from 0 to 4 [ 2284.952433][T19638] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2284.999604][T19638] loop1: detected capacity change from 0 to 4 [ 2285.006089][T19638] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2285.057354][T19644] loop4: detected capacity change from 0 to 264192 [ 2285.069494][T19645] FAULT_INJECTION: forcing a failure. [ 2285.069494][T19645] name failslab, interval 1, probability 0, space 0, times 0 [ 2285.082170][T19645] CPU: 1 PID: 19645 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2285.090664][T19645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2285.100718][T19645] Call Trace: [ 2285.103990][T19645] [ 2285.107017][T19645] dump_stack_lvl+0xd6/0x122 [ 2285.111630][T19645] dump_stack+0x11/0x1b [ 2285.115785][T19645] should_fail+0x23c/0x250 [ 2285.120419][T19645] ? register_for_each_vma+0x372/0x890 [ 2285.126498][T19645] __should_failslab+0x81/0x90 [ 2285.131306][T19645] should_failslab+0x5/0x20 [ 2285.136027][T19645] kmem_cache_alloc_trace+0x52/0x350 [ 2285.141326][T19645] ? register_for_each_vma+0x372/0x890 [ 2285.146843][T19645] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2285.152848][T19645] register_for_each_vma+0x372/0x890 [ 2285.158182][T19645] __uprobe_register+0x392/0x8a0 [ 2285.163167][T19645] uprobe_register_refctr+0x29/0x40 [ 2285.168373][T19645] probe_event_enable+0x2be/0x7d0 [ 2285.173455][T19645] ? __uprobe_trace_func+0x440/0x440 [ 2285.178793][T19645] trace_uprobe_register+0x88/0x410 [ 2285.184077][T19645] perf_trace_event_init+0x34e/0x790 [ 2285.189380][T19645] perf_uprobe_init+0xf5/0x140 [ 2285.194166][T19645] perf_uprobe_event_init+0xde/0x140 [ 2285.199495][T19645] perf_try_init_event+0x21a/0x400 [ 2285.204624][T19645] perf_event_alloc+0xa60/0x1740 [ 2285.209592][T19645] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2285.215236][T19645] ? proc_fail_nth_write+0x127/0x150 [ 2285.220540][T19645] ? preempt_count_add+0x41/0x90 [ 2285.226032][T19645] __x64_sys_perf_event_open+0x63/0x70 [ 2285.231496][T19645] do_syscall_64+0x44/0xa0 [ 2285.235992][T19645] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2285.241913][T19645] RIP: 0033:0x7ff6e6d13ae9 [ 2285.246326][T19645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2285.265951][T19645] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2285.274442][T19645] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2285.282404][T19645] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2285.290375][T19645] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2285.298374][T19645] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 18:52:59 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:52:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2285.306335][T19645] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2285.314307][T19645] [ 2285.346959][T19644] EXT4-fs (loop4): #blocks per group too big: 1064960 18:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 23) 18:52:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2285.397091][T19644] loop4: detected capacity change from 0 to 264192 [ 2285.404354][T19644] EXT4-fs (loop4): #blocks per group too big: 1064960 [ 2285.412145][T19649] loop5: detected capacity change from 0 to 4 18:52:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004011000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2285.451826][T19649] EXT4-fs (loop5): #blocks per group too big: 33570816 18:52:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000018240000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2285.499774][T19649] loop5: detected capacity change from 0 to 4 [ 2285.506940][T19649] EXT4-fs (loop5): #blocks per group too big: 33570816 [ 2285.627883][T19656] loop1: detected capacity change from 0 to 4 [ 2285.641494][T19657] FAULT_INJECTION: forcing a failure. [ 2285.641494][T19657] name failslab, interval 1, probability 0, space 0, times 0 [ 2285.654151][T19657] CPU: 1 PID: 19657 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2285.662564][T19657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2285.672683][T19657] Call Trace: [ 2285.675955][T19657] [ 2285.678920][T19657] dump_stack_lvl+0xd6/0x122 [ 2285.683652][T19657] dump_stack+0x11/0x1b [ 2285.687804][T19657] should_fail+0x23c/0x250 [ 2285.692215][T19657] ? register_for_each_vma+0x372/0x890 [ 2285.697739][T19657] __should_failslab+0x81/0x90 [ 2285.702564][T19657] should_failslab+0x5/0x20 [ 2285.707105][T19657] kmem_cache_alloc_trace+0x52/0x350 [ 2285.712392][T19657] ? register_for_each_vma+0x372/0x890 [ 2285.717916][T19657] ? vma_interval_tree_iter_next+0x263/0x280 [ 2285.723905][T19657] register_for_each_vma+0x372/0x890 [ 2285.729260][T19657] __uprobe_register+0x392/0x8a0 [ 2285.734276][T19657] uprobe_register_refctr+0x29/0x40 [ 2285.739555][T19657] probe_event_enable+0x2be/0x7d0 [ 2285.744680][T19657] ? __uprobe_trace_func+0x440/0x440 [ 2285.750035][T19657] trace_uprobe_register+0x88/0x410 [ 2285.755229][T19657] perf_trace_event_init+0x34e/0x790 [ 2285.760521][T19657] perf_uprobe_init+0xf5/0x140 [ 2285.765308][T19657] perf_uprobe_event_init+0xde/0x140 [ 2285.770587][T19657] perf_try_init_event+0x21a/0x400 [ 2285.775697][T19657] perf_event_alloc+0xa60/0x1740 [ 2285.780664][T19657] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2285.786488][T19657] ? proc_fail_nth_write+0x127/0x150 [ 2285.791865][T19657] ? preempt_count_add+0x41/0x90 [ 2285.796888][T19657] __x64_sys_perf_event_open+0x63/0x70 [ 2285.802401][T19657] do_syscall_64+0x44/0xa0 [ 2285.806894][T19657] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2285.812887][T19657] RIP: 0033:0x7ff6e6d13ae9 [ 2285.817296][T19657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2285.837019][T19657] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2285.845428][T19657] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2285.853418][T19657] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2285.861396][T19657] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2285.869389][T19657] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 18:52:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 24) 18:53:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2285.877387][T19657] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2285.885469][T19657] [ 2285.901930][T19656] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2285.950036][T19656] loop1: detected capacity change from 0 to 4 [ 2285.956452][T19656] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2285.973751][T19661] loop4: detected capacity change from 0 to 264192 18:53:00 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2286.004945][T19661] EXT4-fs (loop4): #blocks per group too big: 1130496 [ 2286.045722][T19662] loop5: detected capacity change from 0 to 4 [ 2286.053859][T19661] loop4: detected capacity change from 0 to 264192 [ 2286.061735][T19661] EXT4-fs (loop4): #blocks per group too big: 1130496 [ 2286.069655][T19662] EXT4-fs (loop5): #blocks per group too big: 16793600 18:53:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004012000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2286.110062][T19662] loop5: detected capacity change from 0 to 4 [ 2286.119252][T19662] EXT4-fs (loop5): #blocks per group too big: 16793600 [ 2286.146484][T19666] FAULT_INJECTION: forcing a failure. [ 2286.146484][T19666] name failslab, interval 1, probability 0, space 0, times 0 [ 2286.159226][T19666] CPU: 0 PID: 19666 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2286.167657][T19666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2286.177707][T19666] Call Trace: [ 2286.181054][T19666] [ 2286.183977][T19666] dump_stack_lvl+0xd6/0x122 [ 2286.188572][T19666] dump_stack+0x11/0x1b [ 2286.192724][T19666] should_fail+0x23c/0x250 [ 2286.197140][T19666] ? register_for_each_vma+0x372/0x890 [ 2286.202626][T19666] __should_failslab+0x81/0x90 [ 2286.207394][T19666] should_failslab+0x5/0x20 [ 2286.211898][T19666] kmem_cache_alloc_trace+0x52/0x350 [ 2286.217206][T19666] ? register_for_each_vma+0x372/0x890 [ 2286.222756][T19666] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2286.228804][T19666] register_for_each_vma+0x372/0x890 [ 2286.234114][T19666] __uprobe_register+0x392/0x8a0 [ 2286.239063][T19666] uprobe_register_refctr+0x29/0x40 [ 2286.244304][T19666] probe_event_enable+0x2be/0x7d0 [ 2286.249315][T19666] ? __uprobe_trace_func+0x440/0x440 [ 2286.254600][T19666] trace_uprobe_register+0x88/0x410 [ 2286.259793][T19666] perf_trace_event_init+0x34e/0x790 [ 2286.265063][T19666] perf_uprobe_init+0xf5/0x140 [ 2286.269840][T19666] perf_uprobe_event_init+0xde/0x140 [ 2286.275164][T19666] perf_try_init_event+0x21a/0x400 [ 2286.280395][T19666] perf_event_alloc+0xa60/0x1740 [ 2286.285318][T19666] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2286.290939][T19666] ? proc_fail_nth_write+0x127/0x150 [ 2286.296207][T19666] ? preempt_count_add+0x41/0x90 [ 2286.301232][T19666] __x64_sys_perf_event_open+0x63/0x70 [ 2286.306681][T19666] do_syscall_64+0x44/0xa0 [ 2286.311139][T19666] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2286.317134][T19666] RIP: 0033:0x7ff6e6d13ae9 [ 2286.321531][T19666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2286.341184][T19666] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2286.349575][T19666] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2286.357542][T19666] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2286.365505][T19666] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2286.373473][T19666] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2286.381429][T19666] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2286.389384][T19666] 18:53:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:00 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f00000000000000010000000100000000400001a340000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2286.424821][T19671] loop1: detected capacity change from 0 to 4 [ 2286.440091][T19671] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 25) [ 2286.478880][T19673] loop4: detected capacity change from 0 to 264192 [ 2286.494759][T19673] EXT4-fs (loop4): #blocks per group too big: 1196032 [ 2286.510052][T19671] loop1: detected capacity change from 0 to 4 [ 2286.516583][T19671] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2286.529680][T19673] loop4: detected capacity change from 0 to 264192 [ 2286.543272][T19673] EXT4-fs (loop4): #blocks per group too big: 1196032 18:53:00 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000060401000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004013000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:00 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2286.644726][T19681] loop5: detected capacity change from 0 to 4 [ 2286.660131][T19681] EXT4-fs (loop5): #blocks per group too big: 16793600 [ 2286.671986][T19682] FAULT_INJECTION: forcing a failure. [ 2286.671986][T19682] name failslab, interval 1, probability 0, space 0, times 0 [ 2286.684695][T19682] CPU: 0 PID: 19682 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2286.693234][T19682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2286.703303][T19682] Call Trace: [ 2286.706592][T19682] [ 2286.709517][T19682] dump_stack_lvl+0xd6/0x122 [ 2286.714105][T19682] dump_stack+0x11/0x1b [ 2286.718255][T19682] should_fail+0x23c/0x250 [ 2286.722669][T19682] ? register_for_each_vma+0x372/0x890 [ 2286.728212][T19682] __should_failslab+0x81/0x90 [ 2286.732978][T19682] should_failslab+0x5/0x20 [ 2286.737529][T19682] kmem_cache_alloc_trace+0x52/0x350 [ 2286.742817][T19682] ? register_for_each_vma+0x372/0x890 [ 2286.748291][T19682] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2286.754312][T19682] register_for_each_vma+0x372/0x890 [ 2286.759700][T19682] __uprobe_register+0x392/0x8a0 [ 2286.764667][T19682] uprobe_register_refctr+0x29/0x40 [ 2286.769872][T19682] probe_event_enable+0x2be/0x7d0 [ 2286.774902][T19682] ? __uprobe_trace_func+0x440/0x440 [ 2286.780273][T19682] trace_uprobe_register+0x88/0x410 [ 2286.785520][T19682] perf_trace_event_init+0x34e/0x790 [ 2286.790838][T19682] perf_uprobe_init+0xf5/0x140 [ 2286.795667][T19682] perf_uprobe_event_init+0xde/0x140 [ 2286.800957][T19682] perf_try_init_event+0x21a/0x400 [ 2286.806175][T19682] perf_event_alloc+0xa60/0x1740 [ 2286.811117][T19682] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2286.816802][T19682] ? proc_fail_nth_write+0x127/0x150 [ 2286.822874][T19682] ? preempt_count_add+0x41/0x90 [ 2286.827837][T19682] __x64_sys_perf_event_open+0x63/0x70 [ 2286.833369][T19682] do_syscall_64+0x44/0xa0 [ 2286.837787][T19682] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2286.843847][T19682] RIP: 0033:0x7ff6e6d13ae9 [ 2286.848258][T19682] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2286.867862][T19682] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2286.876399][T19682] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2286.884366][T19682] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2286.892333][T19682] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2286.900308][T19682] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2286.908281][T19682] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2286.916246][T19682] [ 2286.940309][T19681] loop5: detected capacity change from 0 to 4 [ 2286.947928][T19681] EXT4-fs (loop5): #blocks per group too big: 16793600 18:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 26) 18:53:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000fffe40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2286.980845][T19687] loop4: detected capacity change from 0 to 264192 [ 2286.989180][T19688] loop1: detected capacity change from 0 to 4 18:53:01 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x40000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2287.025375][T19687] EXT4-fs (loop4): #blocks per group too big: 1261568 [ 2287.033484][T19688] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:01 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2287.069752][T19687] loop4: detected capacity change from 0 to 264192 [ 2287.070332][T19688] loop1: detected capacity change from 0 to 4 [ 2287.082983][T19688] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2287.092055][T19687] EXT4-fs (loop4): #blocks per group too big: 1261568 [ 2287.148692][T19696] FAULT_INJECTION: forcing a failure. [ 2287.148692][T19696] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.161615][T19696] CPU: 0 PID: 19696 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2287.170075][T19696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2287.180184][T19696] Call Trace: [ 2287.183456][T19696] [ 2287.186380][T19696] dump_stack_lvl+0xd6/0x122 [ 2287.190983][T19696] dump_stack+0x11/0x1b [ 2287.195155][T19696] should_fail+0x23c/0x250 [ 2287.199594][T19696] ? register_for_each_vma+0x372/0x890 [ 2287.205053][T19696] __should_failslab+0x81/0x90 [ 2287.209868][T19696] should_failslab+0x5/0x20 [ 2287.214430][T19696] kmem_cache_alloc_trace+0x52/0x350 [ 2287.219703][T19696] ? register_for_each_vma+0x372/0x890 [ 2287.225162][T19696] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2287.231224][T19696] register_for_each_vma+0x372/0x890 [ 2287.236513][T19696] __uprobe_register+0x392/0x8a0 [ 2287.241451][T19696] uprobe_register_refctr+0x29/0x40 [ 2287.246636][T19696] probe_event_enable+0x2be/0x7d0 [ 2287.251652][T19696] ? __uprobe_trace_func+0x440/0x440 [ 2287.256955][T19696] trace_uprobe_register+0x88/0x410 [ 2287.262180][T19696] perf_trace_event_init+0x34e/0x790 [ 2287.267451][T19696] perf_uprobe_init+0xf5/0x140 [ 2287.272198][T19696] perf_uprobe_event_init+0xde/0x140 [ 2287.277469][T19696] perf_try_init_event+0x21a/0x400 [ 2287.282562][T19696] perf_event_alloc+0xa60/0x1740 [ 2287.287488][T19696] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2287.293177][T19696] ? proc_fail_nth_write+0x127/0x150 [ 2287.298552][T19696] ? preempt_count_add+0x41/0x90 [ 2287.303537][T19696] __x64_sys_perf_event_open+0x63/0x70 [ 2287.308988][T19696] do_syscall_64+0x44/0xa0 [ 2287.313394][T19696] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2287.319340][T19696] RIP: 0033:0x7ff6e6d13ae9 [ 2287.323740][T19696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2287.343431][T19696] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2287.351826][T19696] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2287.359856][T19696] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2287.367810][T19696] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2287.375794][T19696] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2287.383758][T19696] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2287.391713][T19696] 18:53:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004018000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 27) [ 2287.400470][T19697] loop5: detected capacity change from 0 to 4 [ 2287.429872][T19697] EXT4-fs (loop5): #blocks per group too big: 4278206464 18:53:01 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2287.489744][T19697] loop5: detected capacity change from 0 to 4 [ 2287.496368][T19697] EXT4-fs (loop5): #blocks per group too big: 4278206464 [ 2287.503982][T19702] loop1: detected capacity change from 0 to 4 [ 2287.519316][T19702] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000fff40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2287.544061][T19705] loop4: detected capacity change from 0 to 264192 [ 2287.553153][T19702] loop1: detected capacity change from 0 to 4 [ 2287.561389][T19702] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2287.570510][T19705] EXT4-fs (loop4): #blocks per group too big: 1589248 [ 2287.577983][T19706] FAULT_INJECTION: forcing a failure. [ 2287.577983][T19706] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.590701][T19706] CPU: 0 PID: 19706 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2287.599154][T19706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2287.609676][T19706] Call Trace: [ 2287.612978][T19706] [ 2287.615904][T19706] dump_stack_lvl+0xd6/0x122 [ 2287.620589][T19706] dump_stack+0x11/0x1b [ 2287.625115][T19706] should_fail+0x23c/0x250 [ 2287.629534][T19706] ? register_for_each_vma+0x372/0x890 [ 2287.635061][T19706] __should_failslab+0x81/0x90 [ 2287.639880][T19706] should_failslab+0x5/0x20 [ 2287.644456][T19706] kmem_cache_alloc_trace+0x52/0x350 [ 2287.649798][T19706] ? register_for_each_vma+0x372/0x890 [ 2287.655358][T19706] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2287.661383][T19706] register_for_each_vma+0x372/0x890 [ 2287.666745][T19706] __uprobe_register+0x392/0x8a0 [ 2287.671720][T19706] uprobe_register_refctr+0x29/0x40 [ 2287.676923][T19706] probe_event_enable+0x2be/0x7d0 [ 2287.681971][T19706] ? __uprobe_trace_func+0x440/0x440 [ 2287.687253][T19706] trace_uprobe_register+0x88/0x410 [ 2287.692464][T19706] perf_trace_event_init+0x34e/0x790 [ 2287.697748][T19706] perf_uprobe_init+0xf5/0x140 [ 2287.702509][T19706] perf_uprobe_event_init+0xde/0x140 [ 2287.707813][T19706] perf_try_init_event+0x21a/0x400 [ 2287.712924][T19706] perf_event_alloc+0xa60/0x1740 [ 2287.717900][T19706] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2287.723551][T19706] ? proc_fail_nth_write+0x127/0x150 [ 2287.728895][T19706] ? preempt_count_add+0x41/0x90 [ 2287.733840][T19706] __x64_sys_perf_event_open+0x63/0x70 [ 2287.739316][T19706] do_syscall_64+0x44/0xa0 [ 2287.743808][T19706] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2287.749739][T19706] RIP: 0033:0x7ff6e6d13ae9 [ 2287.754150][T19706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2287.773852][T19706] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2287.782269][T19706] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2287.790242][T19706] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2287.798209][T19706] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2287.806174][T19706] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2287.814275][T19706] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2287.822250][T19706] 18:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 28) 18:53:01 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:01 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x80ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2287.868103][T19705] loop4: detected capacity change from 0 to 264192 [ 2287.879022][T19713] loop5: detected capacity change from 0 to 4 [ 2287.891374][T19705] EXT4-fs (loop4): #blocks per group too big: 1589248 [ 2287.902645][T19713] EXT4-fs (loop5): #blocks per group too big: 251674624 18:53:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000401b000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2287.961424][T19713] loop5: detected capacity change from 0 to 4 [ 2287.968678][T19713] EXT4-fs (loop5): #blocks per group too big: 251674624 [ 2288.006180][T19718] FAULT_INJECTION: forcing a failure. [ 2288.006180][T19718] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.018844][T19718] CPU: 1 PID: 19718 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2288.027255][T19718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2288.037372][T19718] Call Trace: [ 2288.040648][T19718] [ 2288.043582][T19718] dump_stack_lvl+0xd6/0x122 [ 2288.048251][T19718] dump_stack+0x11/0x1b [ 2288.052399][T19718] should_fail+0x23c/0x250 [ 2288.056813][T19718] ? register_for_each_vma+0x372/0x890 [ 2288.062291][T19718] __should_failslab+0x81/0x90 [ 2288.067058][T19718] should_failslab+0x5/0x20 [ 2288.071654][T19718] kmem_cache_alloc_trace+0x52/0x350 [ 2288.076993][T19718] ? register_for_each_vma+0x372/0x890 [ 2288.082668][T19718] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2288.088645][T19718] register_for_each_vma+0x372/0x890 [ 2288.093939][T19718] __uprobe_register+0x392/0x8a0 [ 2288.098969][T19718] uprobe_register_refctr+0x29/0x40 [ 2288.104246][T19718] probe_event_enable+0x2be/0x7d0 [ 2288.109265][T19718] ? __uprobe_trace_func+0x440/0x440 [ 2288.114609][T19718] trace_uprobe_register+0x88/0x410 [ 2288.119804][T19718] perf_trace_event_init+0x34e/0x790 [ 2288.125084][T19718] perf_uprobe_init+0xf5/0x140 [ 2288.129872][T19718] perf_uprobe_event_init+0xde/0x140 [ 2288.135152][T19718] perf_try_init_event+0x21a/0x400 [ 2288.140337][T19718] perf_event_alloc+0xa60/0x1740 [ 2288.145279][T19718] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2288.150914][T19718] ? proc_fail_nth_write+0x127/0x150 [ 2288.156258][T19718] ? preempt_count_add+0x41/0x90 [ 2288.161255][T19718] __x64_sys_perf_event_open+0x63/0x70 [ 2288.166772][T19718] do_syscall_64+0x44/0xa0 [ 2288.171278][T19718] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2288.177251][T19718] RIP: 0033:0x7ff6e6d13ae9 [ 2288.181725][T19718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000feff40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2288.201404][T19718] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2288.210043][T19718] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2288.218008][T19718] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2288.225972][T19718] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2288.234030][T19718] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2288.241999][T19718] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2288.249963][T19718] 18:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 29) [ 2288.265877][T19719] loop1: detected capacity change from 0 to 4 [ 2288.282287][T19719] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:02 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2288.339908][T19719] loop1: detected capacity change from 0 to 4 [ 2288.349046][T19719] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2288.366858][T19725] loop4: detected capacity change from 0 to 264192 18:53:02 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2288.383858][T19725] EXT4-fs (loop4): #blocks per group too big: 1785856 [ 2288.394260][T19726] loop5: detected capacity change from 0 to 4 [ 2288.413874][T19726] EXT4-fs (loop5): #blocks per group too big: 4261429248 [ 2288.422602][T19725] loop4: detected capacity change from 0 to 264192 [ 2288.433872][T19725] EXT4-fs (loop4): #blocks per group too big: 1785856 [ 2288.449576][T19728] FAULT_INJECTION: forcing a failure. [ 2288.449576][T19728] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.462285][T19728] CPU: 0 PID: 19728 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2288.470762][T19728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2288.481009][T19728] Call Trace: [ 2288.484285][T19728] [ 2288.487247][T19728] dump_stack_lvl+0xd6/0x122 [ 2288.491952][T19728] dump_stack+0x11/0x1b [ 2288.496202][T19728] should_fail+0x23c/0x250 [ 2288.500640][T19728] ? register_for_each_vma+0x372/0x890 [ 2288.506106][T19728] __should_failslab+0x81/0x90 [ 2288.510921][T19728] should_failslab+0x5/0x20 [ 2288.515525][T19728] kmem_cache_alloc_trace+0x52/0x350 [ 2288.520845][T19728] ? register_for_each_vma+0x372/0x890 [ 2288.526321][T19728] ? vma_interval_tree_iter_next+0x263/0x280 [ 2288.532296][T19728] register_for_each_vma+0x372/0x890 [ 2288.537586][T19728] __uprobe_register+0x392/0x8a0 [ 2288.542598][T19728] uprobe_register_refctr+0x29/0x40 [ 2288.547825][T19728] probe_event_enable+0x2be/0x7d0 [ 2288.552857][T19728] ? __uprobe_trace_func+0x440/0x440 [ 2288.558143][T19728] trace_uprobe_register+0x88/0x410 [ 2288.563431][T19728] perf_trace_event_init+0x34e/0x790 [ 2288.568719][T19728] perf_uprobe_init+0xf5/0x140 [ 2288.573475][T19728] perf_uprobe_event_init+0xde/0x140 [ 2288.578752][T19728] perf_try_init_event+0x21a/0x400 [ 2288.583862][T19728] perf_event_alloc+0xa60/0x1740 [ 2288.588831][T19728] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2288.594466][T19728] ? proc_fail_nth_write+0x127/0x150 [ 2288.599747][T19728] ? preempt_count_add+0x41/0x90 [ 2288.604681][T19728] __x64_sys_perf_event_open+0x63/0x70 [ 2288.610142][T19728] do_syscall_64+0x44/0xa0 [ 2288.614553][T19728] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2288.620437][T19728] RIP: 0033:0x7ff6e6d13ae9 [ 2288.624868][T19728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2288.644471][T19728] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2288.652864][T19728] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2288.660817][T19728] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2288.668769][T19728] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2288.676722][T19728] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2288.684712][T19728] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2288.692669][T19728] 18:53:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004022000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:02 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 30) 18:53:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000000200020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2288.730298][T19726] loop5: detected capacity change from 0 to 4 [ 2288.737219][T19726] EXT4-fs (loop5): #blocks per group too big: 4261429248 [ 2288.745578][T19734] loop1: detected capacity change from 0 to 4 [ 2288.769979][T19734] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2288.839514][T19734] loop1: detected capacity change from 0 to 4 [ 2288.847756][T19734] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:02 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2288.909563][T19741] loop4: detected capacity change from 0 to 264192 [ 2288.924442][T19742] FAULT_INJECTION: forcing a failure. [ 2288.924442][T19742] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.937104][T19742] CPU: 0 PID: 19742 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2288.945543][T19742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2288.955597][T19742] Call Trace: [ 2288.958890][T19742] [ 2288.961830][T19742] dump_stack_lvl+0xd6/0x122 [ 2288.966488][T19742] dump_stack+0x11/0x1b [ 2288.970638][T19742] should_fail+0x23c/0x250 [ 2288.975075][T19742] ? register_for_each_vma+0x372/0x890 [ 2288.980559][T19742] __should_failslab+0x81/0x90 [ 2288.985378][T19742] should_failslab+0x5/0x20 [ 2288.989883][T19742] kmem_cache_alloc_trace+0x52/0x350 [ 2288.995269][T19742] ? register_for_each_vma+0x372/0x890 [ 2289.000737][T19742] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2289.006817][T19742] register_for_each_vma+0x372/0x890 [ 2289.012224][T19742] __uprobe_register+0x392/0x8a0 [ 2289.017206][T19742] uprobe_register_refctr+0x29/0x40 [ 2289.022404][T19742] probe_event_enable+0x2be/0x7d0 [ 2289.027443][T19742] ? __uprobe_trace_func+0x440/0x440 [ 2289.032746][T19742] trace_uprobe_register+0x88/0x410 [ 2289.037943][T19742] perf_trace_event_init+0x34e/0x790 [ 2289.043230][T19742] perf_uprobe_init+0xf5/0x140 [ 2289.048019][T19742] perf_uprobe_event_init+0xde/0x140 [ 2289.053312][T19742] perf_try_init_event+0x21a/0x400 [ 2289.058459][T19742] perf_event_alloc+0xa60/0x1740 [ 2289.063416][T19742] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2289.069115][T19742] ? proc_fail_nth_write+0x127/0x150 [ 2289.074511][T19742] ? preempt_count_add+0x41/0x90 [ 2289.079516][T19742] __x64_sys_perf_event_open+0x63/0x70 [ 2289.084976][T19742] do_syscall_64+0x44/0xa0 [ 2289.089392][T19742] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2289.095307][T19742] RIP: 0033:0x7ff6e6d13ae9 [ 2289.099724][T19742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2289.119382][T19742] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2289.127882][T19742] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2289.135896][T19742] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2289.143864][T19742] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2289.151887][T19742] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 18:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 31) [ 2289.159856][T19742] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2289.167861][T19742] [ 2289.176045][T19741] EXT4-fs (loop4): #blocks per group too big: 2244608 18:53:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x92030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2289.221030][T19741] loop4: detected capacity change from 0 to 264192 [ 2289.229579][T19741] EXT4-fs (loop4): #blocks per group too big: 2244608 [ 2289.229727][T19747] loop5: detected capacity change from 0 to 4 18:53:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004023000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2289.263799][T19747] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2289.319758][T19747] loop5: detected capacity change from 0 to 4 [ 2289.326877][T19747] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2289.368336][T19751] FAULT_INJECTION: forcing a failure. [ 2289.368336][T19751] name failslab, interval 1, probability 0, space 0, times 0 [ 2289.368663][T19752] loop1: detected capacity change from 0 to 4 [ 2289.381022][T19751] CPU: 0 PID: 19751 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2289.395436][T19751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2289.405588][T19751] Call Trace: [ 2289.408865][T19751] [ 2289.411789][T19751] dump_stack_lvl+0xd6/0x122 [ 2289.416379][T19751] dump_stack+0x11/0x1b [ 2289.420530][T19751] should_fail+0x23c/0x250 [ 2289.425057][T19751] ? register_for_each_vma+0x372/0x890 [ 2289.430588][T19751] __should_failslab+0x81/0x90 [ 2289.435354][T19751] should_failslab+0x5/0x20 [ 2289.439870][T19751] kmem_cache_alloc_trace+0x52/0x350 [ 2289.445149][T19751] ? register_for_each_vma+0x372/0x890 [ 2289.450661][T19751] ? vma_interval_tree_iter_next+0x263/0x280 [ 2289.456634][T19751] register_for_each_vma+0x372/0x890 [ 2289.461997][T19751] __uprobe_register+0x392/0x8a0 [ 2289.466923][T19751] uprobe_register_refctr+0x29/0x40 [ 2289.472109][T19751] probe_event_enable+0x2be/0x7d0 [ 2289.477153][T19751] ? __uprobe_trace_func+0x440/0x440 [ 2289.482423][T19751] trace_uprobe_register+0x88/0x410 [ 2289.487689][T19751] perf_trace_event_init+0x34e/0x790 [ 2289.492990][T19751] perf_uprobe_init+0xf5/0x140 [ 2289.497836][T19751] perf_uprobe_event_init+0xde/0x140 [ 2289.503106][T19751] perf_try_init_event+0x21a/0x400 [ 2289.508261][T19751] perf_event_alloc+0xa60/0x1740 [ 2289.513220][T19751] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2289.518841][T19751] ? proc_fail_nth_write+0x127/0x150 [ 2289.524124][T19751] ? preempt_count_add+0x41/0x90 [ 2289.529055][T19751] __x64_sys_perf_event_open+0x63/0x70 [ 2289.534918][T19751] do_syscall_64+0x44/0xa0 [ 2289.539348][T19751] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2289.545332][T19751] RIP: 0033:0x7ff6e6d13ae9 [ 2289.549764][T19751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2289.569377][T19751] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2289.577772][T19751] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2289.585727][T19751] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2289.593791][T19751] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2289.601861][T19751] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2289.609814][T19751] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 18:53:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000009000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2289.617938][T19751] [ 2289.626488][T19752] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 32) 18:53:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2289.681296][T19752] loop1: detected capacity change from 0 to 4 [ 2289.695567][T19752] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2289.708616][T19757] loop4: detected capacity change from 0 to 264192 18:53:03 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2289.727571][T19757] EXT4-fs (loop4): #blocks per group too big: 2310144 [ 2289.750292][T19757] loop4: detected capacity change from 0 to 264192 [ 2289.759969][T19757] EXT4-fs (loop4): #blocks per group too big: 2310144 18:53:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004024000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2289.818942][T19761] loop5: detected capacity change from 0 to 4 [ 2289.834001][T19761] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2289.870490][T19761] loop5: detected capacity change from 0 to 4 [ 2289.884887][T19761] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2289.910785][T19763] FAULT_INJECTION: forcing a failure. [ 2289.910785][T19763] name failslab, interval 1, probability 0, space 0, times 0 [ 2289.912408][T19769] loop1: detected capacity change from 0 to 4 [ 2289.923416][T19763] CPU: 0 PID: 19763 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2289.937904][T19763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2289.948005][T19763] Call Trace: [ 2289.951343][T19763] [ 2289.954271][T19763] dump_stack_lvl+0xd6/0x122 18:53:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2289.958864][T19763] dump_stack+0x11/0x1b [ 2289.963028][T19763] should_fail+0x23c/0x250 [ 2289.967447][T19763] ? register_for_each_vma+0x372/0x890 [ 2289.972911][T19763] __should_failslab+0x81/0x90 [ 2289.977679][T19763] should_failslab+0x5/0x20 [ 2289.982187][T19763] kmem_cache_alloc_trace+0x52/0x350 [ 2289.987535][T19763] ? register_for_each_vma+0x372/0x890 [ 2289.993170][T19763] ? vma_interval_tree_iter_next+0x263/0x280 [ 2289.999170][T19763] register_for_each_vma+0x372/0x890 [ 2289.999284][T19769] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2290.004542][T19763] __uprobe_register+0x392/0x8a0 [ 2290.004569][T19763] uprobe_register_refctr+0x29/0x40 [ 2290.023301][T19763] probe_event_enable+0x2be/0x7d0 [ 2290.028327][T19763] ? __uprobe_trace_func+0x440/0x440 [ 2290.033641][T19763] trace_uprobe_register+0x88/0x410 [ 2290.038912][T19763] perf_trace_event_init+0x34e/0x790 [ 2290.044197][T19763] perf_uprobe_init+0xf5/0x140 [ 2290.049016][T19763] perf_uprobe_event_init+0xde/0x140 [ 2290.054364][T19763] perf_try_init_event+0x21a/0x400 [ 2290.059535][T19763] perf_event_alloc+0xa60/0x1740 [ 2290.064491][T19763] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2290.070281][T19763] ? proc_fail_nth_write+0x127/0x150 [ 2290.075586][T19763] ? preempt_count_add+0x41/0x90 [ 2290.080581][T19763] __x64_sys_perf_event_open+0x63/0x70 [ 2290.086043][T19763] do_syscall_64+0x44/0xa0 [ 2290.090458][T19763] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2290.096445][T19763] RIP: 0033:0x7ff6e6d13ae9 [ 2290.100851][T19763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2290.120450][T19763] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2290.128959][T19763] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2290.136986][T19763] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2290.145007][T19763] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2290.152979][T19763] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2290.160947][T19763] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2290.168945][T19763] 18:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 33) 18:53:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f00000000000000010000000100000000400000001c000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:04 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2290.206623][T19769] loop1: detected capacity change from 0 to 4 [ 2290.218170][T19774] loop4: detected capacity change from 0 to 264192 [ 2290.218307][T19769] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2290.245651][T19774] EXT4-fs (loop4): #blocks per group too big: 2375680 18:53:04 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2290.290019][T19774] loop4: detected capacity change from 0 to 264192 [ 2290.298353][T19774] EXT4-fs (loop4): #blocks per group too big: 2375680 18:53:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004025000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2290.367452][T19780] FAULT_INJECTION: forcing a failure. [ 2290.367452][T19780] name failslab, interval 1, probability 0, space 0, times 0 [ 2290.380151][T19780] CPU: 1 PID: 19780 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2290.388564][T19780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2290.398616][T19780] Call Trace: [ 2290.401888][T19780] [ 2290.404867][T19780] dump_stack_lvl+0xd6/0x122 [ 2290.409528][T19780] dump_stack+0x11/0x1b [ 2290.413775][T19780] should_fail+0x23c/0x250 [ 2290.418256][T19780] ? register_for_each_vma+0x372/0x890 [ 2290.423805][T19780] __should_failslab+0x81/0x90 [ 2290.428583][T19780] should_failslab+0x5/0x20 [ 2290.433083][T19780] kmem_cache_alloc_trace+0x52/0x350 [ 2290.438366][T19780] ? register_for_each_vma+0x372/0x890 [ 2290.443824][T19780] ? vma_interval_tree_iter_next+0x263/0x280 [ 2290.449801][T19780] register_for_each_vma+0x372/0x890 [ 2290.455091][T19780] __uprobe_register+0x392/0x8a0 [ 2290.460583][T19780] uprobe_register_refctr+0x29/0x40 [ 2290.465803][T19780] probe_event_enable+0x2be/0x7d0 [ 2290.470833][T19780] ? __uprobe_trace_func+0x440/0x440 [ 2290.476235][T19780] trace_uprobe_register+0x88/0x410 [ 2290.481529][T19780] perf_trace_event_init+0x34e/0x790 [ 2290.486808][T19780] perf_uprobe_init+0xf5/0x140 [ 2290.491575][T19780] perf_uprobe_event_init+0xde/0x140 [ 2290.496937][T19780] perf_try_init_event+0x21a/0x400 [ 2290.502070][T19780] perf_event_alloc+0xa60/0x1740 [ 2290.507097][T19780] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2290.512825][T19780] ? proc_fail_nth_write+0x127/0x150 [ 2290.518201][T19780] ? preempt_count_add+0x41/0x90 [ 2290.523163][T19780] __x64_sys_perf_event_open+0x63/0x70 [ 2290.528625][T19780] do_syscall_64+0x44/0xa0 [ 2290.533064][T19780] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2290.538965][T19780] RIP: 0033:0x7ff6e6d13ae9 [ 2290.543373][T19780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2290.562998][T19780] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2290.571424][T19780] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2290.579388][T19780] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2290.587359][T19780] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2290.595334][T19780] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2290.603299][T19780] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2290.611288][T19780] 18:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 34) 18:53:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2290.634058][T19781] loop5: detected capacity change from 0 to 4 [ 2290.671185][T19781] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:04 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2290.694146][T19786] loop1: detected capacity change from 0 to 4 [ 2290.710335][T19781] loop5: detected capacity change from 0 to 4 [ 2290.717342][T19786] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2290.717417][T19781] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2290.769508][T19786] loop1: detected capacity change from 0 to 4 [ 2290.777228][T19786] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2290.815174][T19790] loop4: detected capacity change from 0 to 264192 [ 2290.826610][T19792] FAULT_INJECTION: forcing a failure. [ 2290.826610][T19792] name failslab, interval 1, probability 0, space 0, times 0 [ 2290.839375][T19792] CPU: 1 PID: 19792 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2290.847867][T19792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2290.857970][T19792] Call Trace: [ 2290.861249][T19792] [ 2290.864172][T19792] dump_stack_lvl+0xd6/0x122 [ 2290.868757][T19792] dump_stack+0x11/0x1b [ 2290.872904][T19792] should_fail+0x23c/0x250 [ 2290.877323][T19792] ? register_for_each_vma+0x372/0x890 [ 2290.882791][T19792] __should_failslab+0x81/0x90 [ 2290.887557][T19792] should_failslab+0x5/0x20 [ 2290.892075][T19792] kmem_cache_alloc_trace+0x52/0x350 [ 2290.897359][T19792] ? register_for_each_vma+0x372/0x890 [ 2290.902816][T19792] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2290.908881][T19792] register_for_each_vma+0x372/0x890 [ 2290.914185][T19792] __uprobe_register+0x392/0x8a0 [ 2290.919157][T19792] uprobe_register_refctr+0x29/0x40 [ 2290.924395][T19792] probe_event_enable+0x2be/0x7d0 [ 2290.929417][T19792] ? __uprobe_trace_func+0x440/0x440 [ 2290.934692][T19792] trace_uprobe_register+0x88/0x410 [ 2290.939884][T19792] perf_trace_event_init+0x34e/0x790 [ 2290.945179][T19792] perf_uprobe_init+0xf5/0x140 [ 2290.949985][T19792] perf_uprobe_event_init+0xde/0x140 [ 2290.955325][T19792] perf_try_init_event+0x21a/0x400 [ 2290.960507][T19792] perf_event_alloc+0xa60/0x1740 [ 2290.965485][T19792] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2290.971194][T19792] ? proc_fail_nth_write+0x127/0x150 [ 2290.976482][T19792] ? preempt_count_add+0x41/0x90 [ 2290.981455][T19792] __x64_sys_perf_event_open+0x63/0x70 [ 2290.986953][T19792] do_syscall_64+0x44/0xa0 [ 2290.991388][T19792] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2290.997384][T19792] RIP: 0033:0x7ff6e6d13ae9 [ 2291.001795][T19792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2291.021398][T19792] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2291.029806][T19792] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2291.037776][T19792] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2291.045744][T19792] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2291.053707][T19792] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 18:53:05 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2291.061738][T19792] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2291.069722][T19792] [ 2291.080475][T19790] EXT4-fs (loop4): #blocks per group too big: 2441216 18:53:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 35) 18:53:05 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2291.120428][T19790] loop4: detected capacity change from 0 to 264192 [ 2291.129789][T19790] EXT4-fs (loop4): #blocks per group too big: 2441216 18:53:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000402e000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2291.177569][T19799] loop5: detected capacity change from 0 to 4 [ 2291.202733][T19799] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2291.222304][T19800] loop1: detected capacity change from 0 to 4 [ 2291.238194][T19800] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2291.248487][T19799] loop5: detected capacity change from 0 to 4 [ 2291.255078][T19799] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2291.289890][T19800] loop1: detected capacity change from 0 to 4 [ 2291.296415][T19800] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2291.322678][T19806] FAULT_INJECTION: forcing a failure. [ 2291.322678][T19806] name failslab, interval 1, probability 0, space 0, times 0 [ 2291.335399][T19806] CPU: 0 PID: 19806 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2291.343805][T19806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2291.353885][T19806] Call Trace: [ 2291.357159][T19806] [ 2291.360145][T19806] dump_stack_lvl+0xd6/0x122 [ 2291.364738][T19806] dump_stack+0x11/0x1b [ 2291.368909][T19806] should_fail+0x23c/0x250 [ 2291.373375][T19806] ? register_for_each_vma+0x372/0x890 [ 2291.378838][T19806] __should_failslab+0x81/0x90 [ 2291.383610][T19806] should_failslab+0x5/0x20 [ 2291.388119][T19806] kmem_cache_alloc_trace+0x52/0x350 [ 2291.393414][T19806] ? register_for_each_vma+0x372/0x890 [ 2291.398911][T19806] ? vma_interval_tree_iter_next+0x263/0x280 [ 2291.404887][T19806] register_for_each_vma+0x372/0x890 [ 2291.410175][T19806] __uprobe_register+0x392/0x8a0 [ 2291.415241][T19806] uprobe_register_refctr+0x29/0x40 [ 2291.419989][T19808] loop4: detected capacity change from 0 to 264192 [ 2291.420448][T19806] probe_event_enable+0x2be/0x7d0 [ 2291.431973][T19806] ? __uprobe_trace_func+0x440/0x440 [ 2291.437400][T19806] trace_uprobe_register+0x88/0x410 [ 2291.442645][T19806] perf_trace_event_init+0x34e/0x790 [ 2291.447967][T19806] perf_uprobe_init+0xf5/0x140 [ 2291.452719][T19806] perf_uprobe_event_init+0xde/0x140 [ 2291.458115][T19806] perf_try_init_event+0x21a/0x400 [ 2291.463209][T19806] perf_event_alloc+0xa60/0x1740 [ 2291.468173][T19806] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2291.473793][T19806] ? proc_fail_nth_write+0x127/0x150 [ 2291.479104][T19806] ? preempt_count_add+0x41/0x90 [ 2291.484109][T19806] __x64_sys_perf_event_open+0x63/0x70 [ 2291.489609][T19806] do_syscall_64+0x44/0xa0 [ 2291.494089][T19806] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2291.499974][T19806] RIP: 0033:0x7ff6e6d13ae9 [ 2291.504371][T19806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2291.524085][T19806] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2291.532480][T19806] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 18:53:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:05 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000025000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2291.540447][T19806] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2291.548403][T19806] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2291.556401][T19806] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2291.564356][T19806] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2291.572322][T19806] [ 2291.578828][T19808] EXT4-fs (loop4): #blocks per group too big: 3031040 18:53:05 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 36) [ 2291.635145][T19808] loop4: detected capacity change from 0 to 264192 [ 2291.646423][T19808] EXT4-fs (loop4): #blocks per group too big: 3031040 18:53:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004032000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2291.729242][T19814] loop1: detected capacity change from 0 to 4 [ 2291.745854][T19814] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2291.758141][T19817] loop5: detected capacity change from 0 to 4 [ 2291.775895][T19817] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2291.787397][T19814] loop1: detected capacity change from 0 to 4 [ 2291.794416][T19814] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2291.805374][T19818] FAULT_INJECTION: forcing a failure. [ 2291.805374][T19818] name failslab, interval 1, probability 0, space 0, times 0 [ 2291.818035][T19818] CPU: 0 PID: 19818 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2291.826512][T19818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2291.836557][T19818] Call Trace: [ 2291.839871][T19818] [ 2291.842890][T19818] dump_stack_lvl+0xd6/0x122 [ 2291.847481][T19818] dump_stack+0x11/0x1b [ 2291.851628][T19818] should_fail+0x23c/0x250 [ 2291.856098][T19818] ? register_for_each_vma+0x372/0x890 [ 2291.861559][T19818] __should_failslab+0x81/0x90 [ 2291.866423][T19818] should_failslab+0x5/0x20 [ 2291.871022][T19818] kmem_cache_alloc_trace+0x52/0x350 [ 2291.876385][T19818] ? register_for_each_vma+0x372/0x890 [ 2291.881850][T19818] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2291.887828][T19818] register_for_each_vma+0x372/0x890 [ 2291.893181][T19818] __uprobe_register+0x392/0x8a0 [ 2291.898542][T19818] uprobe_register_refctr+0x29/0x40 [ 2291.903726][T19818] probe_event_enable+0x2be/0x7d0 [ 2291.908734][T19818] ? __uprobe_trace_func+0x440/0x440 [ 2291.914133][T19818] trace_uprobe_register+0x88/0x410 [ 2291.919318][T19818] perf_trace_event_init+0x34e/0x790 [ 2291.924644][T19818] perf_uprobe_init+0xf5/0x140 [ 2291.929406][T19818] perf_uprobe_event_init+0xde/0x140 [ 2291.934713][T19818] perf_try_init_event+0x21a/0x400 [ 2291.939824][T19818] perf_event_alloc+0xa60/0x1740 [ 2291.944753][T19818] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2291.950421][T19818] ? proc_fail_nth_write+0x127/0x150 [ 2291.955691][T19818] ? preempt_count_add+0x41/0x90 [ 2291.960763][T19818] __x64_sys_perf_event_open+0x63/0x70 [ 2291.966252][T19818] do_syscall_64+0x44/0xa0 [ 2291.970714][T19818] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2291.976631][T19818] RIP: 0033:0x7ff6e6d13ae9 [ 2291.981092][T19818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2292.000690][T19818] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2292.009170][T19818] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2292.017173][T19818] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 18:53:06 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2292.025172][T19818] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2292.033160][T19818] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2292.041126][T19818] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2292.049096][T19818] [ 2292.062806][T19817] loop5: detected capacity change from 0 to 4 18:53:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 37) 18:53:06 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000240000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2292.084464][T19817] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2292.145654][T19824] loop4: detected capacity change from 0 to 264192 [ 2292.163509][T19824] EXT4-fs (loop4): #blocks per group too big: 3293184 [ 2292.207010][T19828] loop1: detected capacity change from 0 to 4 [ 2292.216124][T19824] loop4: detected capacity change from 0 to 264192 [ 2292.222373][T19828] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2292.232362][T19824] EXT4-fs (loop4): #blocks per group too big: 3293184 [ 2292.240095][T19829] FAULT_INJECTION: forcing a failure. [ 2292.240095][T19829] name failslab, interval 1, probability 0, space 0, times 0 [ 2292.252861][T19829] CPU: 0 PID: 19829 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2292.261308][T19829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2292.271353][T19829] Call Trace: [ 2292.274624][T19829] [ 2292.277640][T19829] dump_stack_lvl+0xd6/0x122 [ 2292.282384][T19829] dump_stack+0x11/0x1b [ 2292.286564][T19829] should_fail+0x23c/0x250 [ 2292.291011][T19829] ? register_for_each_vma+0x372/0x890 [ 2292.296488][T19829] __should_failslab+0x81/0x90 [ 2292.301267][T19829] should_failslab+0x5/0x20 [ 2292.305831][T19829] kmem_cache_alloc_trace+0x52/0x350 [ 2292.311305][T19829] ? register_for_each_vma+0x372/0x890 [ 2292.316768][T19829] ? vma_interval_tree_iter_next+0x263/0x280 [ 2292.322847][T19829] register_for_each_vma+0x372/0x890 [ 2292.328273][T19829] __uprobe_register+0x392/0x8a0 [ 2292.333243][T19829] uprobe_register_refctr+0x29/0x40 [ 2292.338505][T19829] probe_event_enable+0x2be/0x7d0 [ 2292.343531][T19829] ? __uprobe_trace_func+0x440/0x440 [ 2292.348818][T19829] trace_uprobe_register+0x88/0x410 [ 2292.354020][T19829] perf_trace_event_init+0x34e/0x790 [ 2292.359455][T19829] perf_uprobe_init+0xf5/0x140 [ 2292.364329][T19829] perf_uprobe_event_init+0xde/0x140 [ 2292.369613][T19829] perf_try_init_event+0x21a/0x400 [ 2292.374802][T19829] perf_event_alloc+0xa60/0x1740 [ 2292.379740][T19829] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2292.385452][T19829] ? proc_fail_nth_write+0x127/0x150 [ 2292.390757][T19829] ? preempt_count_add+0x41/0x90 [ 2292.395695][T19829] __x64_sys_perf_event_open+0x63/0x70 [ 2292.401151][T19829] do_syscall_64+0x44/0xa0 [ 2292.405646][T19829] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2292.411535][T19829] RIP: 0033:0x7ff6e6d13ae9 [ 2292.415931][T19829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2292.435627][T19829] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2292.444018][T19829] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 18:53:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004048000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2292.451984][T19829] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2292.459981][T19829] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2292.467967][T19829] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2292.475969][T19829] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2292.483939][T19829] [ 2292.500213][T19828] loop1: detected capacity change from 0 to 4 [ 2292.528164][T19828] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2292.548200][T19835] loop5: detected capacity change from 0 to 4 [ 2292.571003][T19835] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:06 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 38) 18:53:06 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2292.601646][T19837] loop4: detected capacity change from 0 to 264192 [ 2292.626204][T19837] EXT4-fs (loop4): #blocks per group too big: 4734976 [ 2292.639614][T19835] loop5: detected capacity change from 0 to 4 18:53:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000340000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2292.646603][T19835] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2292.666369][T19837] loop4: detected capacity change from 0 to 264192 [ 2292.674067][T19837] EXT4-fs (loop4): #blocks per group too big: 4734976 18:53:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000404c000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2292.779650][T19842] loop1: detected capacity change from 0 to 4 [ 2292.788337][T19843] FAULT_INJECTION: forcing a failure. [ 2292.788337][T19843] name failslab, interval 1, probability 0, space 0, times 0 [ 2292.800992][T19843] CPU: 0 PID: 19843 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2292.809513][T19843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2292.819565][T19843] Call Trace: [ 2292.822843][T19843] [ 2292.825769][T19843] dump_stack_lvl+0xd6/0x122 [ 2292.830382][T19843] dump_stack+0x11/0x1b [ 2292.834552][T19843] should_fail+0x23c/0x250 [ 2292.838968][T19843] ? register_for_each_vma+0x372/0x890 [ 2292.844485][T19843] __should_failslab+0x81/0x90 [ 2292.849402][T19843] should_failslab+0x5/0x20 [ 2292.853907][T19843] kmem_cache_alloc_trace+0x52/0x350 [ 2292.859249][T19843] ? register_for_each_vma+0x372/0x890 [ 2292.864791][T19843] ? vma_interval_tree_iter_next+0x263/0x280 [ 2292.870767][T19843] register_for_each_vma+0x372/0x890 [ 2292.876051][T19843] __uprobe_register+0x392/0x8a0 [ 2292.881132][T19843] uprobe_register_refctr+0x29/0x40 [ 2292.886447][T19843] probe_event_enable+0x2be/0x7d0 [ 2292.891486][T19843] ? __uprobe_trace_func+0x440/0x440 [ 2292.896770][T19843] trace_uprobe_register+0x88/0x410 [ 2292.901975][T19843] perf_trace_event_init+0x34e/0x790 [ 2292.907274][T19843] perf_uprobe_init+0xf5/0x140 [ 2292.912035][T19843] perf_uprobe_event_init+0xde/0x140 [ 2292.917407][T19843] perf_try_init_event+0x21a/0x400 [ 2292.922561][T19843] perf_event_alloc+0xa60/0x1740 [ 2292.927581][T19843] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2292.933239][T19843] ? proc_fail_nth_write+0x127/0x150 [ 2292.934201][T19842] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2292.938600][T19843] ? preempt_count_add+0x41/0x90 [ 2292.938630][T19843] __x64_sys_perf_event_open+0x63/0x70 [ 2292.938655][T19843] do_syscall_64+0x44/0xa0 [ 2292.962119][T19843] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2292.968055][T19843] RIP: 0033:0x7ff6e6d13ae9 [ 2292.972505][T19843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2292.992108][T19843] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2293.000564][T19843] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2293.008529][T19843] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2293.016494][T19843] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2293.024508][T19843] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2293.032551][T19843] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2293.040514][T19843] 18:53:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2293.076027][T19849] loop5: detected capacity change from 0 to 4 [ 2293.093503][T19842] loop1: detected capacity change from 0 to 4 [ 2293.107865][T19849] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2293.111181][T19842] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 39) [ 2293.130309][T19850] loop4: detected capacity change from 0 to 264192 [ 2293.146438][T19850] EXT4-fs (loop4): #blocks per group too big: 4997120 [ 2293.160173][T19849] loop5: detected capacity change from 0 to 4 [ 2293.167315][T19849] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:07 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000440000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2293.180256][T19850] loop4: detected capacity change from 0 to 264192 [ 2293.191655][T19850] EXT4-fs (loop4): #blocks per group too big: 4997120 18:53:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004050000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2293.313180][T19857] FAULT_INJECTION: forcing a failure. [ 2293.313180][T19857] name failslab, interval 1, probability 0, space 0, times 0 [ 2293.325840][T19857] CPU: 1 PID: 19857 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2293.334305][T19857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2293.344455][T19857] Call Trace: [ 2293.347826][T19857] [ 2293.350745][T19857] dump_stack_lvl+0xd6/0x122 [ 2293.355404][T19857] dump_stack+0x11/0x1b [ 2293.359636][T19857] should_fail+0x23c/0x250 [ 2293.364050][T19857] ? register_for_each_vma+0x372/0x890 [ 2293.369592][T19857] __should_failslab+0x81/0x90 [ 2293.374361][T19857] should_failslab+0x5/0x20 [ 2293.378973][T19857] kmem_cache_alloc_trace+0x52/0x350 [ 2293.384255][T19857] ? register_for_each_vma+0x372/0x890 [ 2293.389764][T19857] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2293.395756][T19857] register_for_each_vma+0x372/0x890 [ 2293.401306][T19857] __uprobe_register+0x392/0x8a0 [ 2293.406353][T19857] uprobe_register_refctr+0x29/0x40 [ 2293.411575][T19857] probe_event_enable+0x2be/0x7d0 [ 2293.416600][T19857] ? __uprobe_trace_func+0x440/0x440 [ 2293.421876][T19857] trace_uprobe_register+0x88/0x410 [ 2293.427082][T19857] perf_trace_event_init+0x34e/0x790 [ 2293.432381][T19857] perf_uprobe_init+0xf5/0x140 [ 2293.437209][T19857] perf_uprobe_event_init+0xde/0x140 [ 2293.442567][T19857] perf_try_init_event+0x21a/0x400 [ 2293.447675][T19857] perf_event_alloc+0xa60/0x1740 [ 2293.452617][T19857] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2293.458247][T19857] ? proc_fail_nth_write+0x127/0x150 [ 2293.463540][T19857] ? preempt_count_add+0x41/0x90 [ 2293.468635][T19857] __x64_sys_perf_event_open+0x63/0x70 [ 2293.474108][T19857] do_syscall_64+0x44/0xa0 [ 2293.478531][T19857] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2293.484430][T19857] RIP: 0033:0x7ff6e6d13ae9 [ 2293.488839][T19857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2293.508538][T19857] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2293.517051][T19857] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2293.525023][T19857] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2293.533001][T19857] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2293.541109][T19857] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2293.549073][T19857] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2293.557046][T19857] 18:53:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 40) [ 2293.632033][T19861] loop1: detected capacity change from 0 to 4 [ 2293.642213][T19862] loop5: detected capacity change from 0 to 4 [ 2293.653077][T19861] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2293.665821][T19863] loop4: detected capacity change from 0 to 264192 [ 2293.673566][T19862] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2293.692120][T19863] EXT4-fs (loop4): #blocks per group too big: 5259264 [ 2293.699922][T19861] loop1: detected capacity change from 0 to 4 [ 2293.706566][T19861] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2293.720978][T19862] loop5: detected capacity change from 0 to 4 18:53:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:07 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2293.729062][T19862] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2293.750593][T19863] loop4: detected capacity change from 0 to 264192 [ 2293.764965][T19863] EXT4-fs (loop4): #blocks per group too big: 5259264 18:53:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000540000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004060000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2293.841406][T19870] FAULT_INJECTION: forcing a failure. [ 2293.841406][T19870] name failslab, interval 1, probability 0, space 0, times 0 [ 2293.854055][T19870] CPU: 0 PID: 19870 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2293.862469][T19870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2293.872510][T19870] Call Trace: [ 2293.875853][T19870] [ 2293.878791][T19870] dump_stack_lvl+0xd6/0x122 [ 2293.883480][T19870] dump_stack+0x11/0x1b [ 2293.887691][T19870] should_fail+0x23c/0x250 [ 2293.892099][T19870] ? register_for_each_vma+0x372/0x890 [ 2293.897622][T19870] __should_failslab+0x81/0x90 [ 2293.902389][T19870] should_failslab+0x5/0x20 [ 2293.906932][T19870] kmem_cache_alloc_trace+0x52/0x350 [ 2293.912296][T19870] ? register_for_each_vma+0x372/0x890 [ 2293.917800][T19870] ? vma_interval_tree_iter_next+0x263/0x280 [ 2293.923854][T19870] register_for_each_vma+0x372/0x890 [ 2293.929271][T19870] __uprobe_register+0x392/0x8a0 [ 2293.934405][T19870] uprobe_register_refctr+0x29/0x40 [ 2293.939669][T19870] probe_event_enable+0x2be/0x7d0 [ 2293.944726][T19870] ? __uprobe_trace_func+0x440/0x440 [ 2293.950009][T19870] trace_uprobe_register+0x88/0x410 [ 2293.955209][T19870] perf_trace_event_init+0x34e/0x790 [ 2293.960619][T19870] perf_uprobe_init+0xf5/0x140 [ 2293.965412][T19870] perf_uprobe_event_init+0xde/0x140 [ 2293.970700][T19870] perf_try_init_event+0x21a/0x400 [ 2293.975821][T19870] perf_event_alloc+0xa60/0x1740 [ 2293.980804][T19870] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2293.986473][T19870] ? proc_fail_nth_write+0x127/0x150 [ 2293.991768][T19870] ? preempt_count_add+0x41/0x90 [ 2293.996751][T19870] __x64_sys_perf_event_open+0x63/0x70 [ 2294.002229][T19870] do_syscall_64+0x44/0xa0 [ 2294.006648][T19870] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2294.012612][T19870] RIP: 0033:0x7ff6e6d13ae9 [ 2294.017034][T19870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2294.036712][T19870] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2294.045123][T19870] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2294.053100][T19870] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2294.061070][T19870] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2294.069094][T19870] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2294.077078][T19870] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2294.085093][T19870] 18:53:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 41) 18:53:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2294.138326][T19878] loop1: detected capacity change from 0 to 4 [ 2294.139685][T19879] loop4: detected capacity change from 0 to 264192 [ 2294.151718][T19880] loop5: detected capacity change from 0 to 4 [ 2294.166345][T19878] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2294.175930][T19880] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2294.190114][T19879] EXT4-fs (loop4): #blocks per group too big: 6307840 [ 2294.209843][T19878] loop1: detected capacity change from 0 to 4 [ 2294.217320][T19880] loop5: detected capacity change from 0 to 4 [ 2294.225482][T19878] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2294.234394][T19880] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2294.236098][T19879] loop4: detected capacity change from 0 to 264192 [ 2294.251127][T19879] EXT4-fs (loop4): #blocks per group too big: 6307840 18:53:08 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000640000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004068000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2294.321765][T19885] FAULT_INJECTION: forcing a failure. [ 2294.321765][T19885] name failslab, interval 1, probability 0, space 0, times 0 [ 2294.334615][T19885] CPU: 1 PID: 19885 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2294.343024][T19885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2294.353081][T19885] Call Trace: [ 2294.356404][T19885] [ 2294.359409][T19885] dump_stack_lvl+0xd6/0x122 [ 2294.364038][T19885] dump_stack+0x11/0x1b [ 2294.368187][T19885] should_fail+0x23c/0x250 [ 2294.372602][T19885] ? register_for_each_vma+0x372/0x890 [ 2294.378060][T19885] __should_failslab+0x81/0x90 [ 2294.382917][T19885] should_failslab+0x5/0x20 [ 2294.387494][T19885] kmem_cache_alloc_trace+0x52/0x350 [ 2294.392781][T19885] ? register_for_each_vma+0x372/0x890 [ 2294.398245][T19885] ? vma_interval_tree_iter_next+0x263/0x280 [ 2294.404473][T19885] register_for_each_vma+0x372/0x890 [ 2294.409787][T19885] __uprobe_register+0x392/0x8a0 [ 2294.414739][T19885] uprobe_register_refctr+0x29/0x40 [ 2294.419968][T19885] probe_event_enable+0x2be/0x7d0 [ 2294.425033][T19885] ? __uprobe_trace_func+0x440/0x440 [ 2294.430319][T19885] trace_uprobe_register+0x88/0x410 [ 2294.435517][T19885] perf_trace_event_init+0x34e/0x790 [ 2294.440873][T19885] perf_uprobe_init+0xf5/0x140 [ 2294.445643][T19885] perf_uprobe_event_init+0xde/0x140 [ 2294.450925][T19885] perf_try_init_event+0x21a/0x400 [ 2294.456083][T19885] perf_event_alloc+0xa60/0x1740 [ 2294.461104][T19885] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2294.466776][T19885] ? proc_fail_nth_write+0x127/0x150 [ 2294.472057][T19885] ? preempt_count_add+0x41/0x90 [ 2294.477028][T19885] __x64_sys_perf_event_open+0x63/0x70 [ 2294.482545][T19885] do_syscall_64+0x44/0xa0 [ 2294.486965][T19885] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2294.492892][T19885] RIP: 0033:0x7ff6e6d13ae9 [ 2294.497328][T19885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 42) [ 2294.516993][T19885] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2294.525423][T19885] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2294.533478][T19885] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2294.541534][T19885] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2294.549505][T19885] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2294.557510][T19885] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2294.565488][T19885] 18:53:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2294.704818][T19893] loop1: detected capacity change from 0 to 4 [ 2294.705418][T19894] loop4: detected capacity change from 0 to 264192 [ 2294.722313][T19895] loop5: detected capacity change from 0 to 4 [ 2294.736789][T19893] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2294.747096][T19894] EXT4-fs (loop4): #blocks per group too big: 6832128 [ 2294.747119][T19895] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2294.765321][T19897] FAULT_INJECTION: forcing a failure. [ 2294.765321][T19897] name failslab, interval 1, probability 0, space 0, times 0 [ 2294.778141][T19897] CPU: 0 PID: 19897 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2294.786635][T19897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2294.796762][T19897] Call Trace: [ 2294.800111][T19897] [ 2294.803052][T19897] dump_stack_lvl+0xd6/0x122 [ 2294.807641][T19897] dump_stack+0x11/0x1b [ 2294.811824][T19897] should_fail+0x23c/0x250 [ 2294.816280][T19897] ? register_for_each_vma+0x372/0x890 [ 2294.821740][T19897] __should_failslab+0x81/0x90 [ 2294.826605][T19897] should_failslab+0x5/0x20 [ 2294.831108][T19897] kmem_cache_alloc_trace+0x52/0x350 [ 2294.836393][T19897] ? register_for_each_vma+0x372/0x890 [ 2294.841853][T19897] ? vma_interval_tree_iter_next+0x263/0x280 [ 2294.847896][T19897] register_for_each_vma+0x372/0x890 [ 2294.853242][T19897] __uprobe_register+0x392/0x8a0 [ 2294.858187][T19897] uprobe_register_refctr+0x29/0x40 [ 2294.863440][T19897] probe_event_enable+0x2be/0x7d0 [ 2294.868540][T19897] ? __uprobe_trace_func+0x440/0x440 [ 2294.873885][T19897] trace_uprobe_register+0x88/0x410 [ 2294.879095][T19897] perf_trace_event_init+0x34e/0x790 [ 2294.884404][T19897] perf_uprobe_init+0xf5/0x140 [ 2294.889206][T19897] perf_uprobe_event_init+0xde/0x140 [ 2294.894508][T19897] perf_try_init_event+0x21a/0x400 [ 2294.899618][T19897] perf_event_alloc+0xa60/0x1740 [ 2294.904779][T19897] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2294.910417][T19897] ? proc_fail_nth_write+0x127/0x150 [ 2294.915718][T19897] ? preempt_count_add+0x41/0x90 [ 2294.920746][T19897] __x64_sys_perf_event_open+0x63/0x70 [ 2294.926229][T19897] do_syscall_64+0x44/0xa0 [ 2294.930709][T19897] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2294.936607][T19897] RIP: 0033:0x7ff6e6d13ae9 [ 2294.941111][T19897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2294.960785][T19897] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2294.969248][T19897] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2294.977211][T19897] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2294.985179][T19897] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2294.993146][T19897] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 18:53:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2295.001117][T19897] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2295.009141][T19897] [ 2295.030147][T19893] loop1: detected capacity change from 0 to 4 [ 2295.038936][T19894] loop4: detected capacity change from 0 to 264192 [ 2295.047812][T19893] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:09 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:09 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 43) 18:53:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000406c000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000740000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2295.057881][T19895] loop5: detected capacity change from 0 to 4 [ 2295.064547][T19894] EXT4-fs (loop4): #blocks per group too big: 6832128 [ 2295.075391][T19895] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:09 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2295.233368][T19911] loop1: detected capacity change from 0 to 4 [ 2295.244182][T19912] FAULT_INJECTION: forcing a failure. [ 2295.244182][T19912] name failslab, interval 1, probability 0, space 0, times 0 [ 2295.256895][T19912] CPU: 0 PID: 19912 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2295.265318][T19912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2295.275441][T19912] Call Trace: [ 2295.278707][T19912] [ 2295.281632][T19912] dump_stack_lvl+0xd6/0x122 [ 2295.286222][T19912] dump_stack+0x11/0x1b [ 2295.290421][T19912] should_fail+0x23c/0x250 [ 2295.294842][T19912] ? register_for_each_vma+0x372/0x890 [ 2295.300306][T19912] __should_failslab+0x81/0x90 [ 2295.305134][T19912] should_failslab+0x5/0x20 [ 2295.309635][T19912] kmem_cache_alloc_trace+0x52/0x350 [ 2295.314949][T19912] ? register_for_each_vma+0x372/0x890 [ 2295.320411][T19912] ? vma_interval_tree_iter_next+0x263/0x280 [ 2295.326424][T19912] register_for_each_vma+0x372/0x890 [ 2295.331728][T19912] __uprobe_register+0x392/0x8a0 [ 2295.336701][T19912] uprobe_register_refctr+0x29/0x40 [ 2295.341903][T19912] probe_event_enable+0x2be/0x7d0 [ 2295.347069][T19912] ? __uprobe_trace_func+0x440/0x440 [ 2295.352412][T19912] trace_uprobe_register+0x88/0x410 [ 2295.357775][T19912] perf_trace_event_init+0x34e/0x790 [ 2295.363062][T19912] perf_uprobe_init+0xf5/0x140 [ 2295.367830][T19912] perf_uprobe_event_init+0xde/0x140 [ 2295.373114][T19912] perf_try_init_event+0x21a/0x400 [ 2295.378248][T19912] perf_event_alloc+0xa60/0x1740 [ 2295.383197][T19912] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2295.388846][T19912] ? proc_fail_nth_write+0x127/0x150 [ 2295.394155][T19912] ? preempt_count_add+0x41/0x90 [ 2295.399119][T19912] __x64_sys_perf_event_open+0x63/0x70 [ 2295.402619][T19913] loop4: detected capacity change from 0 to 264192 [ 2295.404579][T19912] do_syscall_64+0x44/0xa0 [ 2295.412608][T19911] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2295.415551][T19912] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2295.430059][T19912] RIP: 0033:0x7ff6e6d13ae9 [ 2295.434473][T19912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2295.454278][T19912] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2295.462697][T19912] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2295.470729][T19912] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2295.478725][T19912] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2295.486768][T19912] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2295.494721][T19912] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2295.502682][T19912] [ 2295.506597][T19914] loop5: detected capacity change from 0 to 4 [ 2295.507092][T19913] EXT4-fs (loop4): #blocks per group too big: 7094272 18:53:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 44) [ 2295.536360][T19911] loop1: detected capacity change from 0 to 4 [ 2295.543206][T19914] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2295.560298][T19911] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2295.573533][T19913] loop4: detected capacity change from 0 to 264192 [ 2295.573658][T19914] loop5: detected capacity change from 0 to 4 [ 2295.588145][T19913] EXT4-fs (loop4): #blocks per group too big: 7094272 [ 2295.596119][T19914] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:09 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000840000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x80ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004074000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:09 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2295.698265][T19921] FAULT_INJECTION: forcing a failure. [ 2295.698265][T19921] name failslab, interval 1, probability 0, space 0, times 0 [ 2295.710928][T19921] CPU: 1 PID: 19921 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2295.719346][T19921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2295.729565][T19921] Call Trace: [ 2295.732834][T19921] [ 2295.735756][T19921] dump_stack_lvl+0xd6/0x122 [ 2295.740346][T19921] dump_stack+0x11/0x1b [ 2295.744511][T19921] should_fail+0x23c/0x250 [ 2295.749015][T19921] ? register_for_each_vma+0x372/0x890 [ 2295.754474][T19921] __should_failslab+0x81/0x90 [ 2295.759313][T19921] should_failslab+0x5/0x20 [ 2295.763897][T19921] kmem_cache_alloc_trace+0x52/0x350 [ 2295.769223][T19921] ? register_for_each_vma+0x372/0x890 [ 2295.774689][T19921] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2295.780664][T19921] register_for_each_vma+0x372/0x890 [ 2295.786039][T19921] __uprobe_register+0x392/0x8a0 [ 2295.790981][T19921] uprobe_register_refctr+0x29/0x40 [ 2295.796192][T19921] probe_event_enable+0x2be/0x7d0 [ 2295.801256][T19921] ? __uprobe_trace_func+0x440/0x440 [ 2295.806536][T19921] trace_uprobe_register+0x88/0x410 [ 2295.811801][T19921] perf_trace_event_init+0x34e/0x790 [ 2295.817111][T19921] perf_uprobe_init+0xf5/0x140 [ 2295.821910][T19921] perf_uprobe_event_init+0xde/0x140 [ 2295.827191][T19921] perf_try_init_event+0x21a/0x400 [ 2295.832334][T19921] perf_event_alloc+0xa60/0x1740 [ 2295.837271][T19921] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2295.842989][T19921] ? proc_fail_nth_write+0x127/0x150 [ 2295.848296][T19921] ? preempt_count_add+0x41/0x90 [ 2295.853287][T19921] __x64_sys_perf_event_open+0x63/0x70 [ 2295.858746][T19921] do_syscall_64+0x44/0xa0 [ 2295.863196][T19921] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2295.869112][T19921] RIP: 0033:0x7ff6e6d13ae9 [ 2295.873536][T19921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2295.893319][T19921] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2295.901742][T19921] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2295.909711][T19921] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2295.917755][T19921] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2295.925724][T19921] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2295.933688][T19921] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2295.941714][T19921] 18:53:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 45) 18:53:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2296.047462][T19928] loop1: detected capacity change from 0 to 4 [ 2296.054827][T19929] loop5: detected capacity change from 0 to 4 [ 2296.072528][T19928] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2296.085872][T19929] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:10 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2296.100977][T19928] loop1: detected capacity change from 0 to 4 [ 2296.112409][T19932] loop4: detected capacity change from 0 to 264192 [ 2296.119809][T19928] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2296.132273][T19932] EXT4-fs (loop4): #blocks per group too big: 7618560 [ 2296.140953][T19929] loop5: detected capacity change from 0 to 4 [ 2296.148916][T19929] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2296.188357][T19932] loop4: detected capacity change from 0 to 264192 [ 2296.195951][T19934] FAULT_INJECTION: forcing a failure. [ 2296.195951][T19934] name failslab, interval 1, probability 0, space 0, times 0 [ 2296.208614][T19934] CPU: 1 PID: 19934 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2296.217033][T19934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2296.227315][T19934] Call Trace: [ 2296.230587][T19934] [ 2296.233512][T19934] dump_stack_lvl+0xd6/0x122 [ 2296.238099][T19934] dump_stack+0x11/0x1b [ 2296.242248][T19934] should_fail+0x23c/0x250 [ 2296.246688][T19934] ? register_for_each_vma+0x372/0x890 [ 2296.252227][T19934] __should_failslab+0x81/0x90 [ 2296.256990][T19934] should_failslab+0x5/0x20 [ 2296.261564][T19934] kmem_cache_alloc_trace+0x52/0x350 [ 2296.266846][T19934] ? register_for_each_vma+0x372/0x890 [ 2296.272306][T19934] ? vma_interval_tree_iter_next+0x263/0x280 [ 2296.278388][T19934] register_for_each_vma+0x372/0x890 [ 2296.283763][T19934] __uprobe_register+0x392/0x8a0 [ 2296.288748][T19934] uprobe_register_refctr+0x29/0x40 [ 2296.293954][T19934] probe_event_enable+0x2be/0x7d0 [ 2296.298982][T19934] ? __uprobe_trace_func+0x440/0x440 [ 2296.304268][T19934] trace_uprobe_register+0x88/0x410 [ 2296.309540][T19934] perf_trace_event_init+0x34e/0x790 [ 2296.314835][T19934] perf_uprobe_init+0xf5/0x140 [ 2296.319710][T19934] perf_uprobe_event_init+0xde/0x140 [ 2296.324991][T19934] perf_try_init_event+0x21a/0x400 [ 2296.330125][T19934] perf_event_alloc+0xa60/0x1740 [ 2296.335098][T19934] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2296.340749][T19934] ? proc_fail_nth_write+0x127/0x150 [ 2296.346037][T19934] ? preempt_count_add+0x41/0x90 [ 2296.350988][T19934] __x64_sys_perf_event_open+0x63/0x70 [ 2296.356454][T19934] do_syscall_64+0x44/0xa0 [ 2296.361000][T19934] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2296.366936][T19934] RIP: 0033:0x7ff6e6d13ae9 [ 2296.371347][T19934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2296.390956][T19934] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 18:53:10 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000940000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 46) [ 2296.399372][T19934] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2296.407334][T19934] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2296.415321][T19934] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2296.423460][T19934] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2296.431458][T19934] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2296.439424][T19934] [ 2296.499128][T19932] EXT4-fs (loop4): #blocks per group too big: 7618560 18:53:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004076000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:10 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2296.689171][T19943] FAULT_INJECTION: forcing a failure. [ 2296.689171][T19943] name failslab, interval 1, probability 0, space 0, times 0 [ 2296.701845][T19943] CPU: 1 PID: 19943 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2296.710416][T19943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2296.720465][T19943] Call Trace: [ 2296.723729][T19943] [ 2296.726708][T19943] dump_stack_lvl+0xd6/0x122 [ 2296.731308][T19943] dump_stack+0x11/0x1b [ 2296.735468][T19943] should_fail+0x23c/0x250 [ 2296.739890][T19943] ? register_for_each_vma+0x372/0x890 [ 2296.745383][T19943] __should_failslab+0x81/0x90 [ 2296.750191][T19943] should_failslab+0x5/0x20 [ 2296.754751][T19943] kmem_cache_alloc_trace+0x52/0x350 [ 2296.760055][T19943] ? register_for_each_vma+0x372/0x890 [ 2296.765589][T19943] ? vma_interval_tree_iter_next+0x263/0x280 [ 2296.771739][T19943] register_for_each_vma+0x372/0x890 [ 2296.777138][T19943] __uprobe_register+0x392/0x8a0 [ 2296.782080][T19943] uprobe_register_refctr+0x29/0x40 [ 2296.787283][T19943] probe_event_enable+0x2be/0x7d0 [ 2296.792363][T19943] ? __uprobe_trace_func+0x440/0x440 [ 2296.797674][T19943] trace_uprobe_register+0x88/0x410 [ 2296.802870][T19943] perf_trace_event_init+0x34e/0x790 [ 2296.808204][T19943] perf_uprobe_init+0xf5/0x140 [ 2296.813072][T19943] perf_uprobe_event_init+0xde/0x140 [ 2296.818352][T19943] perf_try_init_event+0x21a/0x400 [ 2296.823461][T19943] perf_event_alloc+0xa60/0x1740 [ 2296.828400][T19943] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2296.834080][T19943] ? proc_fail_nth_write+0x127/0x150 [ 2296.839414][T19943] ? preempt_count_add+0x41/0x90 [ 2296.844378][T19943] __x64_sys_perf_event_open+0x63/0x70 [ 2296.849840][T19943] do_syscall_64+0x44/0xa0 [ 2296.854258][T19943] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2296.860177][T19943] RIP: 0033:0x7ff6e6d13ae9 [ 2296.864582][T19943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2296.884186][T19943] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2296.892613][T19943] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2296.900595][T19943] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2296.908598][T19943] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2296.916625][T19943] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2296.924588][T19943] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2296.932600][T19943] 18:53:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 47) [ 2296.944167][T19944] loop1: detected capacity change from 0 to 4 [ 2296.953600][T19946] loop5: detected capacity change from 0 to 4 [ 2296.969945][T19944] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2296.984724][T19946] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2297.010153][T19950] loop4: detected capacity change from 0 to 264192 [ 2297.029577][T19946] loop5: detected capacity change from 0 to 4 [ 2297.036480][T19950] EXT4-fs (loop4): #blocks per group too big: 7749632 [ 2297.043885][T19946] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2297.043908][T19944] loop1: detected capacity change from 0 to 4 18:53:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:11 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000a40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:11 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2297.062720][T19944] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2297.085454][T19950] loop4: detected capacity change from 0 to 264192 [ 2297.093024][T19950] EXT4-fs (loop4): #blocks per group too big: 7749632 18:53:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000407a000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2297.178286][T19954] FAULT_INJECTION: forcing a failure. [ 2297.178286][T19954] name failslab, interval 1, probability 0, space 0, times 0 [ 2297.190930][T19954] CPU: 0 PID: 19954 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2297.199359][T19954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2297.209409][T19954] Call Trace: [ 2297.212684][T19954] [ 2297.215681][T19954] dump_stack_lvl+0xd6/0x122 [ 2297.220270][T19954] dump_stack+0x11/0x1b [ 2297.224463][T19954] should_fail+0x23c/0x250 [ 2297.228900][T19954] ? register_for_each_vma+0x372/0x890 [ 2297.234457][T19954] __should_failslab+0x81/0x90 [ 2297.239570][T19954] should_failslab+0x5/0x20 [ 2297.244092][T19954] kmem_cache_alloc_trace+0x52/0x350 [ 2297.250735][T19954] ? register_for_each_vma+0x372/0x890 [ 2297.256197][T19954] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2297.262247][T19954] register_for_each_vma+0x372/0x890 [ 2297.267610][T19954] __uprobe_register+0x392/0x8a0 [ 2297.272546][T19954] uprobe_register_refctr+0x29/0x40 [ 2297.277747][T19954] probe_event_enable+0x2be/0x7d0 [ 2297.282770][T19954] ? __uprobe_trace_func+0x440/0x440 [ 2297.288059][T19954] trace_uprobe_register+0x88/0x410 [ 2297.293528][T19954] perf_trace_event_init+0x34e/0x790 [ 2297.298893][T19954] perf_uprobe_init+0xf5/0x140 [ 2297.303651][T19954] perf_uprobe_event_init+0xde/0x140 [ 2297.308934][T19954] perf_try_init_event+0x21a/0x400 [ 2297.314040][T19954] perf_event_alloc+0xa60/0x1740 [ 2297.318982][T19954] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2297.324670][T19954] ? proc_fail_nth_write+0x127/0x150 [ 2297.329958][T19954] ? preempt_count_add+0x41/0x90 [ 2297.335002][T19954] __x64_sys_perf_event_open+0x63/0x70 [ 2297.340525][T19954] do_syscall_64+0x44/0xa0 [ 2297.344937][T19954] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2297.350835][T19954] RIP: 0033:0x7ff6e6d13ae9 [ 2297.355246][T19954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2297.374922][T19954] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2297.383328][T19954] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2297.391298][T19954] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2297.399333][T19954] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2297.407424][T19954] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2297.415437][T19954] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2297.423406][T19954] 18:53:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 48) [ 2297.476922][T19960] loop1: detected capacity change from 0 to 4 [ 2297.487046][T19961] loop5: detected capacity change from 0 to 4 [ 2297.494128][T19963] loop4: detected capacity change from 0 to 264192 [ 2297.505049][T19960] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2297.517757][T19961] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:11 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2297.527276][T19963] EXT4-fs (loop4): #blocks per group too big: 8011776 [ 2297.564858][T19960] loop1: detected capacity change from 0 to 4 18:53:11 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000102001000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2297.572398][T19961] loop5: detected capacity change from 0 to 4 [ 2297.574090][T19963] loop4: detected capacity change from 0 to 264192 [ 2297.579665][T19960] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2297.594211][T19961] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2297.604706][T19963] EXT4-fs (loop4): #blocks per group too big: 8011776 18:53:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040a4000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000b40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2297.704279][T19969] FAULT_INJECTION: forcing a failure. [ 2297.704279][T19969] name failslab, interval 1, probability 0, space 0, times 0 [ 2297.717094][T19969] CPU: 0 PID: 19969 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2297.725507][T19969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2297.735558][T19969] Call Trace: [ 2297.738833][T19969] [ 2297.741760][T19969] dump_stack_lvl+0xd6/0x122 [ 2297.746399][T19969] dump_stack+0x11/0x1b [ 2297.750554][T19969] should_fail+0x23c/0x250 [ 2297.755036][T19969] ? register_for_each_vma+0x372/0x890 [ 2297.760530][T19969] __should_failslab+0x81/0x90 [ 2297.765303][T19969] should_failslab+0x5/0x20 [ 2297.769838][T19969] kmem_cache_alloc_trace+0x52/0x350 [ 2297.775126][T19969] ? register_for_each_vma+0x372/0x890 [ 2297.780590][T19969] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2297.786650][T19969] register_for_each_vma+0x372/0x890 [ 2297.792007][T19969] __uprobe_register+0x392/0x8a0 [ 2297.797022][T19969] uprobe_register_refctr+0x29/0x40 [ 2297.802222][T19969] probe_event_enable+0x2be/0x7d0 [ 2297.807242][T19969] ? __uprobe_trace_func+0x440/0x440 [ 2297.812529][T19969] trace_uprobe_register+0x88/0x410 [ 2297.817775][T19969] perf_trace_event_init+0x34e/0x790 [ 2297.823059][T19969] perf_uprobe_init+0xf5/0x140 [ 2297.827817][T19969] perf_uprobe_event_init+0xde/0x140 [ 2297.833107][T19969] perf_try_init_event+0x21a/0x400 [ 2297.838217][T19969] perf_event_alloc+0xa60/0x1740 [ 2297.843151][T19969] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2297.848830][T19969] ? proc_fail_nth_write+0x127/0x150 [ 2297.854112][T19969] ? preempt_count_add+0x41/0x90 [ 2297.859250][T19969] __x64_sys_perf_event_open+0x63/0x70 [ 2297.864783][T19969] do_syscall_64+0x44/0xa0 [ 2297.869197][T19969] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2297.875153][T19969] RIP: 0033:0x7ff6e6d13ae9 [ 2297.879583][T19969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2297.899192][T19969] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2297.907600][T19969] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2297.915682][T19969] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2297.923664][T19969] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2297.931628][T19969] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2297.939592][T19969] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2297.947562][T19969] 18:53:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2297.990749][T19977] loop1: detected capacity change from 0 to 4 [ 2298.005737][T19978] loop5: detected capacity change from 0 to 4 [ 2298.006107][T19979] loop4: detected capacity change from 0 to 264192 [ 2298.029514][T19977] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 49) [ 2298.038433][T19979] EXT4-fs (loop4): #blocks per group too big: 10764288 [ 2298.045536][T19978] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2298.082130][T19977] loop1: detected capacity change from 0 to 4 [ 2298.082240][T19979] loop4: detected capacity change from 0 to 264192 [ 2298.088674][T19977] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2298.111353][T19978] loop5: detected capacity change from 0 to 4 [ 2298.118279][T19979] EXT4-fs (loop4): #blocks per group too big: 10764288 18:53:12 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2298.125856][T19978] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040bb000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000c40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2298.211717][T19984] FAULT_INJECTION: forcing a failure. [ 2298.211717][T19984] name failslab, interval 1, probability 0, space 0, times 0 [ 2298.224554][T19984] CPU: 1 PID: 19984 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2298.233065][T19984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2298.243189][T19984] Call Trace: [ 2298.246472][T19984] [ 2298.249399][T19984] dump_stack_lvl+0xd6/0x122 [ 2298.253991][T19984] dump_stack+0x11/0x1b [ 2298.258137][T19984] should_fail+0x23c/0x250 [ 2298.262619][T19984] ? register_for_each_vma+0x372/0x890 [ 2298.268101][T19984] __should_failslab+0x81/0x90 [ 2298.272866][T19984] should_failslab+0x5/0x20 [ 2298.277368][T19984] kmem_cache_alloc_trace+0x52/0x350 [ 2298.282658][T19984] ? register_for_each_vma+0x372/0x890 [ 2298.288211][T19984] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2298.294192][T19984] register_for_each_vma+0x372/0x890 [ 2298.299476][T19984] __uprobe_register+0x392/0x8a0 [ 2298.304410][T19984] uprobe_register_refctr+0x29/0x40 [ 2298.309667][T19984] probe_event_enable+0x2be/0x7d0 [ 2298.314685][T19984] ? __uprobe_trace_func+0x440/0x440 [ 2298.320039][T19984] trace_uprobe_register+0x88/0x410 [ 2298.325304][T19984] perf_trace_event_init+0x34e/0x790 [ 2298.330773][T19984] perf_uprobe_init+0xf5/0x140 [ 2298.335734][T19984] perf_uprobe_event_init+0xde/0x140 [ 2298.341028][T19984] perf_try_init_event+0x21a/0x400 [ 2298.346182][T19984] perf_event_alloc+0xa60/0x1740 [ 2298.351234][T19984] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2298.356900][T19984] ? proc_fail_nth_write+0x127/0x150 [ 2298.362178][T19984] ? preempt_count_add+0x41/0x90 [ 2298.367147][T19984] __x64_sys_perf_event_open+0x63/0x70 [ 2298.372610][T19984] do_syscall_64+0x44/0xa0 [ 2298.377079][T19984] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2298.383002][T19984] RIP: 0033:0x7ff6e6d13ae9 [ 2298.387411][T19984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2298.407013][T19984] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2298.415420][T19984] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2298.423399][T19984] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2298.431365][T19984] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2298.439326][T19984] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2298.447311][T19984] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2298.455290][T19984] 18:53:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 50) 18:53:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2298.519402][T19988] loop1: detected capacity change from 0 to 4 [ 2298.536658][T19988] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2298.570449][T19988] loop1: detected capacity change from 0 to 4 [ 2298.577840][T19992] loop5: detected capacity change from 0 to 4 [ 2298.584333][T19988] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:12 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000002501000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2298.622738][T19992] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2298.622856][T19995] loop4: detected capacity change from 0 to 264192 [ 2298.650680][T19995] EXT4-fs (loop4): #blocks per group too big: 12271616 [ 2298.661443][T19997] FAULT_INJECTION: forcing a failure. [ 2298.661443][T19997] name failslab, interval 1, probability 0, space 0, times 0 [ 2298.674143][T19997] CPU: 1 PID: 19997 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2298.682566][T19997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2298.692620][T19997] Call Trace: [ 2298.695939][T19997] [ 2298.698863][T19997] dump_stack_lvl+0xd6/0x122 [ 2298.703459][T19997] dump_stack+0x11/0x1b [ 2298.707630][T19997] should_fail+0x23c/0x250 [ 2298.712105][T19997] ? register_for_each_vma+0x372/0x890 [ 2298.717665][T19997] __should_failslab+0x81/0x90 [ 2298.722490][T19997] should_failslab+0x5/0x20 [ 2298.727173][T19997] kmem_cache_alloc_trace+0x52/0x350 [ 2298.732488][T19997] ? register_for_each_vma+0x372/0x890 [ 2298.737949][T19997] ? vma_interval_tree_iter_next+0x263/0x280 [ 2298.743928][T19997] register_for_each_vma+0x372/0x890 [ 2298.749218][T19997] __uprobe_register+0x392/0x8a0 [ 2298.754234][T19997] uprobe_register_refctr+0x29/0x40 [ 2298.759459][T19997] probe_event_enable+0x2be/0x7d0 [ 2298.764498][T19997] ? __uprobe_trace_func+0x440/0x440 [ 2298.769785][T19997] trace_uprobe_register+0x88/0x410 [ 2298.775018][T19997] perf_trace_event_init+0x34e/0x790 [ 2298.780324][T19997] perf_uprobe_init+0xf5/0x140 [ 2298.785085][T19997] perf_uprobe_event_init+0xde/0x140 [ 2298.790369][T19997] perf_try_init_event+0x21a/0x400 [ 2298.795484][T19997] perf_event_alloc+0xa60/0x1740 [ 2298.800423][T19997] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2298.806116][T19997] ? proc_fail_nth_write+0x127/0x150 [ 2298.811435][T19997] ? preempt_count_add+0x41/0x90 [ 2298.816394][T19997] __x64_sys_perf_event_open+0x63/0x70 [ 2298.821878][T19997] do_syscall_64+0x44/0xa0 [ 2298.826299][T19997] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2298.832195][T19997] RIP: 0033:0x7ff6e6d13ae9 [ 2298.836638][T19997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2298.856241][T19997] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2298.864650][T19997] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 18:53:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2298.872612][T19997] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2298.880624][T19997] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2298.888591][T19997] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2298.896659][T19997] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2298.904688][T19997] [ 2298.913801][T19992] loop5: detected capacity change from 0 to 4 18:53:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 51) 18:53:13 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2298.922647][T19995] loop4: detected capacity change from 0 to 264192 [ 2298.935094][T19992] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2298.946490][T19995] EXT4-fs (loop4): #blocks per group too big: 12271616 18:53:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040fe000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000d40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2299.089782][T20002] loop1: detected capacity change from 0 to 4 [ 2299.100128][T20002] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2299.140251][T20002] loop1: detected capacity change from 0 to 4 [ 2299.142379][T20006] FAULT_INJECTION: forcing a failure. [ 2299.142379][T20006] name failslab, interval 1, probability 0, space 0, times 0 [ 2299.149049][T20002] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2299.159006][T20006] CPU: 1 PID: 20006 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2299.176026][T20006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2299.186073][T20006] Call Trace: [ 2299.189369][T20006] [ 2299.192291][T20006] dump_stack_lvl+0xd6/0x122 [ 2299.196930][T20006] dump_stack+0x11/0x1b [ 2299.201152][T20006] should_fail+0x23c/0x250 [ 2299.205652][T20006] ? register_for_each_vma+0x372/0x890 [ 2299.211153][T20006] __should_failslab+0x81/0x90 [ 2299.215982][T20006] should_failslab+0x5/0x20 [ 2299.220520][T20006] kmem_cache_alloc_trace+0x52/0x350 [ 2299.225834][T20006] ? register_for_each_vma+0x372/0x890 [ 2299.231293][T20006] ? vma_interval_tree_iter_next+0x263/0x280 [ 2299.237302][T20006] register_for_each_vma+0x372/0x890 [ 2299.242663][T20006] __uprobe_register+0x392/0x8a0 [ 2299.247943][T20006] uprobe_register_refctr+0x29/0x40 [ 2299.253141][T20006] probe_event_enable+0x2be/0x7d0 [ 2299.258165][T20006] ? __uprobe_trace_func+0x440/0x440 [ 2299.263481][T20006] trace_uprobe_register+0x88/0x410 [ 2299.268731][T20006] perf_trace_event_init+0x34e/0x790 [ 2299.274102][T20006] perf_uprobe_init+0xf5/0x140 [ 2299.278994][T20006] perf_uprobe_event_init+0xde/0x140 [ 2299.284366][T20006] perf_try_init_event+0x21a/0x400 [ 2299.289514][T20006] perf_event_alloc+0xa60/0x1740 [ 2299.294458][T20006] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2299.300090][T20006] ? proc_fail_nth_write+0x127/0x150 [ 2299.305395][T20006] ? preempt_count_add+0x41/0x90 [ 2299.310410][T20006] __x64_sys_perf_event_open+0x63/0x70 [ 2299.315920][T20006] do_syscall_64+0x44/0xa0 [ 2299.320460][T20006] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2299.326380][T20006] RIP: 0033:0x7ff6e6d13ae9 [ 2299.330832][T20006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2299.350433][T20006] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2299.358869][T20006] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2299.366835][T20006] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2299.374919][T20006] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2299.382933][T20006] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 18:53:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 52) [ 2299.391031][T20006] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2299.399032][T20006] 18:53:13 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000002e01000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:13 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2299.484002][T20011] loop5: detected capacity change from 0 to 4 [ 2299.490613][T20012] loop4: detected capacity change from 0 to 264192 [ 2299.516890][T20012] EXT4-fs (loop4): #blocks per group too big: 16662528 [ 2299.524325][T20011] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2299.590182][T20012] loop4: detected capacity change from 0 to 264192 [ 2299.591276][T20011] loop5: detected capacity change from 0 to 4 [ 2299.602902][T20012] EXT4-fs (loop4): #blocks per group too big: 16662528 [ 2299.612014][T20011] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2299.654040][T20016] FAULT_INJECTION: forcing a failure. [ 2299.654040][T20016] name failslab, interval 1, probability 0, space 0, times 0 [ 2299.666705][T20016] CPU: 0 PID: 20016 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2299.675113][T20016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2299.685164][T20016] Call Trace: [ 2299.688439][T20016] [ 2299.691362][T20016] dump_stack_lvl+0xd6/0x122 [ 2299.695951][T20016] dump_stack+0x11/0x1b [ 2299.700099][T20016] should_fail+0x23c/0x250 [ 2299.704553][T20016] ? register_for_each_vma+0x372/0x890 [ 2299.710034][T20016] __should_failslab+0x81/0x90 [ 2299.714791][T20016] should_failslab+0x5/0x20 [ 2299.719324][T20016] kmem_cache_alloc_trace+0x52/0x350 [ 2299.724611][T20016] ? register_for_each_vma+0x372/0x890 [ 2299.730118][T20016] ? vma_interval_tree_iter_next+0x263/0x280 [ 2299.736248][T20016] register_for_each_vma+0x372/0x890 [ 2299.741538][T20016] __uprobe_register+0x392/0x8a0 [ 2299.746535][T20016] uprobe_register_refctr+0x29/0x40 [ 2299.751742][T20016] probe_event_enable+0x2be/0x7d0 [ 2299.756839][T20016] ? __uprobe_trace_func+0x440/0x440 [ 2299.762113][T20016] trace_uprobe_register+0x88/0x410 [ 2299.767323][T20016] perf_trace_event_init+0x34e/0x790 [ 2299.772593][T20016] perf_uprobe_init+0xf5/0x140 [ 2299.777426][T20016] perf_uprobe_event_init+0xde/0x140 [ 2299.782697][T20016] perf_try_init_event+0x21a/0x400 [ 2299.787863][T20016] perf_event_alloc+0xa60/0x1740 [ 2299.792867][T20016] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2299.798496][T20016] ? proc_fail_nth_write+0x127/0x150 [ 2299.803772][T20016] ? preempt_count_add+0x41/0x90 [ 2299.808794][T20016] __x64_sys_perf_event_open+0x63/0x70 [ 2299.814255][T20016] do_syscall_64+0x44/0xa0 [ 2299.818699][T20016] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2299.824633][T20016] RIP: 0033:0x7ff6e6d13ae9 [ 2299.829037][T20016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2299.848625][T20016] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2299.857020][T20016] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2299.864985][T20016] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2299.872981][T20016] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2299.880935][T20016] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2299.888901][T20016] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2299.896869][T20016] 18:53:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000e40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000408a010040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 53) [ 2299.930185][T20021] loop1: detected capacity change from 0 to 4 [ 2299.956960][T20021] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2299.990083][T20021] loop1: detected capacity change from 0 to 4 [ 2299.996443][T20021] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:14 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2300.154027][T20027] loop5: detected capacity change from 0 to 4 [ 2300.154943][T20029] loop4: detected capacity change from 0 to 264192 [ 2300.175493][T20031] FAULT_INJECTION: forcing a failure. [ 2300.175493][T20031] name failslab, interval 1, probability 0, space 0, times 0 [ 2300.188126][T20031] CPU: 0 PID: 20031 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2300.188545][T20029] EXT4-fs (loop4): #blocks per group too big: 25837568 [ 2300.196603][T20031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2300.196616][T20031] Call Trace: [ 2300.196622][T20031] [ 2300.196629][T20031] dump_stack_lvl+0xd6/0x122 [ 2300.196649][T20031] dump_stack+0x11/0x1b [ 2300.196664][T20031] should_fail+0x23c/0x250 [ 2300.232880][T20031] ? register_for_each_vma+0x372/0x890 [ 2300.238431][T20031] __should_failslab+0x81/0x90 [ 2300.243194][T20031] should_failslab+0x5/0x20 [ 2300.247691][T20031] kmem_cache_alloc_trace+0x52/0x350 [ 2300.252988][T20031] ? register_for_each_vma+0x372/0x890 [ 2300.258455][T20031] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2300.264472][T20031] register_for_each_vma+0x372/0x890 [ 2300.269820][T20031] __uprobe_register+0x392/0x8a0 [ 2300.274772][T20031] uprobe_register_refctr+0x29/0x40 [ 2300.280076][T20031] probe_event_enable+0x2be/0x7d0 [ 2300.285116][T20031] ? __uprobe_trace_func+0x440/0x440 [ 2300.290448][T20031] trace_uprobe_register+0x88/0x410 [ 2300.295698][T20031] perf_trace_event_init+0x34e/0x790 [ 2300.300999][T20031] perf_uprobe_init+0xf5/0x140 [ 2300.305811][T20031] perf_uprobe_event_init+0xde/0x140 [ 2300.311159][T20031] perf_try_init_event+0x21a/0x400 [ 2300.316325][T20031] perf_event_alloc+0xa60/0x1740 [ 2300.321260][T20031] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2300.326933][T20031] ? proc_fail_nth_write+0x127/0x150 [ 2300.332235][T20031] ? preempt_count_add+0x41/0x90 [ 2300.337194][T20031] __x64_sys_perf_event_open+0x63/0x70 [ 2300.342684][T20031] do_syscall_64+0x44/0xa0 [ 2300.347102][T20031] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2300.353035][T20031] RIP: 0033:0x7ff6e6d13ae9 [ 2300.357465][T20031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2300.377074][T20031] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2300.379677][T20027] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2300.385509][T20031] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 18:53:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2300.385524][T20031] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2300.410790][T20031] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2300.418834][T20031] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2300.426801][T20031] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2300.434775][T20031] 18:53:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2300.468930][T20027] loop5: detected capacity change from 0 to 4 [ 2300.468979][T20029] loop4: detected capacity change from 0 to 264192 [ 2300.482138][T20027] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2300.494621][T20029] EXT4-fs (loop4): #blocks per group too big: 25837568 [ 2300.502532][T20034] loop1: detected capacity change from 0 to 4 18:53:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040b0010040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 54) 18:53:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000f40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2300.533982][T20034] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2300.569631][T20034] loop1: detected capacity change from 0 to 4 [ 2300.576369][T20034] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:14 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000004001000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2300.707568][T20043] FAULT_INJECTION: forcing a failure. [ 2300.707568][T20043] name failslab, interval 1, probability 0, space 0, times 0 [ 2300.720255][T20043] CPU: 0 PID: 20043 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2300.728665][T20043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2300.738744][T20043] Call Trace: [ 2300.742019][T20043] [ 2300.744949][T20043] dump_stack_lvl+0xd6/0x122 [ 2300.749568][T20043] dump_stack+0x11/0x1b [ 2300.753724][T20043] should_fail+0x23c/0x250 [ 2300.758320][T20043] ? register_for_each_vma+0x372/0x890 [ 2300.763839][T20043] __should_failslab+0x81/0x90 [ 2300.768748][T20043] should_failslab+0x5/0x20 [ 2300.773258][T20043] kmem_cache_alloc_trace+0x52/0x350 [ 2300.778546][T20043] ? register_for_each_vma+0x372/0x890 [ 2300.784012][T20043] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2300.789993][T20043] register_for_each_vma+0x372/0x890 [ 2300.795347][T20043] __uprobe_register+0x392/0x8a0 [ 2300.800318][T20043] uprobe_register_refctr+0x29/0x40 [ 2300.805576][T20043] probe_event_enable+0x2be/0x7d0 [ 2300.810615][T20043] ? __uprobe_trace_func+0x440/0x440 [ 2300.815900][T20043] trace_uprobe_register+0x88/0x410 [ 2300.821133][T20043] perf_trace_event_init+0x34e/0x790 [ 2300.826471][T20043] perf_uprobe_init+0xf5/0x140 [ 2300.831260][T20043] perf_uprobe_event_init+0xde/0x140 [ 2300.836542][T20043] perf_try_init_event+0x21a/0x400 [ 2300.841691][T20043] perf_event_alloc+0xa60/0x1740 [ 2300.846688][T20043] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2300.852339][T20043] ? proc_fail_nth_write+0x127/0x150 [ 2300.857635][T20043] ? preempt_count_add+0x41/0x90 [ 2300.863067][T20043] __x64_sys_perf_event_open+0x63/0x70 [ 2300.868523][T20043] do_syscall_64+0x44/0xa0 [ 2300.872974][T20043] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2300.878918][T20043] RIP: 0033:0x7ff6e6d13ae9 [ 2300.883351][T20043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2300.902965][T20043] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2300.911400][T20043] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2300.919376][T20043] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2300.927413][T20043] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2300.935402][T20043] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2300.943373][T20043] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2300.951337][T20043] 18:53:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 55) [ 2300.959227][T20044] loop4: detected capacity change from 0 to 264192 [ 2300.966282][T20045] loop5: detected capacity change from 0 to 4 [ 2300.987389][T20044] EXT4-fs (loop4): #blocks per group too big: 28327936 [ 2300.995072][T20045] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2301.029810][T20044] loop4: detected capacity change from 0 to 264192 [ 2301.031212][T20045] loop5: detected capacity change from 0 to 4 [ 2301.043076][T20044] EXT4-fs (loop4): #blocks per group too big: 28327936 [ 2301.050043][T20045] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040bb010040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000001040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2301.142664][T20052] loop1: detected capacity change from 0 to 4 [ 2301.175052][T20052] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2301.192982][T20054] FAULT_INJECTION: forcing a failure. [ 2301.192982][T20054] name failslab, interval 1, probability 0, space 0, times 0 [ 2301.205625][T20054] CPU: 0 PID: 20054 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2301.214046][T20054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2301.224111][T20054] Call Trace: [ 2301.227488][T20054] [ 2301.230446][T20054] dump_stack_lvl+0xd6/0x122 [ 2301.235069][T20054] dump_stack+0x11/0x1b [ 2301.239300][T20054] should_fail+0x23c/0x250 [ 2301.243730][T20054] ? register_for_each_vma+0x372/0x890 [ 2301.249181][T20054] __should_failslab+0x81/0x90 [ 2301.253943][T20054] should_failslab+0x5/0x20 [ 2301.258447][T20054] kmem_cache_alloc_trace+0x52/0x350 [ 2301.263735][T20054] ? register_for_each_vma+0x372/0x890 [ 2301.269268][T20054] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2301.275243][T20054] register_for_each_vma+0x372/0x890 [ 2301.280559][T20054] __uprobe_register+0x392/0x8a0 [ 2301.285567][T20054] uprobe_register_refctr+0x29/0x40 [ 2301.290763][T20054] probe_event_enable+0x2be/0x7d0 [ 2301.295793][T20054] ? __uprobe_trace_func+0x440/0x440 [ 2301.301081][T20054] trace_uprobe_register+0x88/0x410 [ 2301.306273][T20054] perf_trace_event_init+0x34e/0x790 [ 2301.311562][T20054] perf_uprobe_init+0xf5/0x140 [ 2301.316729][T20054] perf_uprobe_event_init+0xde/0x140 [ 2301.322137][T20054] perf_try_init_event+0x21a/0x400 [ 2301.327243][T20054] perf_event_alloc+0xa60/0x1740 [ 2301.332244][T20054] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2301.337939][T20054] ? proc_fail_nth_write+0x127/0x150 18:53:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:15 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2301.343222][T20054] ? preempt_count_add+0x41/0x90 [ 2301.348219][T20054] __x64_sys_perf_event_open+0x63/0x70 [ 2301.353673][T20054] do_syscall_64+0x44/0xa0 [ 2301.358144][T20054] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2301.364064][T20054] RIP: 0033:0x7ff6e6d13ae9 [ 2301.368465][T20054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2301.388067][T20054] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2301.396511][T20054] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2301.404489][T20054] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2301.412461][T20054] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2301.420421][T20054] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2301.428380][T20054] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2301.436394][T20054] 18:53:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 56) [ 2301.464274][T20052] loop1: detected capacity change from 0 to 4 [ 2301.472482][T20052] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2301.504161][T20063] loop5: detected capacity change from 0 to 4 18:53:15 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:15 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2301.504214][T20062] loop4: detected capacity change from 0 to 264192 [ 2301.526404][T20062] EXT4-fs (loop4): #blocks per group too big: 29048832 [ 2301.533359][T20063] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2301.600520][T20062] loop4: detected capacity change from 0 to 264192 [ 2301.604386][T20063] loop5: detected capacity change from 0 to 4 [ 2301.613294][T20062] EXT4-fs (loop4): #blocks per group too big: 29048832 [ 2301.621410][T20063] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2301.645045][T20065] FAULT_INJECTION: forcing a failure. [ 2301.645045][T20065] name failslab, interval 1, probability 0, space 0, times 0 [ 2301.657676][T20065] CPU: 0 PID: 20065 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2301.666124][T20065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2301.676175][T20065] Call Trace: [ 2301.679454][T20065] [ 2301.682377][T20065] dump_stack_lvl+0xd6/0x122 [ 2301.686968][T20065] dump_stack+0x11/0x1b [ 2301.691124][T20065] should_fail+0x23c/0x250 [ 2301.695539][T20065] ? register_for_each_vma+0x372/0x890 [ 2301.700990][T20065] __should_failslab+0x81/0x90 [ 2301.705769][T20065] should_failslab+0x5/0x20 [ 2301.710271][T20065] kmem_cache_alloc_trace+0x52/0x350 [ 2301.715559][T20065] ? register_for_each_vma+0x372/0x890 [ 2301.721030][T20065] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2301.727049][T20065] register_for_each_vma+0x372/0x890 [ 2301.732341][T20065] __uprobe_register+0x392/0x8a0 [ 2301.737416][T20065] uprobe_register_refctr+0x29/0x40 [ 2301.742634][T20065] probe_event_enable+0x2be/0x7d0 [ 2301.747685][T20065] ? __uprobe_trace_func+0x440/0x440 [ 2301.753073][T20065] trace_uprobe_register+0x88/0x410 [ 2301.758314][T20065] perf_trace_event_init+0x34e/0x790 [ 2301.763602][T20065] perf_uprobe_init+0xf5/0x140 [ 2301.768357][T20065] perf_uprobe_event_init+0xde/0x140 [ 2301.773637][T20065] perf_try_init_event+0x21a/0x400 [ 2301.778747][T20065] perf_event_alloc+0xa60/0x1740 [ 2301.783737][T20065] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2301.789372][T20065] ? proc_fail_nth_write+0x127/0x150 [ 2301.794654][T20065] ? preempt_count_add+0x41/0x90 [ 2301.799613][T20065] __x64_sys_perf_event_open+0x63/0x70 [ 2301.805102][T20065] do_syscall_64+0x44/0xa0 [ 2301.809629][T20065] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2301.815598][T20065] RIP: 0033:0x7ff6e6d13ae9 [ 2301.820003][T20065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2301.839660][T20065] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2301.848093][T20065] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2301.856055][T20065] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2301.864017][T20065] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2301.871991][T20065] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2301.879956][T20065] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2301.888020][T20065] 18:53:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000001140000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040f9010040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 57) [ 2301.915723][T20069] loop1: detected capacity change from 0 to 4 [ 2301.931651][T20069] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:16 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2301.989708][T20069] loop1: detected capacity change from 0 to 4 [ 2301.996233][T20069] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:16 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2302.106926][T20078] loop5: detected capacity change from 0 to 4 [ 2302.123856][T20078] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2302.124419][T20081] loop4: detected capacity change from 0 to 264192 [ 2302.141342][T20080] FAULT_INJECTION: forcing a failure. [ 2302.141342][T20080] name failslab, interval 1, probability 0, space 0, times 0 [ 2302.154016][T20080] CPU: 1 PID: 20080 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2302.162499][T20080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2302.172545][T20080] Call Trace: [ 2302.175814][T20080] [ 2302.178745][T20080] dump_stack_lvl+0xd6/0x122 [ 2302.183338][T20080] dump_stack+0x11/0x1b [ 2302.187538][T20080] should_fail+0x23c/0x250 [ 2302.191949][T20080] ? register_for_each_vma+0x372/0x890 [ 2302.197481][T20080] __should_failslab+0x81/0x90 [ 2302.202246][T20080] should_failslab+0x5/0x20 [ 2302.206808][T20080] kmem_cache_alloc_trace+0x52/0x350 [ 2302.212100][T20080] ? register_for_each_vma+0x372/0x890 [ 2302.217645][T20080] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2302.223625][T20080] register_for_each_vma+0x372/0x890 [ 2302.228909][T20080] __uprobe_register+0x392/0x8a0 [ 2302.233848][T20080] uprobe_register_refctr+0x29/0x40 [ 2302.239057][T20080] probe_event_enable+0x2be/0x7d0 [ 2302.244167][T20080] ? __uprobe_trace_func+0x440/0x440 [ 2302.249544][T20080] trace_uprobe_register+0x88/0x410 [ 2302.254760][T20080] perf_trace_event_init+0x34e/0x790 [ 2302.260091][T20080] perf_uprobe_init+0xf5/0x140 [ 2302.264853][T20080] perf_uprobe_event_init+0xde/0x140 [ 2302.270180][T20080] perf_try_init_event+0x21a/0x400 [ 2302.275291][T20080] perf_event_alloc+0xa60/0x1740 [ 2302.280310][T20080] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2302.285980][T20080] ? proc_fail_nth_write+0x127/0x150 [ 2302.291344][T20080] ? preempt_count_add+0x41/0x90 [ 2302.296398][T20080] __x64_sys_perf_event_open+0x63/0x70 [ 2302.301861][T20080] do_syscall_64+0x44/0xa0 [ 2302.306279][T20080] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2302.312221][T20080] RIP: 0033:0x7ff6e6d13ae9 [ 2302.316655][T20080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2302.336259][T20080] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2302.344676][T20080] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2302.352638][T20080] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2302.360605][T20080] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2302.368636][T20080] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2302.376605][T20080] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2302.384656][T20080] 18:53:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2302.401781][T20081] EXT4-fs (loop4): #blocks per group too big: 33112064 18:53:16 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 58) [ 2302.434678][T20078] loop5: detected capacity change from 0 to 4 [ 2302.444146][T20081] loop4: detected capacity change from 0 to 264192 [ 2302.451704][T20078] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2302.465709][T20081] EXT4-fs (loop4): #blocks per group too big: 33112064 18:53:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000001240000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004004020040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2302.514116][T20084] loop1: detected capacity change from 0 to 4 [ 2302.534078][T20084] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2302.559711][T20084] loop1: detected capacity change from 0 to 4 [ 2302.566515][T20084] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:16 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000004c01000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2302.655166][T20091] FAULT_INJECTION: forcing a failure. [ 2302.655166][T20091] name failslab, interval 1, probability 0, space 0, times 0 [ 2302.667926][T20091] CPU: 1 PID: 20091 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2302.676344][T20091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2302.686396][T20091] Call Trace: [ 2302.689688][T20091] [ 2302.692646][T20091] dump_stack_lvl+0xd6/0x122 [ 2302.697272][T20091] dump_stack+0x11/0x1b [ 2302.701419][T20091] should_fail+0x23c/0x250 [ 2302.705861][T20091] ? register_for_each_vma+0x372/0x890 [ 2302.711344][T20091] __should_failslab+0x81/0x90 [ 2302.716108][T20091] should_failslab+0x5/0x20 [ 2302.720651][T20091] kmem_cache_alloc_trace+0x52/0x350 [ 2302.725989][T20091] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2302.732035][T20091] register_for_each_vma+0x372/0x890 [ 2302.737324][T20091] __uprobe_register+0x392/0x8a0 [ 2302.742473][T20091] uprobe_register_refctr+0x29/0x40 [ 2302.747702][T20091] probe_event_enable+0x2be/0x7d0 [ 2302.752743][T20091] ? __uprobe_trace_func+0x440/0x440 [ 2302.758031][T20091] trace_uprobe_register+0x88/0x410 [ 2302.763255][T20091] perf_trace_event_init+0x34e/0x790 [ 2302.768587][T20091] perf_uprobe_init+0xf5/0x140 [ 2302.773398][T20091] perf_uprobe_event_init+0xde/0x140 [ 2302.778699][T20091] perf_try_init_event+0x21a/0x400 [ 2302.783818][T20091] perf_event_alloc+0xa60/0x1740 [ 2302.788790][T20091] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2302.794463][T20091] ? proc_fail_nth_write+0x127/0x150 [ 2302.799765][T20091] ? preempt_count_add+0x41/0x90 [ 2302.804722][T20091] __x64_sys_perf_event_open+0x63/0x70 [ 2302.810333][T20091] do_syscall_64+0x44/0xa0 [ 2302.814791][T20091] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2302.820779][T20091] RIP: 0033:0x7ff6e6d13ae9 [ 2302.825282][T20091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2302.844879][T20091] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 18:53:16 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2302.853286][T20091] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2302.861310][T20091] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2302.869342][T20091] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2302.877308][T20091] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2302.885425][T20091] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2302.893396][T20091] 18:53:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 59) [ 2303.002282][T20094] loop5: detected capacity change from 0 to 4 [ 2303.009430][T20095] loop4: detected capacity change from 0 to 264192 [ 2303.035568][T20094] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2303.045563][T20095] EXT4-fs (loop4): #blocks per group too big: 33832960 18:53:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000002240000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2303.090170][T20094] loop5: detected capacity change from 0 to 4 [ 2303.098471][T20094] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2303.108967][T20095] loop4: detected capacity change from 0 to 264192 [ 2303.116332][T20095] EXT4-fs (loop4): #blocks per group too big: 33832960 18:53:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004044020040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2303.170314][T20101] loop1: detected capacity change from 0 to 4 [ 2303.188573][T20101] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2303.201378][T20103] FAULT_INJECTION: forcing a failure. [ 2303.201378][T20103] name failslab, interval 1, probability 0, space 0, times 0 [ 2303.214097][T20103] CPU: 0 PID: 20103 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2303.222557][T20103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2303.232697][T20103] Call Trace: [ 2303.235975][T20103] [ 2303.238899][T20103] dump_stack_lvl+0xd6/0x122 [ 2303.243615][T20103] dump_stack+0x11/0x1b [ 2303.247765][T20103] should_fail+0x23c/0x250 [ 2303.252264][T20103] ? register_for_each_vma+0x372/0x890 [ 2303.257728][T20103] __should_failslab+0x81/0x90 [ 2303.262646][T20103] should_failslab+0x5/0x20 [ 2303.267170][T20103] kmem_cache_alloc_trace+0x52/0x350 [ 2303.272470][T20103] ? register_for_each_vma+0x372/0x890 [ 2303.277975][T20103] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2303.283963][T20103] register_for_each_vma+0x372/0x890 [ 2303.289341][T20103] __uprobe_register+0x392/0x8a0 [ 2303.294432][T20103] uprobe_register_refctr+0x29/0x40 [ 2303.299696][T20103] probe_event_enable+0x2be/0x7d0 [ 2303.304736][T20103] ? __uprobe_trace_func+0x440/0x440 [ 2303.310044][T20103] trace_uprobe_register+0x88/0x410 [ 2303.315245][T20103] perf_trace_event_init+0x34e/0x790 [ 2303.320575][T20103] perf_uprobe_init+0xf5/0x140 [ 2303.325348][T20103] perf_uprobe_event_init+0xde/0x140 [ 2303.330631][T20103] perf_try_init_event+0x21a/0x400 [ 2303.335760][T20103] perf_event_alloc+0xa60/0x1740 [ 2303.340702][T20103] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2303.346335][T20103] ? proc_fail_nth_write+0x127/0x150 [ 2303.351780][T20103] ? preempt_count_add+0x41/0x90 [ 2303.356717][T20103] __x64_sys_perf_event_open+0x63/0x70 [ 2303.362244][T20103] do_syscall_64+0x44/0xa0 [ 2303.366737][T20103] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2303.372727][T20103] RIP: 0033:0x7ff6e6d13ae9 [ 2303.377135][T20103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2303.396752][T20103] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2303.405164][T20103] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2303.413161][T20103] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2303.421160][T20103] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2303.429198][T20103] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2303.437204][T20103] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2303.445170][T20103] [ 2303.457810][T20101] loop1: detected capacity change from 0 to 4 18:53:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 60) [ 2303.474816][T20101] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2303.489896][T20108] loop5: detected capacity change from 0 to 4 [ 2303.507261][T20109] loop4: detected capacity change from 0 to 264192 18:53:17 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:17 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2303.518268][T20108] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2303.531733][T20109] EXT4-fs (loop4): #blocks per group too big: 38027264 [ 2303.602275][T20112] FAULT_INJECTION: forcing a failure. [ 2303.602275][T20112] name failslab, interval 1, probability 0, space 0, times 0 [ 2303.602344][T20109] loop4: detected capacity change from 0 to 264192 [ 2303.614938][T20112] CPU: 1 PID: 20112 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2303.623542][T20108] loop5: detected capacity change from 0 to 4 [ 2303.630047][T20112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2303.646163][T20112] Call Trace: [ 2303.649434][T20112] [ 2303.652353][T20112] dump_stack_lvl+0xd6/0x122 [ 2303.656938][T20112] dump_stack+0x11/0x1b [ 2303.661160][T20112] should_fail+0x23c/0x250 [ 2303.665610][T20112] ? register_for_each_vma+0x372/0x890 [ 2303.671067][T20112] __should_failslab+0x81/0x90 [ 2303.675939][T20112] should_failslab+0x5/0x20 [ 2303.680503][T20112] kmem_cache_alloc_trace+0x52/0x350 [ 2303.685814][T20112] ? register_for_each_vma+0x372/0x890 [ 2303.691271][T20112] ? vma_interval_tree_iter_next+0x263/0x280 [ 2303.697277][T20112] register_for_each_vma+0x372/0x890 [ 2303.702617][T20112] __uprobe_register+0x392/0x8a0 [ 2303.707623][T20112] uprobe_register_refctr+0x29/0x40 [ 2303.712862][T20112] probe_event_enable+0x2be/0x7d0 [ 2303.717974][T20112] ? __uprobe_trace_func+0x440/0x440 [ 2303.723260][T20112] trace_uprobe_register+0x88/0x410 [ 2303.728534][T20112] perf_trace_event_init+0x34e/0x790 [ 2303.733897][T20112] perf_uprobe_init+0xf5/0x140 [ 2303.738719][T20112] perf_uprobe_event_init+0xde/0x140 [ 2303.744010][T20112] perf_try_init_event+0x21a/0x400 [ 2303.749130][T20112] perf_event_alloc+0xa60/0x1740 [ 2303.754123][T20112] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2303.759764][T20112] ? proc_fail_nth_write+0x127/0x150 [ 2303.765055][T20112] ? preempt_count_add+0x41/0x90 [ 2303.770080][T20112] __x64_sys_perf_event_open+0x63/0x70 [ 2303.775601][T20112] do_syscall_64+0x44/0xa0 [ 2303.780024][T20112] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2303.785946][T20112] RIP: 0033:0x7ff6e6d13ae9 [ 2303.790351][T20112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2303.810003][T20112] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2303.818413][T20112] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2303.826449][T20112] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2303.834466][T20112] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2303.842427][T20112] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 18:53:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 61) [ 2303.850387][T20112] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2303.858357][T20112] [ 2303.863409][T20109] EXT4-fs (loop4): #blocks per group too big: 38027264 [ 2303.870449][T20108] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000002540000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040a0020040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:18 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2303.952057][T20119] loop1: detected capacity change from 0 to 4 [ 2303.971950][T20119] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:18 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000006801000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2303.999755][T20119] loop1: detected capacity change from 0 to 4 [ 2304.006295][T20119] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2304.065388][T20121] FAULT_INJECTION: forcing a failure. [ 2304.065388][T20121] name failslab, interval 1, probability 0, space 0, times 0 [ 2304.078026][T20121] CPU: 0 PID: 20121 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2304.086460][T20121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2304.096532][T20121] Call Trace: [ 2304.099809][T20121] [ 2304.102820][T20121] dump_stack_lvl+0xd6/0x122 [ 2304.107407][T20121] dump_stack+0x11/0x1b [ 2304.111619][T20121] should_fail+0x23c/0x250 [ 2304.116094][T20121] ? register_for_each_vma+0x372/0x890 [ 2304.121560][T20121] __should_failslab+0x81/0x90 [ 2304.126336][T20121] should_failslab+0x5/0x20 [ 2304.130957][T20121] kmem_cache_alloc_trace+0x52/0x350 [ 2304.136249][T20121] ? register_for_each_vma+0x372/0x890 [ 2304.141747][T20121] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2304.147990][T20121] register_for_each_vma+0x372/0x890 [ 2304.153284][T20121] __uprobe_register+0x392/0x8a0 [ 2304.158287][T20121] uprobe_register_refctr+0x29/0x40 [ 2304.163555][T20121] probe_event_enable+0x2be/0x7d0 [ 2304.168629][T20121] ? __uprobe_trace_func+0x440/0x440 [ 2304.173989][T20121] trace_uprobe_register+0x88/0x410 [ 2304.179220][T20121] perf_trace_event_init+0x34e/0x790 [ 2304.184504][T20121] perf_uprobe_init+0xf5/0x140 [ 2304.189272][T20121] perf_uprobe_event_init+0xde/0x140 [ 2304.194678][T20121] perf_try_init_event+0x21a/0x400 [ 2304.199835][T20121] perf_event_alloc+0xa60/0x1740 [ 2304.205003][T20121] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2304.210724][T20121] ? proc_fail_nth_write+0x127/0x150 [ 2304.216018][T20121] ? preempt_count_add+0x41/0x90 [ 2304.221034][T20121] __x64_sys_perf_event_open+0x63/0x70 [ 2304.226532][T20121] do_syscall_64+0x44/0xa0 [ 2304.231046][T20121] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2304.236941][T20121] RIP: 0033:0x7ff6e6d13ae9 [ 2304.241376][T20121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2304.260984][T20121] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2304.269507][T20121] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2304.277469][T20121] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2304.285439][T20121] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2304.293404][T20121] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2304.301436][T20121] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2304.309409][T20121] 18:53:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 62) 18:53:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2304.370719][T20128] loop1: detected capacity change from 0 to 4 [ 2304.385658][T20128] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2304.399366][T20131] loop4: detected capacity change from 0 to 264192 [ 2304.399482][T20132] loop5: detected capacity change from 0 to 4 18:53:18 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2304.419601][T20131] EXT4-fs (loop4): #blocks per group too big: 44056576 [ 2304.441366][T20132] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2304.452777][T20128] loop1: detected capacity change from 0 to 4 [ 2304.460591][T20131] loop4: detected capacity change from 0 to 264192 [ 2304.467618][T20128] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2304.477155][T20132] loop5: detected capacity change from 0 to 4 [ 2304.484752][T20135] FAULT_INJECTION: forcing a failure. [ 2304.484752][T20135] name failslab, interval 1, probability 0, space 0, times 0 [ 2304.497363][T20135] CPU: 0 PID: 20135 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2304.505776][T20135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2304.515848][T20135] Call Trace: [ 2304.519124][T20135] [ 2304.522045][T20135] dump_stack_lvl+0xd6/0x122 [ 2304.526703][T20135] dump_stack+0x11/0x1b [ 2304.530989][T20135] should_fail+0x23c/0x250 [ 2304.535426][T20135] ? register_for_each_vma+0x372/0x890 [ 2304.540892][T20135] __should_failslab+0x81/0x90 [ 2304.545662][T20135] should_failslab+0x5/0x20 [ 2304.550242][T20135] kmem_cache_alloc_trace+0x52/0x350 [ 2304.555657][T20135] ? register_for_each_vma+0x372/0x890 [ 2304.561124][T20135] ? vma_interval_tree_iter_next+0x263/0x280 [ 2304.567123][T20135] register_for_each_vma+0x372/0x890 [ 2304.572621][T20135] __uprobe_register+0x392/0x8a0 [ 2304.577628][T20135] uprobe_register_refctr+0x29/0x40 [ 2304.582831][T20135] probe_event_enable+0x2be/0x7d0 [ 2304.587994][T20135] ? __uprobe_trace_func+0x440/0x440 [ 2304.593430][T20135] trace_uprobe_register+0x88/0x410 [ 2304.598677][T20135] perf_trace_event_init+0x34e/0x790 [ 2304.604015][T20135] perf_uprobe_init+0xf5/0x140 [ 2304.608772][T20135] perf_uprobe_event_init+0xde/0x140 [ 2304.614069][T20135] perf_try_init_event+0x21a/0x400 [ 2304.619203][T20135] perf_event_alloc+0xa60/0x1740 [ 2304.624163][T20135] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2304.629799][T20135] ? proc_fail_nth_write+0x127/0x150 [ 2304.635123][T20135] ? preempt_count_add+0x41/0x90 [ 2304.640107][T20135] __x64_sys_perf_event_open+0x63/0x70 [ 2304.645573][T20135] do_syscall_64+0x44/0xa0 [ 2304.650064][T20135] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2304.656129][T20135] RIP: 0033:0x7ff6e6d13ae9 [ 2304.660528][T20135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2304.680140][T20135] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2304.688535][T20135] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2304.696497][T20135] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2304.704450][T20135] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2304.712415][T20135] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 18:53:18 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000006c01000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2304.720484][T20135] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2304.728596][T20135] [ 2304.731818][T20131] EXT4-fs (loop4): #blocks per group too big: 44056576 [ 2304.741910][T20132] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000030040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000002e40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 63) 18:53:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:18 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2304.934508][T20145] loop1: detected capacity change from 0 to 4 [ 2304.952239][T20145] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2304.965638][T20148] loop4: detected capacity change from 0 to 264192 [ 2304.972597][T20151] loop5: detected capacity change from 0 to 4 18:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2304.990448][T20151] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2305.002504][T20148] EXT4-fs (loop4): #blocks per group too big: 50348032 [ 2305.002742][T20145] loop1: detected capacity change from 0 to 4 [ 2305.015810][T20149] FAULT_INJECTION: forcing a failure. [ 2305.015810][T20149] name failslab, interval 1, probability 0, space 0, times 0 [ 2305.022983][T20145] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2305.028472][T20149] CPU: 0 PID: 20149 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2305.028494][T20149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2305.028506][T20149] Call Trace: [ 2305.028513][T20149] [ 2305.028519][T20149] dump_stack_lvl+0xd6/0x122 [ 2305.066383][T20149] dump_stack+0x11/0x1b [ 2305.070542][T20149] should_fail+0x23c/0x250 [ 2305.074969][T20149] ? register_for_each_vma+0x372/0x890 [ 2305.080556][T20149] __should_failslab+0x81/0x90 [ 2305.085359][T20149] should_failslab+0x5/0x20 [ 2305.089860][T20149] kmem_cache_alloc_trace+0x52/0x350 [ 2305.095195][T20149] ? register_for_each_vma+0x372/0x890 [ 2305.100834][T20149] ? vma_interval_tree_iter_next+0x263/0x280 [ 2305.106813][T20149] register_for_each_vma+0x372/0x890 [ 2305.112170][T20149] __uprobe_register+0x392/0x8a0 [ 2305.117123][T20149] uprobe_register_refctr+0x29/0x40 [ 2305.122351][T20149] probe_event_enable+0x2be/0x7d0 [ 2305.127459][T20149] ? __uprobe_trace_func+0x440/0x440 [ 2305.132832][T20149] trace_uprobe_register+0x88/0x410 [ 2305.138167][T20149] perf_trace_event_init+0x34e/0x790 [ 2305.143468][T20149] perf_uprobe_init+0xf5/0x140 [ 2305.148244][T20149] perf_uprobe_event_init+0xde/0x140 [ 2305.153566][T20149] perf_try_init_event+0x21a/0x400 [ 2305.158679][T20149] perf_event_alloc+0xa60/0x1740 [ 2305.163719][T20149] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2305.169382][T20149] ? proc_fail_nth_write+0x127/0x150 [ 2305.174668][T20149] ? preempt_count_add+0x41/0x90 [ 2305.179681][T20149] __x64_sys_perf_event_open+0x63/0x70 [ 2305.185313][T20149] do_syscall_64+0x44/0xa0 [ 2305.189729][T20149] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2305.195623][T20149] RIP: 0033:0x7ff6e6d13ae9 [ 2305.200065][T20149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2305.219671][T20149] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2305.228235][T20149] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2305.236204][T20149] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2305.244272][T20149] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2305.252409][T20149] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2305.260371][T20149] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2305.268393][T20149] 18:53:19 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:19 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2305.305375][T20151] loop5: detected capacity change from 0 to 4 [ 2305.315853][T20151] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2305.335809][T20148] loop4: detected capacity change from 0 to 264192 18:53:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 64) 18:53:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000004840000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2305.350077][T20148] EXT4-fs (loop4): #blocks per group too big: 50348032 18:53:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004044030040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:19 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2305.461236][T20161] loop1: detected capacity change from 0 to 4 [ 2305.492808][T20161] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2305.513090][T20164] FAULT_INJECTION: forcing a failure. [ 2305.513090][T20164] name failslab, interval 1, probability 0, space 0, times 0 [ 2305.525829][T20164] CPU: 1 PID: 20164 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2305.534265][T20164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2305.544370][T20164] Call Trace: [ 2305.547643][T20164] [ 2305.550607][T20164] dump_stack_lvl+0xd6/0x122 [ 2305.555201][T20164] dump_stack+0x11/0x1b [ 2305.559386][T20164] should_fail+0x23c/0x250 [ 2305.563863][T20164] ? register_for_each_vma+0x372/0x890 [ 2305.569321][T20164] __should_failslab+0x81/0x90 [ 2305.574112][T20164] should_failslab+0x5/0x20 [ 2305.578614][T20164] kmem_cache_alloc_trace+0x52/0x350 [ 2305.583895][T20164] ? register_for_each_vma+0x372/0x890 [ 2305.589352][T20164] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2305.595332][T20164] register_for_each_vma+0x372/0x890 [ 2305.600709][T20164] __uprobe_register+0x392/0x8a0 [ 2305.605651][T20164] uprobe_register_refctr+0x29/0x40 [ 2305.610957][T20164] probe_event_enable+0x2be/0x7d0 [ 2305.615980][T20164] ? __uprobe_trace_func+0x440/0x440 [ 2305.621258][T20164] trace_uprobe_register+0x88/0x410 [ 2305.626485][T20164] perf_trace_event_init+0x34e/0x790 [ 2305.631764][T20164] perf_uprobe_init+0xf5/0x140 [ 2305.636582][T20164] perf_uprobe_event_init+0xde/0x140 [ 2305.641934][T20164] perf_try_init_event+0x21a/0x400 [ 2305.647042][T20164] perf_event_alloc+0xa60/0x1740 [ 2305.651994][T20164] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2305.657629][T20164] ? proc_fail_nth_write+0x127/0x150 [ 2305.662910][T20164] ? preempt_count_add+0x41/0x90 [ 2305.667853][T20164] __x64_sys_perf_event_open+0x63/0x70 [ 2305.673313][T20164] do_syscall_64+0x44/0xa0 [ 2305.677751][T20164] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2305.683655][T20164] RIP: 0033:0x7ff6e6d13ae9 [ 2305.688070][T20164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2305.707722][T20164] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2305.716216][T20164] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2305.724206][T20164] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2305.732240][T20164] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2305.740215][T20164] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2305.748263][T20164] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2305.756294][T20164] 18:53:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 65) [ 2305.776070][T20161] loop1: detected capacity change from 0 to 4 [ 2305.776290][T20166] loop5: detected capacity change from 0 to 4 [ 2305.790318][T20161] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2305.807874][T20166] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:19 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2305.839741][T20167] loop4: detected capacity change from 0 to 264192 [ 2305.855802][T20167] EXT4-fs (loop4): #blocks per group too big: 54804480 [ 2305.869171][T20166] loop5: detected capacity change from 0 to 4 [ 2305.882647][T20166] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2305.900017][T20167] loop4: detected capacity change from 0 to 264192 [ 2305.907460][T20167] EXT4-fs (loop4): #blocks per group too big: 54804480 18:53:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000405b030040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000004c40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2306.029513][T20174] FAULT_INJECTION: forcing a failure. [ 2306.029513][T20174] name failslab, interval 1, probability 0, space 0, times 0 [ 2306.042170][T20174] CPU: 0 PID: 20174 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2306.050581][T20174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2306.060668][T20174] Call Trace: [ 2306.063962][T20174] [ 2306.066895][T20174] dump_stack_lvl+0xd6/0x122 [ 2306.071493][T20174] dump_stack+0x11/0x1b [ 2306.075647][T20174] should_fail+0x23c/0x250 [ 2306.080069][T20174] ? register_for_each_vma+0x372/0x890 [ 2306.085534][T20174] __should_failslab+0x81/0x90 [ 2306.090295][T20174] should_failslab+0x5/0x20 [ 2306.094802][T20174] kmem_cache_alloc_trace+0x52/0x350 [ 2306.100085][T20174] ? register_for_each_vma+0x372/0x890 [ 2306.105561][T20174] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2306.111617][T20174] register_for_each_vma+0x372/0x890 [ 2306.116949][T20174] __uprobe_register+0x392/0x8a0 [ 2306.121892][T20174] uprobe_register_refctr+0x29/0x40 [ 2306.127178][T20174] probe_event_enable+0x2be/0x7d0 [ 2306.132228][T20174] ? __uprobe_trace_func+0x440/0x440 [ 2306.137646][T20174] trace_uprobe_register+0x88/0x410 [ 2306.142905][T20174] perf_trace_event_init+0x34e/0x790 [ 2306.148295][T20174] perf_uprobe_init+0xf5/0x140 [ 2306.153121][T20174] perf_uprobe_event_init+0xde/0x140 [ 2306.158409][T20174] perf_try_init_event+0x21a/0x400 [ 2306.163528][T20174] perf_event_alloc+0xa60/0x1740 [ 2306.168487][T20174] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2306.174141][T20174] ? proc_fail_nth_write+0x127/0x150 [ 2306.179437][T20174] ? preempt_count_add+0x41/0x90 [ 2306.184435][T20174] __x64_sys_perf_event_open+0x63/0x70 [ 2306.189980][T20174] do_syscall_64+0x44/0xa0 [ 2306.194464][T20174] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2306.200457][T20174] RIP: 0033:0x7ff6e6d13ae9 [ 2306.204880][T20174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2306.224478][T20174] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2306.233164][T20174] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2306.241182][T20174] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2306.249147][T20174] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2306.257281][T20174] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2306.265247][T20174] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2306.273299][T20174] 18:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x9203000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 66) 18:53:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2306.327627][T20183] loop5: detected capacity change from 0 to 4 [ 2306.337908][T20184] loop1: detected capacity change from 0 to 4 [ 2306.345177][T20185] loop4: detected capacity change from 0 to 264192 [ 2306.356602][T20184] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2306.356762][T20183] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2306.378657][T20185] EXT4-fs (loop4): #blocks per group too big: 56311808 18:53:20 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000017d01000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2306.419857][T20184] loop1: detected capacity change from 0 to 4 [ 2306.429508][T20185] loop4: detected capacity change from 0 to 264192 [ 2306.431700][T20183] loop5: detected capacity change from 0 to 4 [ 2306.442661][T20184] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2306.443172][T20185] EXT4-fs (loop4): #blocks per group too big: 56311808 [ 2306.458911][T20183] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2306.539577][T20190] FAULT_INJECTION: forcing a failure. [ 2306.539577][T20190] name failslab, interval 1, probability 0, space 0, times 0 [ 2306.552247][T20190] CPU: 1 PID: 20190 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2306.560654][T20190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2306.570704][T20190] Call Trace: [ 2306.573984][T20190] [ 2306.576914][T20190] dump_stack_lvl+0xd6/0x122 [ 2306.581510][T20190] dump_stack+0x11/0x1b [ 2306.585666][T20190] should_fail+0x23c/0x250 [ 2306.590106][T20190] ? register_for_each_vma+0x372/0x890 [ 2306.595676][T20190] __should_failslab+0x81/0x90 [ 2306.600464][T20190] should_failslab+0x5/0x20 [ 2306.605024][T20190] kmem_cache_alloc_trace+0x52/0x350 [ 2306.610386][T20190] ? register_for_each_vma+0x372/0x890 [ 2306.615841][T20190] ? vma_interval_tree_iter_next+0x263/0x280 [ 2306.621897][T20190] register_for_each_vma+0x372/0x890 [ 2306.627216][T20190] __uprobe_register+0x392/0x8a0 [ 2306.632220][T20190] uprobe_register_refctr+0x29/0x40 [ 2306.637484][T20190] probe_event_enable+0x2be/0x7d0 [ 2306.642692][T20190] ? __uprobe_trace_func+0x440/0x440 [ 2306.648051][T20190] trace_uprobe_register+0x88/0x410 [ 2306.653315][T20190] perf_trace_event_init+0x34e/0x790 [ 2306.658595][T20190] perf_uprobe_init+0xf5/0x140 [ 2306.663430][T20190] perf_uprobe_event_init+0xde/0x140 [ 2306.668711][T20190] perf_try_init_event+0x21a/0x400 [ 2306.673813][T20190] perf_event_alloc+0xa60/0x1740 [ 2306.678768][T20190] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2306.684491][T20190] ? proc_fail_nth_write+0x127/0x150 [ 2306.689843][T20190] ? preempt_count_add+0x41/0x90 [ 2306.694785][T20190] __x64_sys_perf_event_open+0x63/0x70 [ 2306.700315][T20190] do_syscall_64+0x44/0xa0 [ 2306.704773][T20190] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2306.710688][T20190] RIP: 0033:0x7ff6e6d13ae9 [ 2306.715174][T20190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004089030040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2306.734890][T20190] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2306.743312][T20190] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2306.751282][T20190] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2306.759278][T20190] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2306.767327][T20190] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2306.775337][T20190] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2306.783309][T20190] 18:53:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000006040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 67) 18:53:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2306.981749][T20194] loop1: detected capacity change from 0 to 4 [ 2306.999157][T20194] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2307.038966][T20194] loop1: detected capacity change from 0 to 4 [ 2307.056791][T20201] FAULT_INJECTION: forcing a failure. [ 2307.056791][T20201] name failslab, interval 1, probability 0, space 0, times 0 [ 2307.069455][T20201] CPU: 0 PID: 20201 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2307.070914][T20203] loop4: detected capacity change from 0 to 264192 [ 2307.077870][T20201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2307.077886][T20201] Call Trace: [ 2307.077892][T20201] [ 2307.077905][T20201] dump_stack_lvl+0xd6/0x122 [ 2307.085299][T20204] loop5: detected capacity change from 0 to 4 [ 2307.094430][T20201] dump_stack+0x11/0x1b [ 2307.094452][T20201] should_fail+0x23c/0x250 [ 2307.094471][T20201] ? register_for_each_vma+0x372/0x890 [ 2307.125277][T20201] __should_failslab+0x81/0x90 [ 2307.130030][T20201] should_failslab+0x5/0x20 [ 2307.134563][T20201] kmem_cache_alloc_trace+0x52/0x350 [ 2307.139833][T20201] ? register_for_each_vma+0x372/0x890 [ 2307.145347][T20201] ? vma_interval_tree_iter_next+0x263/0x280 [ 2307.151312][T20201] register_for_each_vma+0x372/0x890 [ 2307.156585][T20201] __uprobe_register+0x392/0x8a0 [ 2307.161571][T20201] uprobe_register_refctr+0x29/0x40 [ 2307.166812][T20201] probe_event_enable+0x2be/0x7d0 [ 2307.171847][T20201] ? __uprobe_trace_func+0x440/0x440 [ 2307.177152][T20201] trace_uprobe_register+0x88/0x410 [ 2307.182460][T20201] perf_trace_event_init+0x34e/0x790 [ 2307.187922][T20201] perf_uprobe_init+0xf5/0x140 [ 2307.192679][T20201] perf_uprobe_event_init+0xde/0x140 [ 2307.198000][T20201] perf_try_init_event+0x21a/0x400 [ 2307.203096][T20201] perf_event_alloc+0xa60/0x1740 [ 2307.208103][T20201] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2307.213810][T20201] ? proc_fail_nth_write+0x127/0x150 [ 2307.219125][T20201] ? preempt_count_add+0x41/0x90 [ 2307.224147][T20201] __x64_sys_perf_event_open+0x63/0x70 [ 2307.229594][T20201] do_syscall_64+0x44/0xa0 [ 2307.234010][T20201] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2307.239930][T20201] RIP: 0033:0x7ff6e6d13ae9 [ 2307.244329][T20201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2307.263933][T20201] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2307.272437][T20201] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2307.280393][T20201] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 18:53:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2307.288363][T20201] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2307.296329][T20201] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2307.304435][T20201] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2307.312391][T20201] [ 2307.319301][T20204] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2307.331786][T20203] EXT4-fs (loop4): #blocks per group too big: 59326464 18:53:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 68) 18:53:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2307.349297][T20194] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2307.361810][T20204] loop5: detected capacity change from 0 to 4 [ 2307.379025][T20204] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2307.391910][T20203] loop4: detected capacity change from 0 to 264192 18:53:21 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000006840000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2307.405224][T20203] EXT4-fs (loop4): #blocks per group too big: 59326464 18:53:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040e0030040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2307.538873][T20211] FAULT_INJECTION: forcing a failure. [ 2307.538873][T20211] name failslab, interval 1, probability 0, space 0, times 0 [ 2307.551541][T20211] CPU: 0 PID: 20211 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2307.559999][T20211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2307.570051][T20211] Call Trace: [ 2307.573348][T20211] [ 2307.576297][T20211] dump_stack_lvl+0xd6/0x122 [ 2307.580902][T20211] dump_stack+0x11/0x1b [ 2307.585051][T20211] should_fail+0x23c/0x250 [ 2307.589473][T20211] ? register_for_each_vma+0x372/0x890 [ 2307.594932][T20211] __should_failslab+0x81/0x90 [ 2307.599693][T20211] should_failslab+0x5/0x20 [ 2307.604194][T20211] kmem_cache_alloc_trace+0x52/0x350 [ 2307.609507][T20211] ? register_for_each_vma+0x372/0x890 [ 2307.614965][T20211] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2307.620989][T20211] register_for_each_vma+0x372/0x890 [ 2307.626298][T20211] __uprobe_register+0x392/0x8a0 [ 2307.631261][T20211] uprobe_register_refctr+0x29/0x40 [ 2307.636493][T20211] probe_event_enable+0x2be/0x7d0 [ 2307.641518][T20211] ? __uprobe_trace_func+0x440/0x440 [ 2307.646812][T20211] trace_uprobe_register+0x88/0x410 [ 2307.652053][T20211] perf_trace_event_init+0x34e/0x790 [ 2307.657344][T20211] perf_uprobe_init+0xf5/0x140 [ 2307.662101][T20211] perf_uprobe_event_init+0xde/0x140 [ 2307.667456][T20211] perf_try_init_event+0x21a/0x400 [ 2307.672570][T20211] perf_event_alloc+0xa60/0x1740 [ 2307.677524][T20211] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2307.683161][T20211] ? proc_fail_nth_write+0x127/0x150 [ 2307.688475][T20211] ? preempt_count_add+0x41/0x90 [ 2307.693460][T20211] __x64_sys_perf_event_open+0x63/0x70 [ 2307.698969][T20211] do_syscall_64+0x44/0xa0 [ 2307.703392][T20211] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2307.709422][T20211] RIP: 0033:0x7ff6e6d13ae9 [ 2307.713841][T20211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2307.733524][T20211] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2307.741936][T20211] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2307.749938][T20211] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2307.758024][T20211] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2307.766049][T20211] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2307.768874][T20213] loop1: detected capacity change from 0 to 4 [ 2307.774016][T20211] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2307.774036][T20211] 18:53:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 69) [ 2307.812431][T20213] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2307.845284][T20219] loop5: detected capacity change from 0 to 4 [ 2307.845641][T20220] loop4: detected capacity change from 0 to 264192 18:53:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2307.861863][T20213] loop1: detected capacity change from 0 to 4 [ 2307.868120][T20219] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2307.879458][T20213] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2307.890236][T20220] EXT4-fs (loop4): #blocks per group too big: 65028096 18:53:22 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f00000000000001a301000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2307.929983][T20219] loop5: detected capacity change from 0 to 4 [ 2307.936824][T20219] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2307.948770][T20220] loop4: detected capacity change from 0 to 264192 [ 2307.956991][T20220] EXT4-fs (loop4): #blocks per group too big: 65028096 18:53:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000006c40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004002040040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2308.063704][T20227] FAULT_INJECTION: forcing a failure. [ 2308.063704][T20227] name failslab, interval 1, probability 0, space 0, times 0 [ 2308.076455][T20227] CPU: 0 PID: 20227 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2308.084869][T20227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2308.095000][T20227] Call Trace: [ 2308.098276][T20227] [ 2308.101199][T20227] dump_stack_lvl+0xd6/0x122 [ 2308.105851][T20227] dump_stack+0x11/0x1b [ 2308.109997][T20227] should_fail+0x23c/0x250 [ 2308.114503][T20227] ? register_for_each_vma+0x372/0x890 [ 2308.119960][T20227] __should_failslab+0x81/0x90 [ 2308.124751][T20227] should_failslab+0x5/0x20 [ 2308.129257][T20227] kmem_cache_alloc_trace+0x52/0x350 [ 2308.134546][T20227] ? register_for_each_vma+0x372/0x890 [ 2308.140032][T20227] ? vma_interval_tree_iter_next+0x263/0x280 [ 2308.146059][T20227] register_for_each_vma+0x372/0x890 [ 2308.151443][T20227] __uprobe_register+0x392/0x8a0 [ 2308.156395][T20227] uprobe_register_refctr+0x29/0x40 [ 2308.161601][T20227] probe_event_enable+0x2be/0x7d0 [ 2308.166678][T20227] ? __uprobe_trace_func+0x440/0x440 [ 2308.171968][T20227] trace_uprobe_register+0x88/0x410 [ 2308.177168][T20227] perf_trace_event_init+0x34e/0x790 [ 2308.182460][T20227] perf_uprobe_init+0xf5/0x140 [ 2308.187272][T20227] perf_uprobe_event_init+0xde/0x140 [ 2308.192561][T20227] perf_try_init_event+0x21a/0x400 [ 2308.197675][T20227] perf_event_alloc+0xa60/0x1740 [ 2308.202695][T20227] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2308.208331][T20227] ? proc_fail_nth_write+0x127/0x150 [ 2308.213698][T20227] ? preempt_count_add+0x41/0x90 [ 2308.218714][T20227] __x64_sys_perf_event_open+0x63/0x70 [ 2308.224215][T20227] do_syscall_64+0x44/0xa0 [ 2308.228710][T20227] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2308.234602][T20227] RIP: 0033:0x7ff6e6d13ae9 [ 2308.239019][T20227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:22 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2308.258626][T20227] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2308.267180][T20227] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2308.275149][T20227] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2308.283118][T20227] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2308.291088][T20227] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2308.299100][T20227] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2308.307063][T20227] 18:53:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 70) [ 2308.355152][T20234] loop5: detected capacity change from 0 to 4 [ 2308.355156][T20233] loop1: detected capacity change from 0 to 4 [ 2308.372663][T20235] loop4: detected capacity change from 0 to 264192 [ 2308.381432][T20234] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2308.396373][T20233] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2308.405660][T20235] EXT4-fs (loop4): #blocks per group too big: 67256320 [ 2308.440560][T20234] loop5: detected capacity change from 0 to 4 18:53:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000007440000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2308.447348][T20234] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2308.469883][T20235] loop4: detected capacity change from 0 to 264192 [ 2308.472559][T20233] loop1: detected capacity change from 0 to 4 [ 2308.483651][T20235] EXT4-fs (loop4): #blocks per group too big: 67256320 [ 2308.483933][T20233] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2308.574590][T20241] FAULT_INJECTION: forcing a failure. [ 2308.574590][T20241] name failslab, interval 1, probability 0, space 0, times 0 [ 2308.587314][T20241] CPU: 1 PID: 20241 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2308.595743][T20241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2308.605828][T20241] Call Trace: [ 2308.609108][T20241] [ 2308.612099][T20241] dump_stack_lvl+0xd6/0x122 [ 2308.616691][T20241] dump_stack+0x11/0x1b [ 2308.620849][T20241] should_fail+0x23c/0x250 [ 2308.625335][T20241] ? register_for_each_vma+0x372/0x890 [ 2308.630800][T20241] __should_failslab+0x81/0x90 [ 2308.635571][T20241] should_failslab+0x5/0x20 [ 2308.640116][T20241] kmem_cache_alloc_trace+0x52/0x350 [ 2308.645417][T20241] ? register_for_each_vma+0x372/0x890 [ 2308.650941][T20241] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2308.657018][T20241] register_for_each_vma+0x372/0x890 [ 2308.662415][T20241] __uprobe_register+0x392/0x8a0 [ 2308.667538][T20241] uprobe_register_refctr+0x29/0x40 [ 2308.672763][T20241] probe_event_enable+0x2be/0x7d0 [ 2308.677798][T20241] ? __uprobe_trace_func+0x440/0x440 [ 2308.683160][T20241] trace_uprobe_register+0x88/0x410 [ 2308.688373][T20241] perf_trace_event_init+0x34e/0x790 [ 2308.693661][T20241] perf_uprobe_init+0xf5/0x140 [ 2308.698466][T20241] perf_uprobe_event_init+0xde/0x140 [ 2308.703816][T20241] perf_try_init_event+0x21a/0x400 [ 2308.708953][T20241] perf_event_alloc+0xa60/0x1740 [ 2308.713903][T20241] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2308.719591][T20241] ? proc_fail_nth_write+0x127/0x150 [ 2308.724887][T20241] ? preempt_count_add+0x41/0x90 [ 2308.729877][T20241] __x64_sys_perf_event_open+0x63/0x70 [ 2308.735337][T20241] do_syscall_64+0x44/0xa0 [ 2308.739880][T20241] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2308.745794][T20241] RIP: 0033:0x7ff6e6d13ae9 [ 2308.750296][T20241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:22 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:22 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004006040040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2308.770176][T20241] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2308.778597][T20241] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2308.786649][T20241] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2308.794653][T20241] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2308.802620][T20241] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2308.810733][T20241] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2308.818765][T20241] 18:53:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 71) [ 2308.931682][T20245] loop5: detected capacity change from 0 to 4 [ 2308.946216][T20245] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:23 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2308.979242][T20250] loop1: detected capacity change from 0 to 4 [ 2308.989374][T20250] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2308.989904][T20245] loop5: detected capacity change from 0 to 4 [ 2309.003776][T20253] loop4: detected capacity change from 0 to 264192 [ 2309.012235][T20245] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2309.025496][T20250] loop1: detected capacity change from 0 to 4 [ 2309.032698][T20250] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2309.049828][T20254] FAULT_INJECTION: forcing a failure. [ 2309.049828][T20254] name failslab, interval 1, probability 0, space 0, times 0 [ 2309.058719][T20253] EXT4-fs (loop4): #blocks per group too big: 67518464 [ 2309.062454][T20254] CPU: 0 PID: 20254 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2309.062477][T20254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2309.062486][T20254] Call Trace: [ 2309.091017][T20254] [ 2309.093947][T20254] dump_stack_lvl+0xd6/0x122 [ 2309.098535][T20254] dump_stack+0x11/0x1b [ 2309.102826][T20254] should_fail+0x23c/0x250 [ 2309.107244][T20254] ? register_for_each_vma+0x372/0x890 [ 2309.112699][T20254] __should_failslab+0x81/0x90 [ 2309.117465][T20254] should_failslab+0x5/0x20 [ 2309.121977][T20254] kmem_cache_alloc_trace+0x52/0x350 [ 2309.127309][T20254] ? register_for_each_vma+0x372/0x890 [ 2309.132959][T20254] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2309.139026][T20254] register_for_each_vma+0x372/0x890 [ 2309.144321][T20254] __uprobe_register+0x392/0x8a0 [ 2309.149286][T20254] uprobe_register_refctr+0x29/0x40 [ 2309.154465][T20254] probe_event_enable+0x2be/0x7d0 [ 2309.159528][T20254] ? __uprobe_trace_func+0x440/0x440 [ 2309.164866][T20254] trace_uprobe_register+0x88/0x410 [ 2309.170231][T20254] perf_trace_event_init+0x34e/0x790 [ 2309.175498][T20254] perf_uprobe_init+0xf5/0x140 [ 2309.180364][T20254] perf_uprobe_event_init+0xde/0x140 [ 2309.185651][T20254] perf_try_init_event+0x21a/0x400 [ 2309.190757][T20254] perf_event_alloc+0xa60/0x1740 [ 2309.195692][T20254] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2309.201309][T20254] ? proc_fail_nth_write+0x127/0x150 [ 2309.206612][T20254] ? preempt_count_add+0x41/0x90 [ 2309.211534][T20254] __x64_sys_perf_event_open+0x63/0x70 [ 2309.216979][T20254] do_syscall_64+0x44/0xa0 [ 2309.221409][T20254] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2309.227322][T20254] RIP: 0033:0x7ff6e6d13ae9 [ 2309.231731][T20254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2309.251446][T20254] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2309.259888][T20254] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2309.267935][T20254] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 18:53:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000007a40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:23 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 72) [ 2309.275998][T20254] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2309.284228][T20254] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2309.292178][T20254] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2309.300301][T20254] [ 2309.311725][T20253] loop4: detected capacity change from 0 to 264192 [ 2309.321224][T20253] EXT4-fs (loop4): #blocks per group too big: 67518464 18:53:23 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004010040040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2309.463125][T20262] loop5: detected capacity change from 0 to 4 [ 2309.488538][T20262] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2309.510485][T20267] FAULT_INJECTION: forcing a failure. [ 2309.510485][T20267] name failslab, interval 1, probability 0, space 0, times 0 [ 2309.523231][T20267] CPU: 1 PID: 20267 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2309.531714][T20267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2309.541789][T20267] Call Trace: [ 2309.545176][T20267] [ 2309.548112][T20267] dump_stack_lvl+0xd6/0x122 [ 2309.552703][T20267] dump_stack+0x11/0x1b [ 2309.556864][T20267] should_fail+0x23c/0x250 [ 2309.561411][T20267] ? register_for_each_vma+0x372/0x890 [ 2309.566886][T20267] __should_failslab+0x81/0x90 [ 2309.571862][T20267] should_failslab+0x5/0x20 [ 2309.576377][T20267] kmem_cache_alloc_trace+0x52/0x350 [ 2309.581673][T20267] ? register_for_each_vma+0x372/0x890 [ 2309.587344][T20267] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2309.593357][T20267] register_for_each_vma+0x372/0x890 [ 2309.598756][T20267] __uprobe_register+0x392/0x8a0 [ 2309.603713][T20267] uprobe_register_refctr+0x29/0x40 [ 2309.608962][T20267] probe_event_enable+0x2be/0x7d0 [ 2309.614037][T20267] ? __uprobe_trace_func+0x440/0x440 [ 2309.619333][T20267] trace_uprobe_register+0x88/0x410 [ 2309.624639][T20267] perf_trace_event_init+0x34e/0x790 [ 2309.629962][T20267] perf_uprobe_init+0xf5/0x140 [ 2309.634728][T20267] perf_uprobe_event_init+0xde/0x140 [ 2309.640161][T20267] perf_try_init_event+0x21a/0x400 [ 2309.645413][T20267] perf_event_alloc+0xa60/0x1740 [ 2309.650363][T20267] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2309.656003][T20267] ? proc_fail_nth_write+0x127/0x150 [ 2309.661293][T20267] ? preempt_count_add+0x41/0x90 [ 2309.666341][T20267] __x64_sys_perf_event_open+0x63/0x70 [ 2309.671915][T20267] do_syscall_64+0x44/0xa0 [ 2309.676450][T20267] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2309.682349][T20267] RIP: 0033:0x7ff6e6d13ae9 [ 2309.686804][T20267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2309.706520][T20267] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2309.715008][T20267] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2309.722980][T20267] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2309.730983][T20267] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2309.739000][T20267] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2309.746974][T20267] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2309.755223][T20267] 18:53:23 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2309.765521][T20269] loop1: detected capacity change from 0 to 4 [ 2309.775743][T20262] loop5: detected capacity change from 0 to 4 [ 2309.797747][T20269] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2309.797816][T20262] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 73) 18:53:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f00000000000000010000000100000000400000fe40000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:23 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000fffe01000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2309.828140][T20271] loop4: detected capacity change from 0 to 264192 [ 2309.839922][T20269] loop1: detected capacity change from 0 to 4 [ 2309.847577][T20269] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2309.864081][T20271] EXT4-fs (loop4): #blocks per group too big: 68173824 [ 2309.909931][T20271] loop4: detected capacity change from 0 to 264192 [ 2309.919426][T20271] EXT4-fs (loop4): #blocks per group too big: 68173824 18:53:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000050040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2309.976274][T20278] FAULT_INJECTION: forcing a failure. [ 2309.976274][T20278] name failslab, interval 1, probability 0, space 0, times 0 [ 2309.988967][T20278] CPU: 1 PID: 20278 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2309.997387][T20278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2310.007506][T20278] Call Trace: [ 2310.010784][T20278] [ 2310.013706][T20278] dump_stack_lvl+0xd6/0x122 [ 2310.018338][T20278] dump_stack+0x11/0x1b [ 2310.022487][T20278] should_fail+0x23c/0x250 [ 2310.026903][T20278] ? register_for_each_vma+0x372/0x890 [ 2310.032363][T20278] __should_failslab+0x81/0x90 [ 2310.037158][T20278] should_failslab+0x5/0x20 [ 2310.041662][T20278] kmem_cache_alloc_trace+0x52/0x350 [ 2310.046951][T20278] ? register_for_each_vma+0x372/0x890 [ 2310.052456][T20278] ? vma_interval_tree_iter_next+0x263/0x280 [ 2310.058479][T20278] register_for_each_vma+0x372/0x890 [ 2310.063842][T20278] __uprobe_register+0x392/0x8a0 [ 2310.068782][T20278] uprobe_register_refctr+0x29/0x40 [ 2310.073979][T20278] probe_event_enable+0x2be/0x7d0 [ 2310.079002][T20278] ? __uprobe_trace_func+0x440/0x440 [ 2310.084297][T20278] trace_uprobe_register+0x88/0x410 [ 2310.089555][T20278] perf_trace_event_init+0x34e/0x790 [ 2310.094838][T20278] perf_uprobe_init+0xf5/0x140 [ 2310.099602][T20278] perf_uprobe_event_init+0xde/0x140 [ 2310.104888][T20278] perf_try_init_event+0x21a/0x400 [ 2310.110001][T20278] perf_event_alloc+0xa60/0x1740 [ 2310.114960][T20278] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2310.120605][T20278] ? proc_fail_nth_write+0x127/0x150 [ 2310.125895][T20278] ? preempt_count_add+0x41/0x90 [ 2310.130887][T20278] __x64_sys_perf_event_open+0x63/0x70 [ 2310.136353][T20278] do_syscall_64+0x44/0xa0 [ 2310.140803][T20278] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2310.146710][T20278] RIP: 0033:0x7ff6e6d13ae9 [ 2310.151121][T20278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2310.170762][T20278] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2310.179249][T20278] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2310.187231][T20278] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2310.195270][T20278] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2310.203264][T20278] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2310.211257][T20278] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2310.219224][T20278] 18:53:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 74) [ 2310.365166][T20281] loop5: detected capacity change from 0 to 4 [ 2310.371749][T20282] loop1: detected capacity change from 0 to 4 [ 2310.394959][T20282] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2310.404206][T20281] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2310.449642][T20282] loop1: detected capacity change from 0 to 4 [ 2310.457356][T20282] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2310.467212][T20281] loop5: detected capacity change from 0 to 4 [ 2310.476114][T20281] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2310.500136][T20290] FAULT_INJECTION: forcing a failure. [ 2310.500136][T20290] name failslab, interval 1, probability 0, space 0, times 0 [ 2310.512794][T20290] CPU: 0 PID: 20290 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2310.521208][T20290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2310.531252][T20290] Call Trace: [ 2310.534522][T20290] [ 2310.537441][T20290] dump_stack_lvl+0xd6/0x122 [ 2310.542102][T20290] dump_stack+0x11/0x1b [ 2310.546323][T20290] should_fail+0x23c/0x250 [ 2310.550755][T20290] ? register_for_each_vma+0x372/0x890 [ 2310.556238][T20290] __should_failslab+0x81/0x90 [ 2310.561105][T20290] should_failslab+0x5/0x20 [ 2310.565614][T20290] kmem_cache_alloc_trace+0x52/0x350 [ 2310.569330][T20291] loop4: detected capacity change from 0 to 264192 [ 2310.570902][T20290] ? register_for_each_vma+0x372/0x890 [ 2310.581572][T20291] EXT4-fs (loop4): #blocks per group too big: 83902464 [ 2310.582847][T20290] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2310.595668][T20290] register_for_each_vma+0x372/0x890 [ 2310.601125][T20290] __uprobe_register+0x392/0x8a0 [ 2310.606065][T20290] uprobe_register_refctr+0x29/0x40 [ 2310.611294][T20290] probe_event_enable+0x2be/0x7d0 [ 2310.616316][T20290] ? __uprobe_trace_func+0x440/0x440 [ 2310.621600][T20290] trace_uprobe_register+0x88/0x410 [ 2310.626841][T20290] perf_trace_event_init+0x34e/0x790 [ 2310.632146][T20290] perf_uprobe_init+0xf5/0x140 [ 2310.636909][T20290] perf_uprobe_event_init+0xde/0x140 [ 2310.642188][T20290] perf_try_init_event+0x21a/0x400 [ 2310.647296][T20290] perf_event_alloc+0xa60/0x1740 [ 2310.652302][T20290] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2310.657953][T20290] ? proc_fail_nth_write+0x127/0x150 [ 2310.663332][T20290] ? preempt_count_add+0x41/0x90 [ 2310.668333][T20290] __x64_sys_perf_event_open+0x63/0x70 [ 2310.673855][T20290] do_syscall_64+0x44/0xa0 [ 2310.678402][T20290] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2310.684321][T20290] RIP: 0033:0x7ff6e6d13ae9 [ 2310.688739][T20290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2310.708390][T20290] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2310.716878][T20290] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2310.724879][T20290] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2310.732843][T20290] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2310.740812][T20290] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 18:53:24 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000009000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2310.748867][T20290] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2310.756897][T20290] 18:53:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 75) [ 2310.796522][T20291] loop4: detected capacity change from 0 to 264192 [ 2310.804291][T20291] EXT4-fs (loop4): #blocks per group too big: 83902464 18:53:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000060040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2310.919243][T20299] loop1: detected capacity change from 0 to 4 [ 2310.929365][T20300] loop5: detected capacity change from 0 to 4 [ 2310.942778][T20299] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2310.955085][T20300] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2310.980054][T20299] loop1: detected capacity change from 0 to 4 [ 2310.986793][T20299] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2310.996817][T20300] loop5: detected capacity change from 0 to 4 [ 2311.004120][T20302] FAULT_INJECTION: forcing a failure. [ 2311.004120][T20302] name failslab, interval 1, probability 0, space 0, times 0 [ 2311.016816][T20302] CPU: 0 PID: 20302 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2311.025277][T20302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2311.035332][T20302] Call Trace: [ 2311.038607][T20302] [ 2311.041531][T20302] dump_stack_lvl+0xd6/0x122 [ 2311.046125][T20302] dump_stack+0x11/0x1b [ 2311.050277][T20302] should_fail+0x23c/0x250 [ 2311.054827][T20302] ? register_for_each_vma+0x372/0x890 [ 2311.060378][T20302] __should_failslab+0x81/0x90 [ 2311.065150][T20302] should_failslab+0x5/0x20 [ 2311.069713][T20302] kmem_cache_alloc_trace+0x52/0x350 [ 2311.074993][T20302] ? register_for_each_vma+0x372/0x890 [ 2311.080542][T20302] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2311.086599][T20302] register_for_each_vma+0x372/0x890 [ 2311.091898][T20302] __uprobe_register+0x392/0x8a0 [ 2311.096836][T20302] uprobe_register_refctr+0x29/0x40 [ 2311.102433][T20302] probe_event_enable+0x2be/0x7d0 [ 2311.107457][T20302] ? __uprobe_trace_func+0x440/0x440 [ 2311.112736][T20302] trace_uprobe_register+0x88/0x410 [ 2311.117926][T20302] perf_trace_event_init+0x34e/0x790 [ 2311.123496][T20302] perf_uprobe_init+0xf5/0x140 [ 2311.128250][T20302] perf_uprobe_event_init+0xde/0x140 [ 2311.133708][T20302] perf_try_init_event+0x21a/0x400 [ 2311.138822][T20302] perf_event_alloc+0xa60/0x1740 [ 2311.143756][T20302] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2311.149379][T20302] ? proc_fail_nth_write+0x127/0x150 [ 2311.154712][T20302] ? preempt_count_add+0x41/0x90 [ 2311.159647][T20302] __x64_sys_perf_event_open+0x63/0x70 [ 2311.165104][T20302] do_syscall_64+0x44/0xa0 [ 2311.169537][T20302] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2311.175461][T20302] RIP: 0033:0x7ff6e6d13ae9 [ 2311.179935][T20302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2311.199525][T20302] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2311.207971][T20302] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2311.215925][T20302] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 18:53:25 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2311.223906][T20302] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2311.231946][T20302] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2311.239899][T20302] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2311.247870][T20302] [ 2311.266990][T20300] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 76) [ 2311.298690][T20307] loop4: detected capacity change from 0 to 264192 18:53:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f00000000000000010000000100000000400000001c000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2311.344985][T20307] EXT4-fs (loop4): #blocks per group too big: 100679680 [ 2311.375755][T20311] loop1: detected capacity change from 0 to 4 [ 2311.389905][T20311] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2311.399849][T20307] loop4: detected capacity change from 0 to 264192 [ 2311.407211][T20307] EXT4-fs (loop4): #blocks per group too big: 100679680 18:53:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004004060040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2311.445514][T20311] loop1: detected capacity change from 0 to 4 [ 2311.453478][T20311] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2311.485696][T20315] FAULT_INJECTION: forcing a failure. [ 2311.485696][T20315] name failslab, interval 1, probability 0, space 0, times 0 [ 2311.498339][T20315] CPU: 0 PID: 20315 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2311.506772][T20315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2311.517070][T20315] Call Trace: [ 2311.520342][T20315] [ 2311.523299][T20315] dump_stack_lvl+0xd6/0x122 [ 2311.527921][T20315] dump_stack+0x11/0x1b [ 2311.532163][T20315] should_fail+0x23c/0x250 [ 2311.536585][T20315] ? register_for_each_vma+0x372/0x890 [ 2311.542047][T20315] __should_failslab+0x81/0x90 [ 2311.546840][T20315] should_failslab+0x5/0x20 [ 2311.551342][T20315] kmem_cache_alloc_trace+0x52/0x350 [ 2311.556726][T20315] ? register_for_each_vma+0x372/0x890 [ 2311.562219][T20315] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2311.568245][T20315] register_for_each_vma+0x372/0x890 [ 2311.573538][T20315] __uprobe_register+0x392/0x8a0 [ 2311.578538][T20315] uprobe_register_refctr+0x29/0x40 [ 2311.583787][T20315] probe_event_enable+0x2be/0x7d0 [ 2311.588863][T20315] ? __uprobe_trace_func+0x440/0x440 [ 2311.594150][T20315] trace_uprobe_register+0x88/0x410 [ 2311.599395][T20315] perf_trace_event_init+0x34e/0x790 [ 2311.604737][T20315] perf_uprobe_init+0xf5/0x140 [ 2311.609494][T20315] perf_uprobe_event_init+0xde/0x140 [ 2311.614789][T20315] perf_try_init_event+0x21a/0x400 [ 2311.619920][T20315] perf_event_alloc+0xa60/0x1740 [ 2311.624849][T20315] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2311.630465][T20315] ? proc_fail_nth_write+0x127/0x150 [ 2311.635733][T20315] ? preempt_count_add+0x41/0x90 [ 2311.640876][T20315] __x64_sys_perf_event_open+0x63/0x70 [ 2311.646362][T20315] do_syscall_64+0x44/0xa0 [ 2311.650766][T20315] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2311.656689][T20315] RIP: 0033:0x7ff6e6d13ae9 [ 2311.661086][T20315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2311.680765][T20315] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2311.689193][T20315] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2311.697163][T20315] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2311.705153][T20315] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2311.713119][T20315] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2311.721128][T20315] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2311.729086][T20315] 18:53:25 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 77) [ 2311.751592][T20320] loop4: detected capacity change from 0 to 264192 [ 2311.771997][T20320] EXT4-fs (loop4): #blocks per group too big: 100941824 [ 2311.784916][T20322] loop5: detected capacity change from 0 to 4 [ 2311.820559][T20320] loop4: detected capacity change from 0 to 264192 [ 2311.827594][T20320] EXT4-fs (loop4): #blocks per group too big: 100941824 [ 2311.836230][T20322] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000406f060040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2311.862355][T20322] loop5: detected capacity change from 0 to 4 [ 2311.877077][T20322] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000025000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2311.921937][T20324] loop1: detected capacity change from 0 to 4 [ 2311.932910][T20324] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2311.977141][T20331] FAULT_INJECTION: forcing a failure. [ 2311.977141][T20331] name failslab, interval 1, probability 0, space 0, times 0 [ 2311.989809][T20331] CPU: 0 PID: 20331 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2311.998242][T20331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2312.008293][T20331] Call Trace: [ 2312.011652][T20331] [ 2312.014576][T20331] dump_stack_lvl+0xd6/0x122 [ 2312.019206][T20331] dump_stack+0x11/0x1b [ 2312.023350][T20331] should_fail+0x23c/0x250 [ 2312.027768][T20331] ? register_for_each_vma+0x372/0x890 [ 2312.033230][T20331] __should_failslab+0x81/0x90 [ 2312.038076][T20331] should_failslab+0x5/0x20 [ 2312.042656][T20331] kmem_cache_alloc_trace+0x52/0x350 [ 2312.047982][T20331] ? register_for_each_vma+0x372/0x890 [ 2312.053441][T20331] ? vma_interval_tree_iter_next+0x263/0x280 [ 2312.059437][T20331] register_for_each_vma+0x372/0x890 [ 2312.064791][T20331] __uprobe_register+0x392/0x8a0 [ 2312.069738][T20331] uprobe_register_refctr+0x29/0x40 [ 2312.074997][T20331] probe_event_enable+0x2be/0x7d0 [ 2312.080025][T20331] ? __uprobe_trace_func+0x440/0x440 [ 2312.085363][T20331] trace_uprobe_register+0x88/0x410 [ 2312.090559][T20331] perf_trace_event_init+0x34e/0x790 [ 2312.095882][T20331] perf_uprobe_init+0xf5/0x140 [ 2312.100642][T20331] perf_uprobe_event_init+0xde/0x140 [ 2312.105924][T20331] perf_try_init_event+0x21a/0x400 [ 2312.111046][T20331] perf_event_alloc+0xa60/0x1740 [ 2312.115990][T20331] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2312.121626][T20331] ? proc_fail_nth_write+0x127/0x150 [ 2312.126963][T20331] ? preempt_count_add+0x41/0x90 [ 2312.131904][T20331] __x64_sys_perf_event_open+0x63/0x70 [ 2312.137408][T20331] do_syscall_64+0x44/0xa0 [ 2312.141885][T20331] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2312.147881][T20331] RIP: 0033:0x7ff6e6d13ae9 [ 2312.152320][T20331] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.171980][T20331] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2312.180456][T20331] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2312.188584][T20331] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2312.196545][T20331] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2312.204505][T20331] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2312.212459][T20331] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2312.220417][T20331] 18:53:26 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 78) [ 2312.229441][T20324] loop1: detected capacity change from 0 to 4 [ 2312.235857][T20324] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:26 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2312.289978][T20333] loop4: detected capacity change from 0 to 264192 [ 2312.308436][T20333] EXT4-fs (loop4): #blocks per group too big: 107954176 18:53:26 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000070040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2312.347792][T20335] loop5: detected capacity change from 0 to 4 [ 2312.355175][T20333] loop4: detected capacity change from 0 to 264192 [ 2312.362836][T20333] EXT4-fs (loop4): #blocks per group too big: 107954176 [ 2312.376072][T20335] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2312.423630][T20342] FAULT_INJECTION: forcing a failure. [ 2312.423630][T20342] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.436308][T20342] CPU: 0 PID: 20342 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2312.444718][T20342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2312.454775][T20342] Call Trace: [ 2312.458050][T20342] [ 2312.461013][T20342] dump_stack_lvl+0xd6/0x122 [ 2312.465604][T20342] dump_stack+0x11/0x1b [ 2312.469749][T20342] should_fail+0x23c/0x250 [ 2312.474217][T20342] ? register_for_each_vma+0x372/0x890 [ 2312.479728][T20342] __should_failslab+0x81/0x90 [ 2312.484589][T20342] should_failslab+0x5/0x20 [ 2312.489107][T20342] kmem_cache_alloc_trace+0x52/0x350 [ 2312.494445][T20342] ? register_for_each_vma+0x372/0x890 [ 2312.499993][T20342] ? vma_interval_tree_iter_next+0x263/0x280 [ 2312.505969][T20342] register_for_each_vma+0x372/0x890 [ 2312.511313][T20342] __uprobe_register+0x392/0x8a0 [ 2312.516253][T20342] uprobe_register_refctr+0x29/0x40 [ 2312.521520][T20342] probe_event_enable+0x2be/0x7d0 [ 2312.526561][T20342] ? __uprobe_trace_func+0x440/0x440 [ 2312.531852][T20342] trace_uprobe_register+0x88/0x410 [ 2312.537150][T20342] perf_trace_event_init+0x34e/0x790 [ 2312.542511][T20342] perf_uprobe_init+0xf5/0x140 [ 2312.547283][T20342] perf_uprobe_event_init+0xde/0x140 [ 2312.552585][T20342] perf_try_init_event+0x21a/0x400 [ 2312.557738][T20342] perf_event_alloc+0xa60/0x1740 [ 2312.562683][T20342] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2312.568324][T20342] ? proc_fail_nth_write+0x127/0x150 [ 2312.573656][T20342] ? preempt_count_add+0x41/0x90 [ 2312.578608][T20342] __x64_sys_perf_event_open+0x63/0x70 [ 2312.584075][T20342] do_syscall_64+0x44/0xa0 [ 2312.588761][T20342] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2312.594802][T20342] RIP: 0033:0x7ff6e6d13ae9 [ 2312.599219][T20342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.618891][T20342] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2312.627304][T20342] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2312.635269][T20342] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2312.643235][T20342] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2312.651266][T20342] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2312.659231][T20342] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2312.667201][T20342] 18:53:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 79) [ 2312.685669][T20335] loop5: detected capacity change from 0 to 4 [ 2312.703018][T20335] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:26 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000000200020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2312.737817][T20346] loop1: detected capacity change from 0 to 4 [ 2312.749646][T20349] loop4: detected capacity change from 0 to 264192 [ 2312.755974][T20346] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2312.773682][T20349] EXT4-fs (loop4): #blocks per group too big: 117456896 18:53:26 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f0000000000000000001f0000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2312.789708][T20346] loop1: detected capacity change from 0 to 4 [ 2312.796299][T20346] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2312.820652][T20349] loop4: detected capacity change from 0 to 264192 [ 2312.828107][T20349] EXT4-fs (loop4): #blocks per group too big: 117456896 18:53:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2312.903300][T20355] FAULT_INJECTION: forcing a failure. [ 2312.903300][T20355] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.916031][T20355] CPU: 0 PID: 20355 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2312.924457][T20355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2312.934511][T20355] Call Trace: [ 2312.937841][T20355] [ 2312.940773][T20355] dump_stack_lvl+0xd6/0x122 [ 2312.945492][T20355] dump_stack+0x11/0x1b [ 2312.949640][T20355] should_fail+0x23c/0x250 [ 2312.954083][T20355] ? register_for_each_vma+0x372/0x890 [ 2312.959543][T20355] __should_failslab+0x81/0x90 [ 2312.964402][T20355] should_failslab+0x5/0x20 [ 2312.968907][T20355] kmem_cache_alloc_trace+0x52/0x350 [ 2312.974267][T20355] ? register_for_each_vma+0x372/0x890 [ 2312.979770][T20355] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2312.985746][T20355] register_for_each_vma+0x372/0x890 [ 2312.991124][T20355] __uprobe_register+0x392/0x8a0 [ 2312.996059][T20355] uprobe_register_refctr+0x29/0x40 [ 2313.001326][T20355] probe_event_enable+0x2be/0x7d0 [ 2313.006347][T20355] ? __uprobe_trace_func+0x440/0x440 [ 2313.011624][T20355] trace_uprobe_register+0x88/0x410 [ 2313.016924][T20355] perf_trace_event_init+0x34e/0x790 [ 2313.022206][T20355] perf_uprobe_init+0xf5/0x140 [ 2313.026962][T20355] perf_uprobe_event_init+0xde/0x140 [ 2313.032244][T20355] perf_try_init_event+0x21a/0x400 [ 2313.037377][T20355] perf_event_alloc+0xa60/0x1740 [ 2313.042407][T20355] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2313.048110][T20355] ? proc_fail_nth_write+0x127/0x150 [ 2313.053471][T20355] ? preempt_count_add+0x41/0x90 [ 2313.058412][T20355] __x64_sys_perf_event_open+0x63/0x70 [ 2313.063935][T20355] do_syscall_64+0x44/0xa0 [ 2313.068356][T20355] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2313.074402][T20355] RIP: 0033:0x7ff6e6d13ae9 [ 2313.078838][T20355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000090040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2313.098494][T20355] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2313.106934][T20355] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2313.114901][T20355] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2313.122867][T20355] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2313.130841][T20355] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2313.138832][T20355] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2313.146801][T20355] 18:53:27 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 80) [ 2313.178177][T20358] loop5: detected capacity change from 0 to 4 [ 2313.197291][T20358] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2313.229940][T20358] loop5: detected capacity change from 0 to 4 [ 2313.236667][T20358] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2313.256504][T20361] loop1: detected capacity change from 0 to 4 18:53:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040020020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2313.276193][T20361] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2313.300289][T20361] loop1: detected capacity change from 0 to 4 [ 2313.315912][T20361] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2313.328548][T20366] loop4: detected capacity change from 0 to 264192 [ 2313.342652][T20366] EXT4-fs (loop4): #blocks per group too big: 151011328 [ 2313.350341][T20368] FAULT_INJECTION: forcing a failure. [ 2313.350341][T20368] name failslab, interval 1, probability 0, space 0, times 0 [ 2313.363004][T20368] CPU: 0 PID: 20368 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2313.371422][T20368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2313.381541][T20368] Call Trace: [ 2313.384988][T20368] [ 2313.387916][T20368] dump_stack_lvl+0xd6/0x122 [ 2313.392549][T20368] dump_stack+0x11/0x1b [ 2313.396784][T20368] should_fail+0x23c/0x250 [ 2313.401227][T20368] ? register_for_each_vma+0x372/0x890 [ 2313.406703][T20368] __should_failslab+0x81/0x90 [ 2313.411471][T20368] should_failslab+0x5/0x20 [ 2313.416080][T20368] kmem_cache_alloc_trace+0x52/0x350 [ 2313.421371][T20368] ? register_for_each_vma+0x372/0x890 [ 2313.426899][T20368] ? vma_interval_tree_iter_next+0x263/0x280 [ 2313.432897][T20368] register_for_each_vma+0x372/0x890 [ 2313.438277][T20368] __uprobe_register+0x392/0x8a0 [ 2313.443312][T20368] uprobe_register_refctr+0x29/0x40 [ 2313.448551][T20368] probe_event_enable+0x2be/0x7d0 [ 2313.453585][T20368] ? __uprobe_trace_func+0x440/0x440 [ 2313.458868][T20368] trace_uprobe_register+0x88/0x410 [ 2313.464126][T20368] perf_trace_event_init+0x34e/0x790 [ 2313.469409][T20368] perf_uprobe_init+0xf5/0x140 [ 2313.474173][T20368] perf_uprobe_event_init+0xde/0x140 [ 2313.479454][T20368] perf_try_init_event+0x21a/0x400 [ 2313.484643][T20368] perf_event_alloc+0xa60/0x1740 [ 2313.489586][T20368] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2313.495287][T20368] ? proc_fail_nth_write+0x127/0x150 [ 2313.500744][T20368] ? preempt_count_add+0x41/0x90 [ 2313.505824][T20368] __x64_sys_perf_event_open+0x63/0x70 [ 2313.511289][T20368] do_syscall_64+0x44/0xa0 [ 2313.515725][T20368] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2313.521727][T20368] RIP: 0033:0x7ff6e6d13ae9 [ 2313.526136][T20368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2313.545947][T20368] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2313.554400][T20368] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2313.562372][T20368] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2313.570358][T20368] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 18:53:27 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:27 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2313.578362][T20368] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2313.586352][T20368] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2313.594324][T20368] [ 2313.612658][T20366] loop4: detected capacity change from 0 to 264192 [ 2313.622056][T20366] EXT4-fs (loop4): #blocks per group too big: 151011328 18:53:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 81) [ 2313.645082][T20373] loop5: detected capacity change from 0 to 4 18:53:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040000a0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2313.685820][T20373] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2313.720195][T20373] loop5: detected capacity change from 0 to 4 [ 2313.727932][T20373] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:27 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040030020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2313.770603][T20376] loop1: detected capacity change from 0 to 4 [ 2313.794341][T20376] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 2313.803459][T20376] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2313.868715][T20382] FAULT_INJECTION: forcing a failure. [ 2313.868715][T20382] name failslab, interval 1, probability 0, space 0, times 0 [ 2313.869557][T20376] loop1: detected capacity change from 0 to 4 [ 2313.881405][T20382] CPU: 0 PID: 20382 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2313.889127][T20376] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 2313.895830][T20382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2313.895845][T20382] Call Trace: [ 2313.895852][T20382] [ 2313.895858][T20382] dump_stack_lvl+0xd6/0x122 [ 2313.904886][T20376] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2313.914903][T20382] dump_stack+0x11/0x1b [ 2313.914930][T20382] should_fail+0x23c/0x250 [ 2313.942325][T20384] loop4: detected capacity change from 0 to 264192 [ 2313.942881][T20382] ? register_for_each_vma+0x372/0x890 [ 2313.942909][T20382] __should_failslab+0x81/0x90 [ 2313.959506][T20384] EXT4-fs (loop4): #blocks per group too big: 167788544 [ 2313.959733][T20382] should_failslab+0x5/0x20 [ 2313.959758][T20382] kmem_cache_alloc_trace+0x52/0x350 [ 2313.976491][T20382] ? register_for_each_vma+0x372/0x890 [ 2313.981949][T20382] ? vma_interval_tree_iter_next+0x263/0x280 [ 2313.987930][T20382] register_for_each_vma+0x372/0x890 [ 2313.993224][T20382] __uprobe_register+0x392/0x8a0 [ 2313.998164][T20382] uprobe_register_refctr+0x29/0x40 [ 2314.003393][T20382] probe_event_enable+0x2be/0x7d0 [ 2314.008439][T20382] ? __uprobe_trace_func+0x440/0x440 [ 2314.013750][T20382] trace_uprobe_register+0x88/0x410 [ 2314.018930][T20382] perf_trace_event_init+0x34e/0x790 [ 2314.024239][T20382] perf_uprobe_init+0xf5/0x140 [ 2314.029049][T20382] perf_uprobe_event_init+0xde/0x140 [ 2314.034325][T20382] perf_try_init_event+0x21a/0x400 [ 2314.039415][T20382] perf_event_alloc+0xa60/0x1740 [ 2314.044420][T20382] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2314.050083][T20382] ? proc_fail_nth_write+0x127/0x150 [ 2314.055364][T20382] ? preempt_count_add+0x41/0x90 [ 2314.060328][T20382] __x64_sys_perf_event_open+0x63/0x70 [ 2314.065768][T20382] do_syscall_64+0x44/0xa0 [ 2314.070232][T20382] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2314.076175][T20382] RIP: 0033:0x7ff6e6d13ae9 [ 2314.080627][T20382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2314.100239][T20382] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2314.108690][T20382] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 18:53:28 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2314.116709][T20382] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2314.124665][T20382] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2314.132626][T20382] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2314.140664][T20382] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2314.148635][T20382] 18:53:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 82) 18:53:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2314.181459][T20384] loop4: detected capacity change from 0 to 264192 [ 2314.193743][T20384] EXT4-fs (loop4): #blocks per group too big: 167788544 [ 2314.213891][T20388] loop5: detected capacity change from 0 to 4 18:53:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040000b0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2314.231745][T20388] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2314.290654][T20388] loop5: detected capacity change from 0 to 4 [ 2314.297164][T20388] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2314.352337][T20394] FAULT_INJECTION: forcing a failure. [ 2314.352337][T20394] name failslab, interval 1, probability 0, space 0, times 0 [ 2314.364995][T20394] CPU: 0 PID: 20394 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2314.373408][T20394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2314.383538][T20394] Call Trace: [ 2314.386834][T20394] [ 2314.389787][T20394] dump_stack_lvl+0xd6/0x122 [ 2314.394374][T20394] dump_stack+0x11/0x1b [ 2314.398525][T20394] should_fail+0x23c/0x250 [ 2314.403035][T20394] ? register_for_each_vma+0x372/0x890 [ 2314.408487][T20394] __should_failslab+0x81/0x90 [ 2314.413340][T20394] should_failslab+0x5/0x20 [ 2314.417867][T20394] kmem_cache_alloc_trace+0x52/0x350 [ 2314.423186][T20394] ? register_for_each_vma+0x372/0x890 [ 2314.428643][T20394] ? vma_interval_tree_iter_next+0x263/0x280 [ 2314.434609][T20394] register_for_each_vma+0x372/0x890 [ 2314.439916][T20394] __uprobe_register+0x392/0x8a0 [ 2314.444842][T20394] uprobe_register_refctr+0x29/0x40 [ 2314.450038][T20394] probe_event_enable+0x2be/0x7d0 [ 2314.455067][T20394] ? __uprobe_trace_func+0x440/0x440 [ 2314.460338][T20394] trace_uprobe_register+0x88/0x410 [ 2314.465534][T20394] perf_trace_event_init+0x34e/0x790 [ 2314.470871][T20394] perf_uprobe_init+0xf5/0x140 [ 2314.475680][T20394] perf_uprobe_event_init+0xde/0x140 [ 2314.480955][T20394] perf_try_init_event+0x21a/0x400 [ 2314.486050][T20394] perf_event_alloc+0xa60/0x1740 [ 2314.491062][T20394] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2314.496686][T20394] ? proc_fail_nth_write+0x127/0x150 [ 2314.501956][T20394] ? preempt_count_add+0x41/0x90 [ 2314.506893][T20394] __x64_sys_perf_event_open+0x63/0x70 [ 2314.512406][T20394] do_syscall_64+0x44/0xa0 [ 2314.516855][T20394] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2314.522976][T20394] RIP: 0033:0x7ff6e6d13ae9 [ 2314.527376][T20394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2314.547067][T20394] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2314.555500][T20394] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2314.563471][T20394] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2314.571430][T20394] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2314.579388][T20394] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2314.587355][T20394] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2314.595407][T20394] 18:53:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040040020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 83) [ 2314.604606][T20395] loop1: detected capacity change from 0 to 4 [ 2314.616464][T20395] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 2314.625549][T20395] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2314.676706][T20400] loop4: detected capacity change from 0 to 264192 [ 2314.699871][T20400] EXT4-fs (loop4): #blocks per group too big: 184565760 [ 2314.710992][T20395] loop1: detected capacity change from 0 to 4 [ 2314.718770][T20395] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 2314.727890][T20395] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2314.741028][T20400] loop4: detected capacity change from 0 to 264192 [ 2314.748037][T20400] EXT4-fs (loop4): #blocks per group too big: 184565760 18:53:28 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040000c0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2314.818153][T20403] loop5: detected capacity change from 0 to 4 [ 2314.836572][T20403] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2314.857500][T20405] FAULT_INJECTION: forcing a failure. [ 2314.857500][T20405] name failslab, interval 1, probability 0, space 0, times 0 [ 2314.870187][T20405] CPU: 1 PID: 20405 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2314.878611][T20405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2314.888786][T20405] Call Trace: [ 2314.892057][T20405] [ 2314.894978][T20405] dump_stack_lvl+0xd6/0x122 [ 2314.899565][T20405] dump_stack+0x11/0x1b [ 2314.903814][T20405] should_fail+0x23c/0x250 [ 2314.908230][T20405] ? register_for_each_vma+0x372/0x890 [ 2314.913715][T20405] __should_failslab+0x81/0x90 [ 2314.918502][T20405] should_failslab+0x5/0x20 [ 2314.923069][T20405] kmem_cache_alloc_trace+0x52/0x350 [ 2314.928374][T20405] ? register_for_each_vma+0x372/0x890 [ 2314.933835][T20405] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2314.939826][T20405] register_for_each_vma+0x372/0x890 [ 2314.945142][T20405] __uprobe_register+0x392/0x8a0 [ 2314.950086][T20405] uprobe_register_refctr+0x29/0x40 [ 2314.955317][T20405] probe_event_enable+0x2be/0x7d0 [ 2314.960340][T20405] ? __uprobe_trace_func+0x440/0x440 [ 2314.965708][T20405] trace_uprobe_register+0x88/0x410 [ 2314.970912][T20405] perf_trace_event_init+0x34e/0x790 [ 2314.976189][T20405] perf_uprobe_init+0xf5/0x140 [ 2314.980957][T20405] perf_uprobe_event_init+0xde/0x140 [ 2314.986236][T20405] perf_try_init_event+0x21a/0x400 [ 2314.991400][T20405] perf_event_alloc+0xa60/0x1740 [ 2314.996394][T20405] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2315.002048][T20405] ? proc_fail_nth_write+0x127/0x150 [ 2315.007334][T20405] ? preempt_count_add+0x41/0x90 [ 2315.012274][T20405] __x64_sys_perf_event_open+0x63/0x70 [ 2315.017735][T20405] do_syscall_64+0x44/0xa0 [ 2315.022207][T20405] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2315.028150][T20405] RIP: 0033:0x7ff6e6d13ae9 [ 2315.032631][T20405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2315.052312][T20405] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2315.060720][T20405] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2315.068689][T20405] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2315.076717][T20405] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2315.084736][T20405] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2315.092701][T20405] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2315.100711][T20405] 18:53:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 84) 18:53:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2315.141227][T20403] loop5: detected capacity change from 0 to 4 [ 2315.152838][T20403] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040050020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2315.251072][T20412] loop1: detected capacity change from 0 to 4 [ 2315.268267][T20412] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2315.279962][T20415] loop4: detected capacity change from 0 to 264192 [ 2315.304850][T20416] FAULT_INJECTION: forcing a failure. [ 2315.304850][T20416] name failslab, interval 1, probability 0, space 0, times 0 [ 2315.304868][T20415] EXT4-fs (loop4): #blocks per group too big: 201342976 [ 2315.324443][T20416] CPU: 0 PID: 20416 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2315.332938][T20416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2315.342981][T20416] Call Trace: [ 2315.346290][T20416] [ 2315.349301][T20416] dump_stack_lvl+0xd6/0x122 [ 2315.353890][T20416] dump_stack+0x11/0x1b [ 2315.358059][T20416] should_fail+0x23c/0x250 [ 2315.362474][T20416] ? register_for_each_vma+0x372/0x890 [ 2315.368019][T20416] __should_failslab+0x81/0x90 [ 2315.372777][T20416] should_failslab+0x5/0x20 [ 2315.377319][T20416] kmem_cache_alloc_trace+0x52/0x350 [ 2315.382686][T20416] ? register_for_each_vma+0x372/0x890 [ 2315.388284][T20416] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2315.394286][T20416] register_for_each_vma+0x372/0x890 [ 2315.399665][T20416] __uprobe_register+0x392/0x8a0 [ 2315.404644][T20416] uprobe_register_refctr+0x29/0x40 [ 2315.409847][T20416] probe_event_enable+0x2be/0x7d0 [ 2315.414940][T20416] ? __uprobe_trace_func+0x440/0x440 [ 2315.420293][T20416] trace_uprobe_register+0x88/0x410 [ 2315.425516][T20416] perf_trace_event_init+0x34e/0x790 [ 2315.430810][T20416] perf_uprobe_init+0xf5/0x140 [ 2315.435578][T20416] perf_uprobe_event_init+0xde/0x140 [ 2315.440953][T20416] perf_try_init_event+0x21a/0x400 [ 2315.446068][T20416] perf_event_alloc+0xa60/0x1740 [ 2315.451006][T20416] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2315.456684][T20416] ? proc_fail_nth_write+0x127/0x150 [ 2315.462042][T20416] ? preempt_count_add+0x41/0x90 [ 2315.467015][T20416] __x64_sys_perf_event_open+0x63/0x70 [ 2315.472479][T20416] do_syscall_64+0x44/0xa0 [ 2315.476908][T20416] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2315.482808][T20416] RIP: 0033:0x7ff6e6d13ae9 [ 2315.487275][T20416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2315.506945][T20416] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2315.515426][T20416] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2315.523568][T20416] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2315.531535][T20416] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2315.539644][T20416] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2315.547669][T20416] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2315.555644][T20416] [ 2315.570682][T20412] loop1: detected capacity change from 0 to 4 [ 2315.584136][T20415] loop4: detected capacity change from 0 to 264192 18:53:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2315.601623][T20412] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2315.611909][T20415] EXT4-fs (loop4): #blocks per group too big: 201342976 [ 2315.623935][T20422] loop5: detected capacity change from 0 to 4 18:53:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 85) 18:53:29 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2315.648433][T20422] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040000d0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2315.701039][T20422] loop5: detected capacity change from 0 to 4 [ 2315.707806][T20422] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040060020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2315.783739][T20429] FAULT_INJECTION: forcing a failure. [ 2315.783739][T20429] name failslab, interval 1, probability 0, space 0, times 0 [ 2315.796371][T20429] CPU: 0 PID: 20429 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2315.804822][T20429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2315.814977][T20429] Call Trace: [ 2315.818270][T20429] [ 2315.821201][T20429] dump_stack_lvl+0xd6/0x122 [ 2315.825791][T20429] dump_stack+0x11/0x1b [ 2315.829947][T20429] should_fail+0x23c/0x250 [ 2315.834450][T20429] ? register_for_each_vma+0x372/0x890 [ 2315.839936][T20429] __should_failslab+0x81/0x90 [ 2315.844705][T20429] should_failslab+0x5/0x20 [ 2315.849239][T20429] kmem_cache_alloc_trace+0x52/0x350 [ 2315.854561][T20429] ? register_for_each_vma+0x372/0x890 [ 2315.860125][T20429] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2315.866100][T20429] register_for_each_vma+0x372/0x890 [ 2315.871480][T20429] __uprobe_register+0x392/0x8a0 [ 2315.876466][T20429] uprobe_register_refctr+0x29/0x40 [ 2315.881663][T20429] probe_event_enable+0x2be/0x7d0 [ 2315.886685][T20429] ? __uprobe_trace_func+0x440/0x440 [ 2315.891971][T20429] trace_uprobe_register+0x88/0x410 [ 2315.897169][T20429] perf_trace_event_init+0x34e/0x790 [ 2315.902506][T20429] perf_uprobe_init+0xf5/0x140 [ 2315.907352][T20429] perf_uprobe_event_init+0xde/0x140 [ 2315.912644][T20429] perf_try_init_event+0x21a/0x400 [ 2315.917927][T20429] perf_event_alloc+0xa60/0x1740 [ 2315.922952][T20429] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2315.928620][T20429] ? proc_fail_nth_write+0x127/0x150 [ 2315.933926][T20429] ? preempt_count_add+0x41/0x90 [ 2315.938873][T20429] __x64_sys_perf_event_open+0x63/0x70 [ 2315.944335][T20429] do_syscall_64+0x44/0xa0 [ 2315.948805][T20429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2315.954721][T20429] RIP: 0033:0x7ff6e6d13ae9 [ 2315.959123][T20429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2315.978750][T20429] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2315.987319][T20429] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2315.995303][T20429] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2316.003290][T20429] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2316.011304][T20429] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2316.019272][T20429] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2316.027356][T20429] 18:53:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 86) [ 2316.083948][T20433] loop5: detected capacity change from 0 to 4 [ 2316.102547][T20434] loop4: detected capacity change from 0 to 264192 [ 2316.109644][T20435] loop1: detected capacity change from 0 to 4 [ 2316.109931][T20433] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2316.129944][T20435] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2316.139751][T20434] EXT4-fs (loop4): #blocks per group too big: 218120192 [ 2316.162023][T20433] loop5: detected capacity change from 0 to 4 [ 2316.170818][T20435] loop1: detected capacity change from 0 to 4 [ 2316.173414][T20434] loop4: detected capacity change from 0 to 264192 [ 2316.178132][T20435] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2316.183492][T20433] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2316.202761][T20434] EXT4-fs (loop4): #blocks per group too big: 218120192 [ 2316.282061][T20442] FAULT_INJECTION: forcing a failure. [ 2316.282061][T20442] name failslab, interval 1, probability 0, space 0, times 0 [ 2316.294705][T20442] CPU: 1 PID: 20442 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2316.303125][T20442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2316.313295][T20442] Call Trace: [ 2316.316584][T20442] [ 2316.319506][T20442] dump_stack_lvl+0xd6/0x122 [ 2316.324176][T20442] dump_stack+0x11/0x1b [ 2316.328338][T20442] should_fail+0x23c/0x250 [ 2316.332764][T20442] ? register_for_each_vma+0x372/0x890 [ 2316.338283][T20442] __should_failslab+0x81/0x90 [ 2316.343092][T20442] should_failslab+0x5/0x20 [ 2316.347664][T20442] kmem_cache_alloc_trace+0x52/0x350 [ 2316.353045][T20442] ? register_for_each_vma+0x372/0x890 [ 2316.358659][T20442] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2316.364636][T20442] register_for_each_vma+0x372/0x890 [ 2316.370184][T20442] __uprobe_register+0x392/0x8a0 [ 2316.375217][T20442] uprobe_register_refctr+0x29/0x40 [ 2316.380427][T20442] probe_event_enable+0x2be/0x7d0 [ 2316.385470][T20442] ? __uprobe_trace_func+0x440/0x440 [ 2316.390785][T20442] trace_uprobe_register+0x88/0x410 [ 2316.396010][T20442] perf_trace_event_init+0x34e/0x790 [ 2316.401334][T20442] perf_uprobe_init+0xf5/0x140 [ 2316.406109][T20442] perf_uprobe_event_init+0xde/0x140 [ 2316.411389][T20442] perf_try_init_event+0x21a/0x400 [ 2316.416492][T20442] perf_event_alloc+0xa60/0x1740 [ 2316.421436][T20442] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2316.427129][T20442] ? proc_fail_nth_write+0x127/0x150 [ 2316.432429][T20442] ? preempt_count_add+0x41/0x90 [ 2316.437499][T20442] __x64_sys_perf_event_open+0x63/0x70 [ 2316.443027][T20442] do_syscall_64+0x44/0xa0 [ 2316.447565][T20442] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2316.453461][T20442] RIP: 0033:0x7ff6e6d13ae9 [ 2316.457908][T20442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:30 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040000e0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040070020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2316.477520][T20442] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2316.485934][T20442] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2316.494017][T20442] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2316.501985][T20442] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2316.510038][T20442] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2316.518019][T20442] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2316.525988][T20442] 18:53:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 87) 18:53:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2316.650851][T20449] loop1: detected capacity change from 0 to 4 [ 2316.668885][T20451] loop4: detected capacity change from 0 to 264192 [ 2316.682151][T20449] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2316.702621][T20451] EXT4-fs (loop4): #blocks per group too big: 234897408 [ 2316.721191][T20454] loop5: detected capacity change from 0 to 4 [ 2316.721754][T20455] FAULT_INJECTION: forcing a failure. [ 2316.721754][T20455] name failslab, interval 1, probability 0, space 0, times 0 [ 2316.739994][T20455] CPU: 0 PID: 20455 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2316.748437][T20455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2316.758692][T20455] Call Trace: [ 2316.762254][T20455] [ 2316.765285][T20455] dump_stack_lvl+0xd6/0x122 [ 2316.769877][T20455] dump_stack+0x11/0x1b [ 2316.774028][T20455] should_fail+0x23c/0x250 [ 2316.778445][T20455] ? register_for_each_vma+0x372/0x890 [ 2316.783967][T20455] __should_failslab+0x81/0x90 [ 2316.788799][T20455] should_failslab+0x5/0x20 [ 2316.793374][T20455] kmem_cache_alloc_trace+0x52/0x350 [ 2316.798662][T20455] ? register_for_each_vma+0x372/0x890 [ 2316.804114][T20455] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2316.810089][T20455] register_for_each_vma+0x372/0x890 [ 2316.815468][T20455] __uprobe_register+0x392/0x8a0 [ 2316.820394][T20455] uprobe_register_refctr+0x29/0x40 [ 2316.825577][T20455] probe_event_enable+0x2be/0x7d0 [ 2316.830608][T20455] ? __uprobe_trace_func+0x440/0x440 [ 2316.835991][T20455] trace_uprobe_register+0x88/0x410 [ 2316.841192][T20455] perf_trace_event_init+0x34e/0x790 [ 2316.846469][T20455] perf_uprobe_init+0xf5/0x140 [ 2316.851292][T20455] perf_uprobe_event_init+0xde/0x140 [ 2316.856630][T20455] perf_try_init_event+0x21a/0x400 [ 2316.861834][T20455] perf_event_alloc+0xa60/0x1740 [ 2316.866827][T20455] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2316.872494][T20455] ? proc_fail_nth_write+0x127/0x150 [ 2316.877789][T20455] ? preempt_count_add+0x41/0x90 [ 2316.882772][T20455] __x64_sys_perf_event_open+0x63/0x70 [ 2316.888331][T20455] do_syscall_64+0x44/0xa0 [ 2316.892781][T20455] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2316.898702][T20455] RIP: 0033:0x7ff6e6d13ae9 [ 2316.903096][T20455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2316.922731][T20455] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2316.931123][T20455] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2316.939144][T20455] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2316.947132][T20455] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2316.955185][T20455] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2316.963156][T20455] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2316.971111][T20455] [ 2316.975589][T20454] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2316.986610][T20449] loop1: detected capacity change from 0 to 4 [ 2316.995840][T20451] loop4: detected capacity change from 0 to 264192 18:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 88) [ 2317.008932][T20451] EXT4-fs (loop4): #blocks per group too big: 234897408 [ 2317.023412][T20449] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2317.042247][T20454] loop5: detected capacity change from 0 to 4 [ 2317.049913][T20454] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:31 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040000f0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040080020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2317.186074][T20462] FAULT_INJECTION: forcing a failure. [ 2317.186074][T20462] name failslab, interval 1, probability 0, space 0, times 0 [ 2317.198712][T20462] CPU: 0 PID: 20462 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2317.207136][T20462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2317.217316][T20462] Call Trace: [ 2317.220653][T20462] [ 2317.223583][T20462] dump_stack_lvl+0xd6/0x122 [ 2317.228263][T20462] dump_stack+0x11/0x1b [ 2317.232444][T20462] should_fail+0x23c/0x250 [ 2317.236904][T20462] ? register_for_each_vma+0x372/0x890 [ 2317.242446][T20462] __should_failslab+0x81/0x90 [ 2317.247281][T20462] should_failslab+0x5/0x20 [ 2317.251792][T20462] kmem_cache_alloc_trace+0x52/0x350 [ 2317.257083][T20462] ? register_for_each_vma+0x372/0x890 [ 2317.262553][T20462] ? vma_interval_tree_iter_next+0x263/0x280 [ 2317.268647][T20462] register_for_each_vma+0x372/0x890 [ 2317.273975][T20462] __uprobe_register+0x392/0x8a0 [ 2317.278995][T20462] uprobe_register_refctr+0x29/0x40 [ 2317.284195][T20462] probe_event_enable+0x2be/0x7d0 [ 2317.289221][T20462] ? __uprobe_trace_func+0x440/0x440 [ 2317.294506][T20462] trace_uprobe_register+0x88/0x410 [ 2317.299710][T20462] perf_trace_event_init+0x34e/0x790 [ 2317.304992][T20462] perf_uprobe_init+0xf5/0x140 [ 2317.309757][T20462] perf_uprobe_event_init+0xde/0x140 [ 2317.315083][T20462] perf_try_init_event+0x21a/0x400 [ 2317.320189][T20462] perf_event_alloc+0xa60/0x1740 [ 2317.325180][T20462] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2317.330856][T20462] ? proc_fail_nth_write+0x127/0x150 [ 2317.336142][T20462] ? preempt_count_add+0x41/0x90 [ 2317.341151][T20462] __x64_sys_perf_event_open+0x63/0x70 [ 2317.346613][T20462] do_syscall_64+0x44/0xa0 [ 2317.351183][T20462] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2317.357081][T20462] RIP: 0033:0x7ff6e6d13ae9 [ 2317.361493][T20462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2317.381096][T20462] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2317.389541][T20462] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2317.397535][T20462] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2317.405499][T20462] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2317.413472][T20462] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2317.421528][T20462] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2317.429496][T20462] 18:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 89) [ 2317.478550][T20468] loop5: detected capacity change from 0 to 4 [ 2317.486703][T20469] loop4: detected capacity change from 0 to 264192 [ 2317.486912][T20470] loop1: detected capacity change from 0 to 4 [ 2317.508959][T20468] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2317.510691][T20470] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2317.518469][T20469] EXT4-fs (loop4): #blocks per group too big: 251674624 [ 2317.549913][T20468] loop5: detected capacity change from 0 to 4 [ 2317.561036][T20468] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2317.573937][T20470] loop1: detected capacity change from 0 to 4 [ 2317.580466][T20469] loop4: detected capacity change from 0 to 264192 18:53:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2317.598003][T20470] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2317.607898][T20469] EXT4-fs (loop4): #blocks per group too big: 251674624 [ 2317.627918][T20475] FAULT_INJECTION: forcing a failure. [ 2317.627918][T20475] name failslab, interval 1, probability 0, space 0, times 0 [ 2317.640695][T20475] CPU: 1 PID: 20475 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2317.649127][T20475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2317.659183][T20475] Call Trace: [ 2317.662459][T20475] [ 2317.665389][T20475] dump_stack_lvl+0xd6/0x122 [ 2317.669999][T20475] dump_stack+0x11/0x1b [ 2317.674154][T20475] should_fail+0x23c/0x250 [ 2317.678603][T20475] ? register_for_each_vma+0x372/0x890 [ 2317.684062][T20475] __should_failslab+0x81/0x90 [ 2317.688860][T20475] should_failslab+0x5/0x20 [ 2317.693517][T20475] kmem_cache_alloc_trace+0x52/0x350 [ 2317.698834][T20475] ? register_for_each_vma+0x372/0x890 [ 2317.704300][T20475] ? vma_interval_tree_iter_next+0x263/0x280 [ 2317.710335][T20475] register_for_each_vma+0x372/0x890 [ 2317.715629][T20475] __uprobe_register+0x392/0x8a0 [ 2317.720680][T20475] uprobe_register_refctr+0x29/0x40 [ 2317.725884][T20475] probe_event_enable+0x2be/0x7d0 [ 2317.730913][T20475] ? __uprobe_trace_func+0x440/0x440 [ 2317.736195][T20475] trace_uprobe_register+0x88/0x410 [ 2317.741459][T20475] perf_trace_event_init+0x34e/0x790 [ 2317.746857][T20475] perf_uprobe_init+0xf5/0x140 [ 2317.751715][T20475] perf_uprobe_event_init+0xde/0x140 [ 2317.756998][T20475] perf_try_init_event+0x21a/0x400 [ 2317.762184][T20475] perf_event_alloc+0xa60/0x1740 [ 2317.767168][T20475] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2317.772806][T20475] ? proc_fail_nth_write+0x127/0x150 [ 2317.778112][T20475] ? preempt_count_add+0x41/0x90 [ 2317.783233][T20475] __x64_sys_perf_event_open+0x63/0x70 [ 2317.788728][T20475] do_syscall_64+0x44/0xa0 [ 2317.793145][T20475] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2317.799187][T20475] RIP: 0033:0x7ff6e6d13ae9 [ 2317.803608][T20475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2317.823260][T20475] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2317.831679][T20475] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2317.839707][T20475] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 18:53:31 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040090020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2317.847740][T20475] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2317.855719][T20475] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2317.863686][T20475] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2317.871691][T20475] 18:53:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004004100040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 90) 18:53:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2318.137961][T20486] loop5: detected capacity change from 0 to 4 [ 2318.144622][T20487] loop4: detected capacity change from 0 to 264192 [ 2318.151632][T20488] loop1: detected capacity change from 0 to 4 [ 2318.158766][T20489] FAULT_INJECTION: forcing a failure. [ 2318.158766][T20489] name failslab, interval 1, probability 0, space 0, times 0 [ 2318.171440][T20489] CPU: 0 PID: 20489 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2318.179869][T20489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2318.189913][T20489] Call Trace: [ 2318.193205][T20489] [ 2318.196133][T20489] dump_stack_lvl+0xd6/0x122 [ 2318.200722][T20489] dump_stack+0x11/0x1b [ 2318.204984][T20489] should_fail+0x23c/0x250 [ 2318.209459][T20489] ? register_for_each_vma+0x372/0x890 [ 2318.214917][T20489] __should_failslab+0x81/0x90 [ 2318.219746][T20489] should_failslab+0x5/0x20 [ 2318.224314][T20489] kmem_cache_alloc_trace+0x52/0x350 [ 2318.229605][T20489] ? register_for_each_vma+0x372/0x890 [ 2318.235058][T20489] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2318.241215][T20489] register_for_each_vma+0x372/0x890 [ 2318.246596][T20489] __uprobe_register+0x392/0x8a0 [ 2318.251654][T20489] uprobe_register_refctr+0x29/0x40 [ 2318.256909][T20489] probe_event_enable+0x2be/0x7d0 [ 2318.262059][T20489] ? __uprobe_trace_func+0x440/0x440 [ 2318.267345][T20489] trace_uprobe_register+0x88/0x410 [ 2318.272621][T20489] perf_trace_event_init+0x34e/0x790 [ 2318.277905][T20489] perf_uprobe_init+0xf5/0x140 [ 2318.282670][T20489] perf_uprobe_event_init+0xde/0x140 [ 2318.287949][T20489] perf_try_init_event+0x21a/0x400 [ 2318.293058][T20489] perf_event_alloc+0xa60/0x1740 [ 2318.298017][T20489] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2318.303804][T20489] ? __tsan_read4+0x11a/0x180 [ 2318.308497][T20489] ? preempt_count_add+0x41/0x90 [ 2318.313506][T20489] __x64_sys_perf_event_open+0x63/0x70 [ 2318.318986][T20489] do_syscall_64+0x44/0xa0 [ 2318.323428][T20489] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2318.329342][T20489] RIP: 0033:0x7ff6e6d13ae9 [ 2318.333752][T20489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2318.353356][T20489] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2318.361826][T20489] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2318.369794][T20489] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2318.377927][T20489] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2318.385898][T20489] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2318.393865][T20489] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2318.401832][T20489] [ 2318.417772][T20486] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2318.417879][T20488] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 91) [ 2318.435837][T20487] EXT4-fs (loop4): #blocks per group too big: 268713984 18:53:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2318.474175][T20486] loop5: detected capacity change from 0 to 4 [ 2318.481294][T20486] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2318.485649][T20488] loop1: detected capacity change from 0 to 4 [ 2318.491672][T20487] loop4: detected capacity change from 0 to 264192 [ 2318.499800][T20488] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2318.513125][T20487] EXT4-fs (loop4): #blocks per group too big: 268713984 18:53:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000000400a0020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:32 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004020100040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2318.628167][T20495] FAULT_INJECTION: forcing a failure. [ 2318.628167][T20495] name failslab, interval 1, probability 0, space 0, times 0 [ 2318.640972][T20495] CPU: 0 PID: 20495 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2318.649395][T20495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2318.659447][T20495] Call Trace: [ 2318.662719][T20495] [ 2318.665647][T20495] dump_stack_lvl+0xd6/0x122 [ 2318.670236][T20495] dump_stack+0x11/0x1b [ 2318.674399][T20495] should_fail+0x23c/0x250 [ 2318.678868][T20495] ? register_for_each_vma+0x372/0x890 [ 2318.684329][T20495] __should_failslab+0x81/0x90 [ 2318.689088][T20495] should_failslab+0x5/0x20 [ 2318.693602][T20495] kmem_cache_alloc_trace+0x52/0x350 [ 2318.698892][T20495] ? register_for_each_vma+0x372/0x890 [ 2318.704649][T20495] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2318.710716][T20495] register_for_each_vma+0x372/0x890 [ 2318.716011][T20495] __uprobe_register+0x392/0x8a0 [ 2318.721043][T20495] uprobe_register_refctr+0x29/0x40 [ 2318.726251][T20495] probe_event_enable+0x2be/0x7d0 [ 2318.731293][T20495] ? __uprobe_trace_func+0x440/0x440 [ 2318.736584][T20495] trace_uprobe_register+0x88/0x410 [ 2318.741794][T20495] perf_trace_event_init+0x34e/0x790 [ 2318.747173][T20495] perf_uprobe_init+0xf5/0x140 [ 2318.751938][T20495] perf_uprobe_event_init+0xde/0x140 [ 2318.757279][T20495] perf_try_init_event+0x21a/0x400 [ 2318.762418][T20495] perf_event_alloc+0xa60/0x1740 [ 2318.767388][T20495] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2318.773089][T20495] ? proc_fail_nth_write+0x127/0x150 [ 2318.778505][T20495] ? preempt_count_add+0x41/0x90 [ 2318.783447][T20495] __x64_sys_perf_event_open+0x63/0x70 [ 2318.788904][T20495] do_syscall_64+0x44/0xa0 [ 2318.793340][T20495] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2318.799256][T20495] RIP: 0033:0x7ff6e6d13ae9 [ 2318.803757][T20495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2318.823534][T20495] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2318.831941][T20495] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2318.839907][T20495] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2318.847869][T20495] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2318.855902][T20495] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2318.863865][T20495] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2318.871861][T20495] 18:53:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2318.913349][T20502] loop1: detected capacity change from 0 to 4 [ 2318.919863][T20503] loop5: detected capacity change from 0 to 4 [ 2318.927438][T20505] loop4: detected capacity change from 0 to 264192 [ 2318.946303][T20503] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 92) 18:53:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x392}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2318.960412][T20502] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2318.969166][T20505] EXT4-fs (loop4): #blocks per group too big: 270548992 [ 2319.041332][T20503] loop5: detected capacity change from 0 to 4 [ 2319.047650][T20505] loop4: detected capacity change from 0 to 264192 [ 2319.047719][T20502] loop1: detected capacity change from 0 to 4 [ 2319.058547][T20505] EXT4-fs (loop4): #blocks per group too big: 270548992 [ 2319.068279][T20502] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2319.076944][T20503] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2319.086557][T20510] FAULT_INJECTION: forcing a failure. [ 2319.086557][T20510] name failslab, interval 1, probability 0, space 0, times 0 [ 2319.099223][T20510] CPU: 0 PID: 20510 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2319.107642][T20510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2319.117687][T20510] Call Trace: [ 2319.120976][T20510] [ 2319.123924][T20510] dump_stack_lvl+0xd6/0x122 [ 2319.128505][T20510] dump_stack+0x11/0x1b [ 2319.132655][T20510] should_fail+0x23c/0x250 [ 2319.137118][T20510] ? register_for_each_vma+0x372/0x890 [ 2319.142652][T20510] __should_failslab+0x81/0x90 [ 2319.147418][T20510] should_failslab+0x5/0x20 [ 2319.151929][T20510] kmem_cache_alloc_trace+0x52/0x350 [ 2319.157221][T20510] ? register_for_each_vma+0x372/0x890 [ 2319.162737][T20510] ? vma_interval_tree_iter_next+0x263/0x280 [ 2319.168756][T20510] register_for_each_vma+0x372/0x890 [ 2319.174105][T20510] __uprobe_register+0x392/0x8a0 [ 2319.179050][T20510] uprobe_register_refctr+0x29/0x40 [ 2319.184306][T20510] probe_event_enable+0x2be/0x7d0 [ 2319.189330][T20510] ? __uprobe_trace_func+0x440/0x440 [ 2319.194612][T20510] trace_uprobe_register+0x88/0x410 [ 2319.199883][T20510] perf_trace_event_init+0x34e/0x790 [ 2319.205162][T20510] perf_uprobe_init+0xf5/0x140 [ 2319.209984][T20510] perf_uprobe_event_init+0xde/0x140 [ 2319.215270][T20510] perf_try_init_event+0x21a/0x400 [ 2319.220385][T20510] perf_event_alloc+0xa60/0x1740 [ 2319.225341][T20510] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2319.231116][T20510] ? proc_fail_nth_write+0x127/0x150 [ 2319.236469][T20510] ? preempt_count_add+0x41/0x90 [ 2319.241475][T20510] __x64_sys_perf_event_open+0x63/0x70 [ 2319.247013][T20510] do_syscall_64+0x44/0xa0 [ 2319.251429][T20510] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2319.257366][T20510] RIP: 0033:0x7ff6e6d13ae9 [ 2319.261781][T20510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2319.281443][T20510] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 18:53:33 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2319.289938][T20510] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2319.297907][T20510] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2319.305876][T20510] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2319.313839][T20510] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2319.321801][T20510] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2319.329772][T20510] 18:53:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000110040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000000400b0020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 93) 18:53:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2319.480677][T20517] loop1: detected capacity change from 0 to 4 [ 2319.496879][T20517] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2319.530751][T20523] loop4: detected capacity change from 0 to 264192 [ 2319.531203][T20524] loop5: detected capacity change from 0 to 4 [ 2319.548048][T20517] loop1: detected capacity change from 0 to 4 [ 2319.557028][T20517] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2319.568776][T20523] EXT4-fs (loop4): #blocks per group too big: 285229056 [ 2319.575904][T20524] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2319.587905][T20526] FAULT_INJECTION: forcing a failure. [ 2319.587905][T20526] name failslab, interval 1, probability 0, space 0, times 0 [ 2319.600593][T20526] CPU: 1 PID: 20526 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2319.609009][T20526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2319.619058][T20526] Call Trace: [ 2319.622335][T20526] [ 2319.625259][T20526] dump_stack_lvl+0xd6/0x122 [ 2319.629845][T20526] dump_stack+0x11/0x1b [ 2319.634002][T20526] should_fail+0x23c/0x250 [ 2319.638420][T20526] ? register_for_each_vma+0x372/0x890 [ 2319.643951][T20526] __should_failslab+0x81/0x90 [ 2319.648716][T20526] should_failslab+0x5/0x20 [ 2319.653369][T20526] kmem_cache_alloc_trace+0x52/0x350 [ 2319.658660][T20526] ? register_for_each_vma+0x372/0x890 [ 2319.664130][T20526] ? vma_interval_tree_iter_next+0x263/0x280 [ 2319.670149][T20526] register_for_each_vma+0x372/0x890 [ 2319.675436][T20526] __uprobe_register+0x392/0x8a0 [ 2319.680448][T20526] uprobe_register_refctr+0x29/0x40 [ 2319.685756][T20526] probe_event_enable+0x2be/0x7d0 [ 2319.690795][T20526] ? __uprobe_trace_func+0x440/0x440 [ 2319.696123][T20526] trace_uprobe_register+0x88/0x410 [ 2319.701433][T20526] perf_trace_event_init+0x34e/0x790 [ 2319.706813][T20526] perf_uprobe_init+0xf5/0x140 [ 2319.711578][T20526] perf_uprobe_event_init+0xde/0x140 [ 2319.716972][T20526] perf_try_init_event+0x21a/0x400 [ 2319.722231][T20526] perf_event_alloc+0xa60/0x1740 [ 2319.727184][T20526] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2319.732909][T20526] ? proc_fail_nth_write+0x127/0x150 [ 2319.738200][T20526] ? preempt_count_add+0x41/0x90 [ 2319.743153][T20526] __x64_sys_perf_event_open+0x63/0x70 [ 2319.748670][T20526] do_syscall_64+0x44/0xa0 [ 2319.753436][T20526] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2319.759367][T20526] RIP: 0033:0x7ff6e6d13ae9 [ 2319.763907][T20526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2319.783514][T20526] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2319.791927][T20526] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2319.799924][T20526] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2319.807910][T20526] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2319.815878][T20526] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2319.823848][T20526] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 18:53:33 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2319.831990][T20526] 18:53:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2319.858445][T20524] loop5: detected capacity change from 0 to 4 [ 2319.865289][T20524] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2319.878608][T20523] loop4: detected capacity change from 0 to 264192 [ 2319.900096][T20523] EXT4-fs (loop4): #blocks per group too big: 285229056 18:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 94) 18:53:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000000400c0020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000120040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2320.014813][T20530] loop1: detected capacity change from 0 to 4 [ 2320.032760][T20530] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2320.069830][T20530] loop1: detected capacity change from 0 to 4 [ 2320.077246][T20530] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2320.111489][T20537] loop5: detected capacity change from 0 to 4 [ 2320.119221][T20538] FAULT_INJECTION: forcing a failure. [ 2320.119221][T20538] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.131904][T20538] CPU: 0 PID: 20538 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2320.140315][T20538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2320.150455][T20538] Call Trace: [ 2320.153728][T20538] [ 2320.156660][T20538] dump_stack_lvl+0xd6/0x122 18:53:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2320.161251][T20538] dump_stack+0x11/0x1b [ 2320.165394][T20538] should_fail+0x23c/0x250 [ 2320.169815][T20538] ? register_for_each_vma+0x372/0x890 [ 2320.175353][T20538] __should_failslab+0x81/0x90 [ 2320.180171][T20538] should_failslab+0x5/0x20 [ 2320.184681][T20538] kmem_cache_alloc_trace+0x52/0x350 [ 2320.189966][T20538] ? register_for_each_vma+0x372/0x890 [ 2320.195431][T20538] ? vma_interval_tree_iter_next+0x263/0x280 [ 2320.201420][T20538] register_for_each_vma+0x372/0x890 [ 2320.206722][T20538] __uprobe_register+0x392/0x8a0 [ 2320.211688][T20538] uprobe_register_refctr+0x29/0x40 [ 2320.216888][T20538] probe_event_enable+0x2be/0x7d0 [ 2320.221966][T20538] ? __uprobe_trace_func+0x440/0x440 [ 2320.227274][T20538] trace_uprobe_register+0x88/0x410 [ 2320.232542][T20538] perf_trace_event_init+0x34e/0x790 [ 2320.237822][T20538] perf_uprobe_init+0xf5/0x140 [ 2320.242582][T20538] perf_uprobe_event_init+0xde/0x140 [ 2320.247928][T20538] perf_try_init_event+0x21a/0x400 [ 2320.253096][T20538] perf_event_alloc+0xa60/0x1740 [ 2320.258166][T20538] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2320.263830][T20538] ? proc_fail_nth_write+0x127/0x150 [ 2320.269121][T20538] ? preempt_count_add+0x41/0x90 [ 2320.274279][T20538] __x64_sys_perf_event_open+0x63/0x70 [ 2320.279854][T20538] do_syscall_64+0x44/0xa0 [ 2320.284303][T20538] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2320.290207][T20538] RIP: 0033:0x7ff6e6d13ae9 [ 2320.294614][T20538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2320.314229][T20538] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2320.322643][T20538] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2320.329220][T20537] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2320.330681][T20538] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2320.348023][T20538] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2320.355995][T20538] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2320.364097][T20538] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2320.372064][T20538] [ 2320.378977][T20541] loop4: detected capacity change from 0 to 264192 [ 2320.390107][T20537] loop5: detected capacity change from 0 to 4 [ 2320.405156][T20541] EXT4-fs (loop4): #blocks per group too big: 302006272 18:53:34 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000000a01000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2320.413292][T20537] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 95) 18:53:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000000400d0020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2320.454258][T20541] loop4: detected capacity change from 0 to 264192 [ 2320.485352][T20545] loop1: detected capacity change from 0 to 4 [ 2320.493396][T20541] EXT4-fs (loop4): #blocks per group too big: 302006272 [ 2320.511833][T20545] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000130040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2320.560360][T20545] loop1: detected capacity change from 0 to 4 [ 2320.567058][T20545] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:34 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2320.651356][T20553] FAULT_INJECTION: forcing a failure. [ 2320.651356][T20553] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.664077][T20553] CPU: 0 PID: 20553 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2320.672515][T20553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2320.682642][T20553] Call Trace: [ 2320.685937][T20553] [ 2320.688865][T20553] dump_stack_lvl+0xd6/0x122 [ 2320.693476][T20553] dump_stack+0x11/0x1b 18:53:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2320.697622][T20553] should_fail+0x23c/0x250 [ 2320.702131][T20553] ? register_for_each_vma+0x372/0x890 [ 2320.707596][T20553] __should_failslab+0x81/0x90 [ 2320.712405][T20553] should_failslab+0x5/0x20 [ 2320.716984][T20553] kmem_cache_alloc_trace+0x52/0x350 [ 2320.722525][T20553] ? register_for_each_vma+0x372/0x890 [ 2320.727991][T20553] ? vma_interval_tree_iter_next+0x263/0x280 [ 2320.733977][T20553] register_for_each_vma+0x372/0x890 [ 2320.739273][T20553] __uprobe_register+0x392/0x8a0 [ 2320.744283][T20553] uprobe_register_refctr+0x29/0x40 [ 2320.749504][T20553] probe_event_enable+0x2be/0x7d0 [ 2320.754563][T20553] ? __uprobe_trace_func+0x440/0x440 [ 2320.759857][T20553] trace_uprobe_register+0x88/0x410 [ 2320.765188][T20553] perf_trace_event_init+0x34e/0x790 [ 2320.770476][T20553] perf_uprobe_init+0xf5/0x140 [ 2320.775309][T20553] perf_uprobe_event_init+0xde/0x140 [ 2320.780625][T20553] perf_try_init_event+0x21a/0x400 [ 2320.785749][T20553] perf_event_alloc+0xa60/0x1740 [ 2320.790695][T20553] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2320.796409][T20553] ? proc_fail_nth_write+0x127/0x150 [ 2320.801702][T20553] ? preempt_count_add+0x41/0x90 [ 2320.806740][T20553] __x64_sys_perf_event_open+0x63/0x70 [ 2320.812216][T20553] do_syscall_64+0x44/0xa0 [ 2320.816703][T20553] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2320.822616][T20553] RIP: 0033:0x7ff6e6d13ae9 [ 2320.827048][T20553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2320.846656][T20553] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2320.855085][T20553] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2320.863065][T20553] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2320.871029][T20553] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2320.878991][T20553] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2320.886960][T20553] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2320.894930][T20553] 18:53:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2320.898739][T20554] loop5: detected capacity change from 0 to 4 [ 2320.914085][T20554] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2320.946655][T20558] loop1: detected capacity change from 0 to 4 [ 2320.964175][T20560] loop4: detected capacity change from 0 to 264192 [ 2320.973827][T20554] loop5: detected capacity change from 0 to 4 [ 2320.983505][T20558] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 96) 18:53:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2320.992698][T20560] EXT4-fs (loop4): #blocks per group too big: 318783488 [ 2321.001244][T20554] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2321.039678][T20558] loop1: detected capacity change from 0 to 4 [ 2321.047211][T20558] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2321.072283][T20560] loop4: detected capacity change from 0 to 264192 18:53:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000000400e0020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:35 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2321.087331][T20560] EXT4-fs (loop4): #blocks per group too big: 318783488 [ 2321.109986][T20566] FAULT_INJECTION: forcing a failure. [ 2321.109986][T20566] name failslab, interval 1, probability 0, space 0, times 0 [ 2321.122677][T20566] CPU: 0 PID: 20566 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2321.131126][T20566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2321.141262][T20566] Call Trace: [ 2321.144597][T20566] [ 2321.147521][T20566] dump_stack_lvl+0xd6/0x122 [ 2321.152257][T20566] dump_stack+0x11/0x1b [ 2321.156406][T20566] should_fail+0x23c/0x250 [ 2321.160815][T20566] ? register_for_each_vma+0x372/0x890 [ 2321.166279][T20566] __should_failslab+0x81/0x90 [ 2321.171044][T20566] should_failslab+0x5/0x20 [ 2321.175625][T20566] kmem_cache_alloc_trace+0x52/0x350 [ 2321.180959][T20566] ? register_for_each_vma+0x372/0x890 [ 2321.186420][T20566] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2321.192456][T20566] register_for_each_vma+0x372/0x890 [ 2321.197796][T20566] __uprobe_register+0x392/0x8a0 [ 2321.202731][T20566] uprobe_register_refctr+0x29/0x40 [ 2321.208003][T20566] probe_event_enable+0x2be/0x7d0 [ 2321.213098][T20566] ? __uprobe_trace_func+0x440/0x440 [ 2321.218435][T20566] trace_uprobe_register+0x88/0x410 [ 2321.223672][T20566] perf_trace_event_init+0x34e/0x790 [ 2321.228942][T20566] perf_uprobe_init+0xf5/0x140 [ 2321.233754][T20566] perf_uprobe_event_init+0xde/0x140 [ 2321.239038][T20566] perf_try_init_event+0x21a/0x400 [ 2321.244140][T20566] perf_event_alloc+0xa60/0x1740 [ 2321.249068][T20566] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2321.254686][T20566] ? proc_fail_nth_write+0x127/0x150 [ 2321.260081][T20566] ? preempt_count_add+0x41/0x90 [ 2321.265010][T20566] __x64_sys_perf_event_open+0x63/0x70 [ 2321.270524][T20566] do_syscall_64+0x44/0xa0 [ 2321.275006][T20566] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2321.280945][T20566] RIP: 0033:0x7ff6e6d13ae9 [ 2321.285341][T20566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2321.305063][T20566] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2321.313534][T20566] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2321.321486][T20566] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2321.329440][T20566] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2321.337460][T20566] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2321.345414][T20566] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2321.353374][T20566] 18:53:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:35 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 97) 18:53:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000180040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:35 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2321.455729][T20572] loop5: detected capacity change from 0 to 4 [ 2321.477590][T20572] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2321.500882][T20572] loop5: detected capacity change from 0 to 4 [ 2321.508007][T20572] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2321.566126][T20577] FAULT_INJECTION: forcing a failure. [ 2321.566126][T20577] name failslab, interval 1, probability 0, space 0, times 0 [ 2321.578794][T20577] CPU: 1 PID: 20577 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2321.587273][T20577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2321.597330][T20577] Call Trace: [ 2321.600602][T20577] [ 2321.603585][T20577] dump_stack_lvl+0xd6/0x122 [ 2321.608222][T20577] dump_stack+0x11/0x1b [ 2321.612373][T20577] should_fail+0x23c/0x250 [ 2321.616861][T20577] ? register_for_each_vma+0x372/0x890 [ 2321.622320][T20577] __should_failslab+0x81/0x90 [ 2321.627085][T20577] should_failslab+0x5/0x20 [ 2321.631747][T20577] kmem_cache_alloc_trace+0x52/0x350 [ 2321.637033][T20577] ? register_for_each_vma+0x372/0x890 [ 2321.642495][T20577] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2321.648651][T20577] register_for_each_vma+0x372/0x890 [ 2321.653949][T20577] __uprobe_register+0x392/0x8a0 [ 2321.658896][T20577] uprobe_register_refctr+0x29/0x40 [ 2321.664115][T20577] probe_event_enable+0x2be/0x7d0 [ 2321.669139][T20577] ? __uprobe_trace_func+0x440/0x440 [ 2321.674440][T20577] trace_uprobe_register+0x88/0x410 [ 2321.679728][T20577] perf_trace_event_init+0x34e/0x790 [ 2321.685082][T20577] perf_uprobe_init+0xf5/0x140 [ 2321.689868][T20577] perf_uprobe_event_init+0xde/0x140 [ 2321.695228][T20577] perf_try_init_event+0x21a/0x400 [ 2321.700336][T20577] perf_event_alloc+0xa60/0x1740 [ 2321.705274][T20577] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2321.710939][T20577] ? proc_fail_nth_write+0x127/0x150 [ 2321.716245][T20577] ? preempt_count_add+0x41/0x90 [ 2321.721186][T20577] __x64_sys_perf_event_open+0x63/0x70 [ 2321.726644][T20577] do_syscall_64+0x44/0xa0 [ 2321.731114][T20577] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2321.737182][T20577] RIP: 0033:0x7ff6e6d13ae9 [ 2321.741650][T20577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2321.761255][T20577] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2321.769662][T20577] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2321.777718][T20577] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2321.785682][T20577] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2321.793752][T20577] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2321.801719][T20577] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2321.809763][T20577] 18:53:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000000400f0020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 98) [ 2321.839595][T20579] loop1: detected capacity change from 0 to 4 [ 2321.869040][T20579] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:36 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2321.899670][T20579] loop1: detected capacity change from 0 to 4 [ 2321.906055][T20579] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2321.935765][T20581] loop4: detected capacity change from 0 to 264192 18:53:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2321.964410][T20581] EXT4-fs (loop4): #blocks per group too big: 402669568 [ 2322.027398][T20581] loop4: detected capacity change from 0 to 264192 [ 2322.034943][T20581] EXT4-fs (loop4): #blocks per group too big: 402669568 18:53:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040001b0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2322.133188][T20587] FAULT_INJECTION: forcing a failure. [ 2322.133188][T20587] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.145845][T20587] CPU: 1 PID: 20587 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2322.154386][T20587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2322.164452][T20587] Call Trace: [ 2322.167728][T20587] [ 2322.170651][T20587] dump_stack_lvl+0xd6/0x122 [ 2322.175259][T20587] dump_stack+0x11/0x1b [ 2322.179426][T20587] should_fail+0x23c/0x250 [ 2322.183839][T20587] ? register_for_each_vma+0x372/0x890 [ 2322.189381][T20587] __should_failslab+0x81/0x90 [ 2322.194156][T20587] should_failslab+0x5/0x20 [ 2322.198745][T20587] kmem_cache_alloc_trace+0x52/0x350 [ 2322.204108][T20587] ? register_for_each_vma+0x372/0x890 [ 2322.209663][T20587] ? vma_interval_tree_iter_next+0x263/0x280 [ 2322.215641][T20587] register_for_each_vma+0x372/0x890 [ 2322.221009][T20587] __uprobe_register+0x392/0x8a0 [ 2322.225992][T20587] uprobe_register_refctr+0x29/0x40 [ 2322.231246][T20587] probe_event_enable+0x2be/0x7d0 [ 2322.236382][T20587] ? __uprobe_trace_func+0x440/0x440 [ 2322.241728][T20587] trace_uprobe_register+0x88/0x410 [ 2322.246974][T20587] perf_trace_event_init+0x34e/0x790 [ 2322.252302][T20587] perf_uprobe_init+0xf5/0x140 [ 2322.257062][T20587] perf_uprobe_event_init+0xde/0x140 [ 2322.262430][T20587] perf_try_init_event+0x21a/0x400 [ 2322.267577][T20587] perf_event_alloc+0xa60/0x1740 [ 2322.272520][T20587] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2322.278156][T20587] ? proc_fail_nth_write+0x127/0x150 [ 2322.283452][T20587] ? preempt_count_add+0x41/0x90 [ 2322.288391][T20587] __x64_sys_perf_event_open+0x63/0x70 [ 2322.293924][T20587] do_syscall_64+0x44/0xa0 [ 2322.298398][T20587] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2322.304395][T20587] RIP: 0033:0x7ff6e6d13ae9 [ 2322.308912][T20587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 99) [ 2322.328666][T20587] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2322.337077][T20587] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2322.345041][T20587] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2322.353075][T20587] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2322.361039][T20587] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2322.369155][T20587] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2322.377121][T20587] [ 2322.411876][T20590] loop5: detected capacity change from 0 to 4 [ 2322.438344][T20590] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2322.474059][T20590] loop5: detected capacity change from 0 to 4 [ 2322.482467][T20593] loop1: detected capacity change from 0 to 4 [ 2322.495409][T20590] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040100020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2322.531022][T20593] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2322.564492][T20593] loop1: detected capacity change from 0 to 4 [ 2322.571245][T20593] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:36 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2322.618936][T20596] loop4: detected capacity change from 0 to 264192 [ 2322.642532][T20596] EXT4-fs (loop4): #blocks per group too big: 453001216 [ 2322.668109][T20599] FAULT_INJECTION: forcing a failure. [ 2322.668109][T20599] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.680757][T20599] CPU: 0 PID: 20599 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2322.689227][T20599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2322.699290][T20599] Call Trace: [ 2322.702586][T20599] [ 2322.705509][T20599] dump_stack_lvl+0xd6/0x122 [ 2322.710112][T20599] dump_stack+0x11/0x1b [ 2322.714262][T20599] should_fail+0x23c/0x250 [ 2322.718830][T20599] ? register_for_each_vma+0x372/0x890 [ 2322.724456][T20599] __should_failslab+0x81/0x90 [ 2322.729223][T20599] should_failslab+0x5/0x20 [ 2322.733757][T20599] kmem_cache_alloc_trace+0x52/0x350 [ 2322.739042][T20599] ? register_for_each_vma+0x372/0x890 [ 2322.744650][T20599] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2322.750691][T20599] register_for_each_vma+0x372/0x890 [ 2322.756026][T20599] __uprobe_register+0x392/0x8a0 [ 2322.760967][T20599] uprobe_register_refctr+0x29/0x40 [ 2322.766167][T20599] probe_event_enable+0x2be/0x7d0 [ 2322.771191][T20599] ? __uprobe_trace_func+0x440/0x440 [ 2322.776485][T20599] trace_uprobe_register+0x88/0x410 [ 2322.781743][T20599] perf_trace_event_init+0x34e/0x790 [ 2322.787082][T20599] perf_uprobe_init+0xf5/0x140 [ 2322.791891][T20599] perf_uprobe_event_init+0xde/0x140 [ 2322.797185][T20599] perf_try_init_event+0x21a/0x400 [ 2322.802301][T20599] perf_event_alloc+0xa60/0x1740 [ 2322.807329][T20599] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2322.812964][T20599] ? proc_fail_nth_write+0x127/0x150 [ 2322.818254][T20599] ? preempt_count_add+0x41/0x90 [ 2322.823197][T20599] __x64_sys_perf_event_open+0x63/0x70 [ 2322.828837][T20599] do_syscall_64+0x44/0xa0 [ 2322.833262][T20599] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2322.839354][T20599] RIP: 0033:0x7ff6e6d13ae9 [ 2322.843797][T20599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2322.863635][T20599] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2322.872074][T20599] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2322.880035][T20599] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2322.888003][T20599] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2322.896063][T20599] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2322.904065][T20599] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2322.912040][T20599] 18:53:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:37 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 100) [ 2322.929203][T20596] loop4: detected capacity change from 0 to 264192 [ 2322.943278][T20596] EXT4-fs (loop4): #blocks per group too big: 453001216 18:53:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000200040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2322.989372][T20604] loop5: detected capacity change from 0 to 4 [ 2323.005879][T20604] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2323.031577][T20606] loop1: detected capacity change from 0 to 4 [ 2323.041074][T20604] loop5: detected capacity change from 0 to 4 [ 2323.053494][T20604] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2323.064532][T20606] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040110020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2323.125769][T20606] loop1: detected capacity change from 0 to 4 [ 2323.138983][T20606] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2323.172961][T20613] FAULT_INJECTION: forcing a failure. [ 2323.172961][T20613] name failslab, interval 1, probability 0, space 0, times 0 [ 2323.185796][T20613] CPU: 1 PID: 20613 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2323.194216][T20613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2323.204313][T20613] Call Trace: [ 2323.207582][T20613] [ 2323.210505][T20613] dump_stack_lvl+0xd6/0x122 [ 2323.215232][T20613] dump_stack+0x11/0x1b [ 2323.219380][T20613] should_fail+0x23c/0x250 [ 2323.223814][T20613] ? register_for_each_vma+0x372/0x890 [ 2323.229349][T20613] __should_failslab+0x81/0x90 [ 2323.234109][T20613] should_failslab+0x5/0x20 [ 2323.238676][T20613] kmem_cache_alloc_trace+0x52/0x350 [ 2323.243967][T20613] ? register_for_each_vma+0x372/0x890 [ 2323.249539][T20613] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2323.255564][T20613] register_for_each_vma+0x372/0x890 [ 2323.260937][T20613] __uprobe_register+0x392/0x8a0 [ 2323.265872][T20613] uprobe_register_refctr+0x29/0x40 [ 2323.271063][T20613] probe_event_enable+0x2be/0x7d0 [ 2323.276111][T20613] ? __uprobe_trace_func+0x440/0x440 [ 2323.281450][T20613] trace_uprobe_register+0x88/0x410 [ 2323.286651][T20613] perf_trace_event_init+0x34e/0x790 [ 2323.291979][T20613] perf_uprobe_init+0xf5/0x140 [ 2323.296740][T20613] perf_uprobe_event_init+0xde/0x140 [ 2323.302045][T20613] perf_try_init_event+0x21a/0x400 [ 2323.307154][T20613] perf_event_alloc+0xa60/0x1740 [ 2323.312182][T20613] __se_sys_perf_event_open+0x5e0/0x27c0 [ 2323.317857][T20613] ? proc_fail_nth_write+0x127/0x150 [ 2323.323192][T20613] ? preempt_count_add+0x41/0x90 [ 2323.328136][T20613] __x64_sys_perf_event_open+0x63/0x70 [ 2323.333606][T20613] do_syscall_64+0x44/0xa0 [ 2323.338059][T20613] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2323.343953][T20613] RIP: 0033:0x7ff6e6d13ae9 [ 2323.348403][T20613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:37 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000000f01000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2323.368041][T20613] RSP: 002b:00007ff6e4a8a188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2323.376548][T20613] RAX: ffffffffffffffda RBX: 00007ff6e6e26f60 RCX: 00007ff6e6d13ae9 [ 2323.384515][T20613] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2323.392581][T20613] RBP: 00007ff6e4a8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2323.400544][T20613] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000003 [ 2323.408510][T20613] R13: 00007ffecbaf566f R14: 00007ff6e4a8a300 R15: 0000000000022000 [ 2323.416474][T20613] 18:53:37 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2323.449584][T20615] loop4: detected capacity change from 0 to 264192 [ 2323.474726][T20615] EXT4-fs (loop4): #blocks per group too big: 536887296 18:53:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2323.520905][T20615] loop4: detected capacity change from 0 to 264192 [ 2323.528184][T20615] EXT4-fs (loop4): #blocks per group too big: 536887296 18:53:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004010200040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2323.569488][T20620] loop5: detected capacity change from 0 to 4 [ 2323.586998][T20620] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:37 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2323.619029][T20625] loop1: detected capacity change from 0 to 4 [ 2323.635033][T20625] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2323.646944][T20620] loop5: detected capacity change from 0 to 4 [ 2323.660082][T20620] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2323.689760][T20625] loop1: detected capacity change from 0 to 4 [ 2323.702223][T20625] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:37 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040120020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:37 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2323.792008][T20631] loop4: detected capacity change from 0 to 264192 [ 2323.809463][T20631] EXT4-fs (loop4): #blocks per group too big: 537935872 18:53:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2323.839561][T20631] loop4: detected capacity change from 0 to 264192 [ 2323.847291][T20631] EXT4-fs (loop4): #blocks per group too big: 537935872 18:53:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000220040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2323.896389][T20641] loop1: detected capacity change from 0 to 4 [ 2323.902930][T20642] loop5: detected capacity change from 0 to 4 [ 2323.929463][T20642] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2323.939596][T20641] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2323.959579][T20641] loop1: detected capacity change from 0 to 4 [ 2323.966166][T20641] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2323.982433][T20642] loop5: detected capacity change from 0 to 4 18:53:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:38 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000001101000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2323.997103][T20642] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2324.042371][T20651] loop4: detected capacity change from 0 to 264192 [ 2324.059711][T20651] EXT4-fs (loop4): #blocks per group too big: 570441728 18:53:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040220020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000230040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2324.099816][T20651] loop4: detected capacity change from 0 to 264192 [ 2324.107284][T20651] EXT4-fs (loop4): #blocks per group too big: 570441728 18:53:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2324.180949][T20661] loop1: detected capacity change from 0 to 4 [ 2324.195894][T20661] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2324.251633][T20664] loop5: detected capacity change from 0 to 4 [ 2324.260992][T20661] loop1: detected capacity change from 0 to 4 [ 2324.277172][T20661] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2324.286505][T20664] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:38 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0xa, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2324.330549][T20668] loop4: detected capacity change from 0 to 264192 [ 2324.342572][T20664] loop5: detected capacity change from 0 to 4 [ 2324.361431][T20664] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2324.378951][T20668] EXT4-fs (loop4): #blocks per group too big: 587218944 18:53:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040250020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2324.446497][T20668] loop4: detected capacity change from 0 to 264192 [ 2324.453948][T20668] EXT4-fs (loop4): #blocks per group too big: 587218944 18:53:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000240040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0xf, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2324.561054][T20678] loop1: detected capacity change from 0 to 4 [ 2324.588899][T20678] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2324.610726][T20686] loop5: detected capacity change from 0 to 4 [ 2324.625913][T20686] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2324.659988][T20678] loop1: detected capacity change from 0 to 4 [ 2324.667436][T20678] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2324.676561][T20688] loop4: detected capacity change from 0 to 264192 [ 2324.689654][T20686] loop5: detected capacity change from 0 to 4 [ 2324.696511][T20686] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:38 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000001901000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2324.712095][T20688] EXT4-fs (loop4): #blocks per group too big: 603996160 18:53:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000000402e0020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2324.752460][T20688] loop4: detected capacity change from 0 to 264192 [ 2324.762673][T20688] EXT4-fs (loop4): #blocks per group too big: 603996160 18:53:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000250040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x20000200, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2324.889476][T20701] ref_ctr_offset mismatch. inode: 0x46f offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x6 [ 2324.903597][T20702] ref_ctr_offset mismatch. inode: 0x46f offset: 0x0 ref_ctr_offset(old): 0x4 ref_ctr_offset(new): 0x6 [ 2324.916637][T20703] loop1: detected capacity change from 0 to 4 [ 2324.928894][T20703] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2324.963265][T20708] loop5: detected capacity change from 0 to 4 [ 2324.970852][T20703] loop1: detected capacity change from 0 to 4 [ 2324.977746][T20703] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2324.989914][T20708] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:39 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2325.019182][T20709] loop4: detected capacity change from 0 to 264192 [ 2325.038557][T20708] loop5: detected capacity change from 0 to 4 [ 2325.046261][T20708] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2325.058044][T20709] EXT4-fs (loop4): #blocks per group too big: 620773376 18:53:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x9203}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040480020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2325.091026][T20709] loop4: detected capacity change from 0 to 264192 [ 2325.100246][T20709] EXT4-fs (loop4): #blocks per group too big: 620773376 18:53:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040002e0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2325.208537][T20719] loop1: detected capacity change from 0 to 4 [ 2325.226847][T20719] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2325.250839][T20719] loop1: detected capacity change from 0 to 4 18:53:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2325.259051][T20723] loop5: detected capacity change from 0 to 4 [ 2325.266052][T20719] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2325.275606][T20723] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:39 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2325.324954][T20723] loop5: detected capacity change from 0 to 4 [ 2325.334951][T20730] loop4: detected capacity change from 0 to 264192 [ 2325.359544][T20723] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2325.372592][T20730] EXT4-fs (loop4): #blocks per group too big: 771768320 18:53:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000000404c0020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2325.414120][T20730] loop4: detected capacity change from 0 to 264192 [ 2325.429467][T20730] EXT4-fs (loop4): #blocks per group too big: 771768320 18:53:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000320040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2325.464663][T20734] loop1: detected capacity change from 0 to 4 [ 2325.490827][T20734] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x3, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2325.540080][T20734] loop1: detected capacity change from 0 to 4 [ 2325.547537][T20734] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:39 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000002e01000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2325.601235][T20744] loop5: detected capacity change from 0 to 4 [ 2325.633422][T20744] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2325.664728][T20747] loop4: detected capacity change from 0 to 264192 [ 2325.674133][T20744] loop5: detected capacity change from 0 to 4 [ 2325.685817][T20744] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2325.696689][T20747] EXT4-fs (loop4): #blocks per group too big: 838877184 18:53:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040600020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x4, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2325.729782][T20747] loop4: detected capacity change from 0 to 264192 [ 2325.753784][T20747] EXT4-fs (loop4): #blocks per group too big: 838877184 18:53:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040003f0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2325.817523][T20756] loop1: detected capacity change from 0 to 4 [ 2325.834826][T20756] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2325.859623][T20756] loop1: detected capacity change from 0 to 4 18:53:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2325.866878][T20756] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2325.904410][T20763] loop5: detected capacity change from 0 to 4 18:53:40 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2325.921357][T20763] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2325.984476][T20768] loop4: detected capacity change from 0 to 264192 [ 2325.993548][T20763] loop5: detected capacity change from 0 to 4 [ 2326.003931][T20763] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2326.015543][T20768] EXT4-fs (loop4): #blocks per group too big: 1056980992 18:53:40 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040680020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2326.079471][T20768] loop4: detected capacity change from 0 to 264192 [ 2326.087600][T20768] EXT4-fs (loop4): #blocks per group too big: 1056980992 18:53:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000400040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2326.136013][T20775] loop1: detected capacity change from 0 to 4 [ 2326.152715][T20775] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x6, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:40 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2326.231244][T20775] loop1: detected capacity change from 0 to 4 [ 2326.242832][T20775] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:40 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2326.272242][T20783] loop5: detected capacity change from 0 to 4 [ 2326.288996][T20783] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2326.334690][T20786] loop4: detected capacity change from 0 to 264192 [ 2326.343847][T20783] loop5: detected capacity change from 0 to 4 [ 2326.350969][T20783] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2326.367701][T20786] EXT4-fs (loop4): #blocks per group too big: 1073758208 18:53:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000000406c0020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2326.392580][T20786] loop4: detected capacity change from 0 to 264192 [ 2326.410107][T20786] EXT4-fs (loop4): #blocks per group too big: 1073758208 18:53:40 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004002440040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2326.483127][T20794] loop1: detected capacity change from 0 to 4 [ 2326.505770][T20794] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2326.529766][T20794] loop1: detected capacity change from 0 to 4 [ 2326.536343][T20794] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:40 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:40 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2326.574308][T20801] loop5: detected capacity change from 0 to 4 [ 2326.612709][T20801] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x8, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2326.660236][T20801] loop5: detected capacity change from 0 to 4 [ 2326.667160][T20801] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2326.677090][T20807] loop4: detected capacity change from 0 to 264192 [ 2326.696895][T20807] EXT4-fs (loop4): #blocks per group too big: 1140998144 18:53:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040740020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:40 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2326.728557][T20811] loop1: detected capacity change from 0 to 4 [ 2326.757033][T20811] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2326.771963][T20807] loop4: detected capacity change from 0 to 264192 18:53:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x9, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004003440040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2326.790207][T20807] EXT4-fs (loop4): #blocks per group too big: 1140998144 [ 2326.810388][T20811] loop1: detected capacity change from 0 to 4 [ 2326.818680][T20811] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:40 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2326.920678][T20823] loop5: detected capacity change from 0 to 4 [ 2326.952869][T20823] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xa, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2326.999932][T20823] loop5: detected capacity change from 0 to 4 [ 2327.007250][T20828] loop4: detected capacity change from 0 to 264192 [ 2327.015130][T20823] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2327.027885][T20828] EXT4-fs (loop4): #blocks per group too big: 1141063680 18:53:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000000407a0020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2327.077494][T20828] loop4: detected capacity change from 0 to 264192 [ 2327.096821][T20828] EXT4-fs (loop4): #blocks per group too big: 1141063680 [ 2327.105106][T20832] loop1: detected capacity change from 0 to 4 [ 2327.116061][T20832] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000480040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2327.149663][T20832] loop1: detected capacity change from 0 to 4 [ 2327.157208][T20832] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xb, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:41 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2327.296227][T20842] loop5: detected capacity change from 0 to 4 [ 2327.313479][T20842] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2327.335024][T20846] loop4: detected capacity change from 0 to 264192 18:53:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2327.352721][T20842] loop5: detected capacity change from 0 to 4 [ 2327.365268][T20846] EXT4-fs (loop4): #blocks per group too big: 1207975936 [ 2327.365268][T20842] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040fe0020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2327.415295][T20852] loop1: detected capacity change from 0 to 4 [ 2327.430287][T20846] loop4: detected capacity change from 0 to 264192 [ 2327.440692][T20852] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040004c0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2327.468672][T20846] EXT4-fs (loop4): #blocks per group too big: 1207975936 [ 2327.499622][T20852] loop1: detected capacity change from 0 to 4 [ 2327.507252][T20852] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:41 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2327.592792][T20859] loop5: detected capacity change from 0 to 4 [ 2327.608390][T20859] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2327.659818][T20859] loop5: detected capacity change from 0 to 4 [ 2327.675340][T20859] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2327.691455][T20870] loop4: detected capacity change from 0 to 264192 18:53:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xd, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000000407d0120000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2327.719523][T20871] loop1: detected capacity change from 0 to 4 [ 2327.726128][T20870] EXT4-fs (loop4): #blocks per group too big: 1275084800 [ 2327.755284][T20871] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2327.768775][T20870] loop4: detected capacity change from 0 to 264192 [ 2327.776390][T20870] EXT4-fs (loop4): #blocks per group too big: 1275084800 18:53:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000500040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2327.812229][T20871] loop1: detected capacity change from 0 to 4 [ 2327.832443][T20871] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:41 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f000000000000007a01000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xe, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2327.922070][T20881] loop5: detected capacity change from 0 to 4 [ 2327.944195][T20881] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040820120000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2328.001061][T20887] loop4: detected capacity change from 0 to 264192 [ 2328.010209][T20881] loop5: detected capacity change from 0 to 4 [ 2328.018176][T20881] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2328.038725][T20887] EXT4-fs (loop4): #blocks per group too big: 1342193664 18:53:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xf, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040035b0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2328.090363][T20887] loop4: detected capacity change from 0 to 264192 [ 2328.090704][T20893] loop1: detected capacity change from 0 to 4 [ 2328.104641][T20887] EXT4-fs (loop4): #blocks per group too big: 1342193664 [ 2328.122434][T20893] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2328.169724][T20893] loop1: detected capacity change from 0 to 4 [ 2328.177529][T20893] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:42 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2328.234152][T20900] loop5: detected capacity change from 0 to 4 [ 2328.262826][T20900] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2328.289736][T20900] loop5: detected capacity change from 0 to 4 [ 2328.296938][T20900] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2328.329456][T20907] loop4: detected capacity change from 0 to 264192 18:53:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x10, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040a30120000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2328.347717][T20907] EXT4-fs (loop4): #blocks per group too big: 1526939648 [ 2328.410019][T20907] loop4: detected capacity change from 0 to 264192 [ 2328.417052][T20907] EXT4-fs (loop4): #blocks per group too big: 1526939648 [ 2328.424985][T20912] loop1: detected capacity change from 0 to 4 [ 2328.442768][T20912] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000600040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2328.483836][T20912] loop1: detected capacity change from 0 to 4 [ 2328.496166][T20912] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:42 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x11, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2328.532569][T20920] loop5: detected capacity change from 0 to 4 [ 2328.569384][T20920] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2328.640121][T20920] loop5: detected capacity change from 0 to 4 [ 2328.646730][T20920] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2328.673387][T20927] loop4: detected capacity change from 0 to 264192 18:53:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040040220000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2328.691734][T20927] EXT4-fs (loop4): #blocks per group too big: 1610629120 18:53:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x12, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2328.740409][T20927] loop4: detected capacity change from 0 to 264192 [ 2328.749552][T20933] loop1: detected capacity change from 0 to 4 [ 2328.758237][T20927] EXT4-fs (loop4): #blocks per group too big: 1610629120 [ 2328.772084][T20933] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000680040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2328.831967][T20933] loop1: detected capacity change from 0 to 4 [ 2328.841574][T20933] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2328.870253][T20939] loop5: detected capacity change from 0 to 4 18:53:42 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2328.892153][T20939] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2328.930328][T20939] loop5: detected capacity change from 0 to 4 [ 2328.937857][T20939] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x27, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000000407d0220000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2329.021353][T20948] loop4: detected capacity change from 0 to 264192 [ 2329.039594][T20948] EXT4-fs (loop4): #blocks per group too big: 1744846848 [ 2329.058776][T20951] loop1: detected capacity change from 0 to 4 [ 2329.069558][T20951] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2329.080216][T20948] loop4: detected capacity change from 0 to 264192 [ 2329.087490][T20948] EXT4-fs (loop4): #blocks per group too big: 1744846848 [ 2329.109642][T20951] loop1: detected capacity change from 0 to 4 [ 2329.116129][T20951] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:43 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040006c0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2329.211634][T20959] loop5: detected capacity change from 0 to 4 [ 2329.236961][T20959] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2329.283527][T20959] loop5: detected capacity change from 0 to 4 [ 2329.291428][T20959] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2329.312282][T20965] loop1: detected capacity change from 0 to 4 [ 2329.318876][T20966] loop4: detected capacity change from 0 to 264192 18:53:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000320000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2329.330493][T20965] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2329.345180][T20966] EXT4-fs (loop4): #blocks per group too big: 1811955712 [ 2329.362437][T20965] loop1: detected capacity change from 0 to 4 [ 2329.369418][T20965] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:43 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2329.381681][T20966] loop4: detected capacity change from 0 to 264192 [ 2329.390149][T20966] EXT4-fs (loop4): #blocks per group too big: 1811955712 18:53:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040066f0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x4c, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2329.531227][T20977] loop5: detected capacity change from 0 to 4 [ 2329.542119][T20977] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2329.573399][T20979] loop1: detected capacity change from 0 to 4 [ 2329.599470][T20977] loop5: detected capacity change from 0 to 4 [ 2329.606369][T20979] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2329.615194][T20977] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2329.639751][T20979] loop1: detected capacity change from 0 to 4 [ 2329.649288][T20979] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2329.661065][T20986] loop4: detected capacity change from 0 to 264192 18:53:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040020420000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:43 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2329.683302][T20986] EXT4-fs (loop4): #blocks per group too big: 1862680576 [ 2329.739800][T20986] loop4: detected capacity change from 0 to 264192 [ 2329.747082][T20986] EXT4-fs (loop4): #blocks per group too big: 1862680576 18:53:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000740040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2329.819958][T20992] loop5: detected capacity change from 0 to 4 [ 2329.841588][T20992] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2329.895023][T21000] loop1: detected capacity change from 0 to 4 [ 2329.910606][T20992] loop5: detected capacity change from 0 to 4 [ 2329.913670][T21000] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2329.925624][T20992] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040060420000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2329.985050][T21000] loop1: detected capacity change from 0 to 4 [ 2330.006646][T21004] loop4: detected capacity change from 0 to 264192 [ 2330.008827][T21000] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2330.032675][T21004] EXT4-fs (loop4): #blocks per group too big: 1946173440 18:53:44 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:44 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x74, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2330.112373][T21004] loop4: detected capacity change from 0 to 264192 [ 2330.128656][T21004] EXT4-fs (loop4): #blocks per group too big: 1946173440 18:53:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000760040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2330.162411][T21013] loop5: detected capacity change from 0 to 4 [ 2330.181088][T21013] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2330.219551][T21013] loop5: detected capacity change from 0 to 4 [ 2330.226072][T21013] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2330.248116][T21017] loop1: detected capacity change from 0 to 4 18:53:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040100420000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:44 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2330.273293][T21017] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2330.329559][T21017] loop1: detected capacity change from 0 to 4 [ 2330.338678][T21017] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:44 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2330.391659][T21026] loop4: detected capacity change from 0 to 264192 18:53:44 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2330.433829][T21032] loop5: detected capacity change from 0 to 4 [ 2330.448828][T21026] EXT4-fs (loop4): #blocks per group too big: 1979727872 [ 2330.471852][T21032] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xc0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040007a0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2330.493468][T21026] loop4: detected capacity change from 0 to 264192 [ 2330.508898][T21026] EXT4-fs (loop4): #blocks per group too big: 1979727872 [ 2330.520820][T21032] loop5: detected capacity change from 0 to 4 [ 2330.528003][T21032] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000520000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2330.602616][T21037] loop1: detected capacity change from 0 to 4 [ 2330.617114][T21037] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:44 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2330.665412][T21037] loop1: detected capacity change from 0 to 4 [ 2330.675031][T21037] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:44 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2330.719453][T21047] loop4: detected capacity change from 0 to 264192 [ 2330.735580][T21047] EXT4-fs (loop4): #blocks per group too big: 2046836736 [ 2330.758915][T21049] loop5: detected capacity change from 0 to 4 [ 2330.769817][T21049] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2330.801036][T21047] loop4: detected capacity change from 0 to 264192 18:53:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:44 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x80ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004003890040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2330.818772][T21047] EXT4-fs (loop4): #blocks per group too big: 2046836736 [ 2330.826652][T21049] loop5: detected capacity change from 0 to 4 [ 2330.838359][T21049] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000620000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2330.915971][T21058] loop1: detected capacity change from 0 to 4 [ 2330.934839][T21058] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x92030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2330.969864][T21058] loop1: detected capacity change from 0 to 4 [ 2330.977319][T21058] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:45 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2331.052537][T21067] loop4: detected capacity change from 0 to 264192 [ 2331.070990][T21067] EXT4-fs (loop4): #blocks per group too big: 2298691584 [ 2331.081640][T21069] loop5: detected capacity change from 0 to 4 [ 2331.094815][T21069] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2331.113930][T21067] loop4: detected capacity change from 0 to 264192 [ 2331.124522][T21067] EXT4-fs (loop4): #blocks per group too big: 2298691584 [ 2331.133955][T21069] loop5: detected capacity change from 0 to 4 18:53:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040018a0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2331.149298][T21069] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040040620000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2331.201867][T21076] loop1: detected capacity change from 0 to 4 [ 2331.219202][T21076] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:45 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2331.269975][T21076] loop1: detected capacity change from 0 to 4 [ 2331.279351][T21076] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2331.330490][T21082] loop4: detected capacity change from 0 to 264192 [ 2331.356462][T21082] EXT4-fs (loop4): #blocks per group too big: 2315337728 18:53:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2331.394546][T21089] loop5: detected capacity change from 0 to 4 [ 2331.406564][T21082] loop4: detected capacity change from 0 to 264192 [ 2331.424564][T21089] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2331.443418][T21082] EXT4-fs (loop4): #blocks per group too big: 2315337728 [ 2331.476376][T21092] loop1: detected capacity change from 0 to 4 [ 2331.485602][T21089] loop5: detected capacity change from 0 to 4 18:53:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004002a00040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2331.493464][T21089] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2331.504349][T21092] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000720000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:45 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2331.560591][T21092] loop1: detected capacity change from 0 to 4 [ 2331.579152][T21092] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2331.687970][T21102] loop4: detected capacity change from 0 to 264192 [ 2331.710570][T21102] EXT4-fs (loop4): #blocks per group too big: 2684502016 [ 2331.742810][T21105] loop5: detected capacity change from 0 to 4 [ 2331.760599][T21102] loop4: detected capacity change from 0 to 264192 [ 2331.769784][T21105] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2331.780310][T21102] EXT4-fs (loop4): #blocks per group too big: 2684502016 [ 2331.793176][T21107] loop1: detected capacity change from 0 to 4 [ 2331.810028][T21107] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2331.822547][T21105] loop5: detected capacity change from 0 to 4 18:53:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000a40040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000920000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2331.840313][T21105] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2331.862995][T21107] loop1: detected capacity change from 0 to 4 [ 2331.878731][T21107] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x5, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:46 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2332.017785][T21121] loop4: detected capacity change from 0 to 264192 [ 2332.028294][T21122] loop5: detected capacity change from 0 to 4 [ 2332.038898][T21121] EXT4-fs (loop4): #blocks per group too big: 2751479808 [ 2332.052133][T21122] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004001b00040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2332.070169][T21121] loop4: detected capacity change from 0 to 264192 [ 2332.078229][T21121] EXT4-fs (loop4): #blocks per group too big: 2751479808 [ 2332.100858][T21122] loop5: detected capacity change from 0 to 4 18:53:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000a20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2332.114391][T21122] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2332.140523][T21128] loop1: detected capacity change from 0 to 4 [ 2332.156914][T21128] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2332.213786][T21128] loop1: detected capacity change from 0 to 4 [ 2332.220760][T21128] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:46 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2332.300697][T21136] loop4: detected capacity change from 0 to 264192 [ 2332.317996][T21136] EXT4-fs (loop4): #blocks per group too big: 2952871936 [ 2332.346945][T21136] loop4: detected capacity change from 0 to 264192 [ 2332.356940][T21136] EXT4-fs (loop4): #blocks per group too big: 2952871936 [ 2332.368770][T21140] loop5: detected capacity change from 0 to 4 18:53:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000bb0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2332.398816][T21140] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2332.420061][T21144] loop1: detected capacity change from 0 to 4 [ 2332.434081][T21144] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2332.469881][T21140] loop5: detected capacity change from 0 to 4 [ 2332.470632][T21144] loop1: detected capacity change from 0 to 4 [ 2332.484030][T21140] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2332.494860][T21144] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:46 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000b20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2332.595662][T21151] loop4: detected capacity change from 0 to 264192 [ 2332.622491][T21151] EXT4-fs (loop4): #blocks per group too big: 3137355776 18:53:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2332.659906][T21151] loop4: detected capacity change from 0 to 264192 [ 2332.683248][T21151] EXT4-fs (loop4): #blocks per group too big: 3137355776 [ 2332.709116][T21160] loop1: detected capacity change from 0 to 4 [ 2332.724985][T21160] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2332.734213][T21161] loop5: detected capacity change from 0 to 4 18:53:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004001bb0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2332.754269][T21161] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2332.800758][T21160] loop1: detected capacity change from 0 to 4 [ 2332.807693][T21161] loop5: detected capacity change from 0 to 4 [ 2332.818048][T21160] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2332.833241][T21161] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:46 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000c20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2332.911372][T21171] loop4: detected capacity change from 0 to 264192 18:53:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2332.952127][T21171] EXT4-fs (loop4): #blocks per group too big: 3137421312 [ 2333.013456][T21171] loop4: detected capacity change from 0 to 264192 [ 2333.021410][T21171] EXT4-fs (loop4): #blocks per group too big: 3137421312 [ 2333.032045][T21174] loop1: detected capacity change from 0 to 4 18:53:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004003e00040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2333.057265][T21177] loop5: detected capacity change from 0 to 4 [ 2333.063607][T21174] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2333.085861][T21177] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2333.114937][T21174] loop1: detected capacity change from 0 to 4 [ 2333.128062][T21174] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xa, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:47 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2333.160033][T21177] loop5: detected capacity change from 0 to 4 [ 2333.179661][T21177] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000d20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2333.230001][T21185] loop4: detected capacity change from 0 to 264192 [ 2333.247159][T21185] EXT4-fs (loop4): #blocks per group too big: 3758309376 18:53:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2333.302343][T21185] loop4: detected capacity change from 0 to 264192 [ 2333.313860][T21185] EXT4-fs (loop4): #blocks per group too big: 3758309376 [ 2333.321518][T21191] loop1: detected capacity change from 0 to 4 [ 2333.343000][T21191] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2333.378140][T21197] loop5: detected capacity change from 0 to 4 18:53:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xb, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004001f90040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2333.389995][T21191] loop1: detected capacity change from 0 to 4 [ 2333.404058][T21191] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2333.427248][T21197] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:47 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f0000000000000000d9000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2333.463448][T21197] loop5: detected capacity change from 0 to 4 [ 2333.471059][T21197] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000e20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xc, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2333.571141][T21208] loop4: detected capacity change from 0 to 264192 [ 2333.587250][T21208] EXT4-fs (loop4): #blocks per group too big: 4177608704 [ 2333.604221][T21211] loop1: detected capacity change from 0 to 4 [ 2333.618927][T21211] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2333.641601][T21208] loop4: detected capacity change from 0 to 264192 [ 2333.650751][T21208] EXT4-fs (loop4): #blocks per group too big: 4177608704 [ 2333.660957][T21211] loop1: detected capacity change from 0 to 4 18:53:47 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040fffe0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2333.668383][T21211] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2333.690977][T21215] loop5: detected capacity change from 0 to 4 [ 2333.707988][T21215] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2333.752512][T21215] loop5: detected capacity change from 0 to 4 [ 2333.764371][T21215] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xd, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000f20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2333.859181][T21224] loop1: detected capacity change from 0 to 4 [ 2333.875092][T21224] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2333.875868][T21225] loop4: detected capacity change from 0 to 264192 [ 2333.899450][T21225] EXT4-fs (loop4): #blocks per group too big: 4278140928 [ 2333.920117][T21225] loop4: detected capacity change from 0 to 264192 [ 2333.927487][T21225] EXT4-fs (loop4): #blocks per group too big: 4278140928 [ 2333.939967][T21224] loop1: detected capacity change from 0 to 4 [ 2333.946574][T21224] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f00000000000000010000000100000000400fff0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:48 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f0000000000000000db000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xe, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2333.993810][T21234] loop5: detected capacity change from 0 to 4 [ 2334.016292][T21234] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2334.079909][T21234] loop5: detected capacity change from 0 to 4 [ 2334.087391][T21234] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040041020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2334.122309][T21237] loop4: detected capacity change from 0 to 264192 [ 2334.145702][T21237] EXT4-fs (loop4): #blocks per group too big: 4279189504 18:53:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xf, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2334.189524][T21246] loop1: detected capacity change from 0 to 4 [ 2334.196104][T21237] loop4: detected capacity change from 0 to 264192 [ 2334.204070][T21237] EXT4-fs (loop4): #blocks per group too big: 4279189504 [ 2334.219568][T21246] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040feff0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2334.259424][T21246] loop1: detected capacity change from 0 to 4 [ 2334.268520][T21246] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2334.287997][T21249] loop5: detected capacity change from 0 to 4 18:53:48 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2334.303578][T21249] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040201020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2334.363318][T21249] loop5: detected capacity change from 0 to 4 [ 2334.374783][T21249] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x10, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2334.433520][T21259] loop4: detected capacity change from 0 to 264192 [ 2334.464132][T21259] EXT4-fs (loop4): #blocks per group too big: 4294852608 [ 2334.489190][T21261] loop1: detected capacity change from 0 to 4 [ 2334.510377][T21259] loop4: detected capacity change from 0 to 264192 [ 2334.511600][T21261] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2334.527061][T21259] EXT4-fs (loop4): #blocks per group too big: 4294852608 18:53:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2334.582020][T21261] loop1: detected capacity change from 0 to 4 [ 2334.592519][T21266] loop5: detected capacity change from 0 to 4 [ 2334.613940][T21261] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000020040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x11, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:48 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2334.629316][T21266] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2334.691772][T21266] loop5: detected capacity change from 0 to 4 [ 2334.698380][T21266] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2334.740075][T21276] loop4: detected capacity change from 0 to 264192 [ 2334.774788][T21276] EXT4-fs (loop4): #blocks per group too big: 33570816 18:53:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040001120000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x12, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2334.787573][T21280] loop1: detected capacity change from 0 to 4 [ 2334.808720][T21280] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2334.832063][T21276] loop4: detected capacity change from 0 to 264192 18:53:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2334.839795][T21280] loop1: detected capacity change from 0 to 4 [ 2334.846977][T21280] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2334.856441][T21276] EXT4-fs (loop4): #blocks per group too big: 33570816 18:53:48 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000030040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2334.966314][T21289] loop5: detected capacity change from 0 to 4 [ 2334.991090][T21289] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:49 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x27, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2335.031869][T21289] loop5: detected capacity change from 0 to 4 [ 2335.039229][T21289] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040001220000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2335.097783][T21296] loop1: detected capacity change from 0 to 4 [ 2335.104725][T21297] loop4: detected capacity change from 0 to 264192 [ 2335.121763][T21296] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2335.130664][T21297] EXT4-fs (loop4): #blocks per group too big: 50348032 18:53:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2335.169531][T21296] loop1: detected capacity change from 0 to 4 [ 2335.187120][T21297] loop4: detected capacity change from 0 to 264192 [ 2335.195630][T21296] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2335.204940][T21297] EXT4-fs (loop4): #blocks per group too big: 50348032 18:53:49 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f0000000000000011e0000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000040040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x48, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:49 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2335.287043][T21308] loop5: detected capacity change from 0 to 4 [ 2335.305411][T21308] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2335.353183][T21308] loop5: detected capacity change from 0 to 4 [ 2335.360260][T21308] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040002020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2335.413724][T21314] loop1: detected capacity change from 0 to 4 [ 2335.428474][T21315] loop4: detected capacity change from 0 to 264192 [ 2335.446800][T21314] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2335.456916][T21315] EXT4-fs (loop4): #blocks per group too big: 67125248 18:53:49 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x4c, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2335.491082][T21314] loop1: detected capacity change from 0 to 4 [ 2335.503294][T21315] loop4: detected capacity change from 0 to 264192 [ 2335.514816][T21314] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2335.524172][T21315] EXT4-fs (loop4): #blocks per group too big: 67125248 18:53:49 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000050040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:49 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2335.576383][T21324] loop5: detected capacity change from 0 to 4 [ 2335.592335][T21324] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2335.640193][T21324] loop5: detected capacity change from 0 to 4 [ 2335.647544][T21324] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040102020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x68, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:49 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2335.739746][T21335] loop4: detected capacity change from 0 to 264192 [ 2335.746882][T21336] loop1: detected capacity change from 0 to 4 [ 2335.761348][T21335] EXT4-fs (loop4): #blocks per group too big: 83902464 [ 2335.770443][T21336] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2335.810429][T21335] loop4: detected capacity change from 0 to 264192 [ 2335.818135][T21336] loop1: detected capacity change from 0 to 4 [ 2335.825289][T21336] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2335.834002][T21335] EXT4-fs (loop4): #blocks per group too big: 83902464 18:53:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:50 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000060040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2335.871325][T21344] loop5: detected capacity change from 0 to 4 [ 2335.892307][T21344] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x6c, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2335.972012][T21344] loop5: detected capacity change from 0 to 4 [ 2335.989606][T21344] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040002220000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2336.061378][T21354] loop1: detected capacity change from 0 to 4 [ 2336.078136][T21357] loop4: detected capacity change from 0 to 264192 [ 2336.084949][T21354] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2336.102646][T21357] EXT4-fs (loop4): #blocks per group too big: 100679680 18:53:50 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2336.120200][T21354] loop1: detected capacity change from 0 to 4 [ 2336.127489][T21354] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2336.138155][T21357] loop4: detected capacity change from 0 to 264192 [ 2336.145531][T21357] EXT4-fs (loop4): #blocks per group too big: 100679680 18:53:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000070040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x74, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2336.235718][T21365] loop5: detected capacity change from 0 to 4 [ 2336.252379][T21365] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2336.290589][T21365] loop5: detected capacity change from 0 to 4 [ 2336.298215][T21365] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2336.328196][T21369] loop1: detected capacity change from 0 to 4 18:53:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040002520000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2336.355610][T21369] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2336.382522][T21374] loop4: detected capacity change from 0 to 264192 [ 2336.398424][T21374] EXT4-fs (loop4): #blocks per group too big: 117456896 18:53:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x7a, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:50 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2336.412756][T21369] loop1: detected capacity change from 0 to 4 [ 2336.425470][T21369] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2336.437584][T21374] loop4: detected capacity change from 0 to 264192 [ 2336.446894][T21374] EXT4-fs (loop4): #blocks per group too big: 117456896 18:53:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000080040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2336.539734][T21382] loop5: detected capacity change from 0 to 4 [ 2336.555819][T21382] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2336.579933][T21382] loop5: detected capacity change from 0 to 4 [ 2336.587356][T21382] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040002e20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2336.650358][T21390] loop1: detected capacity change from 0 to 4 [ 2336.674313][T21390] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xc0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2336.696901][T21394] loop4: detected capacity change from 0 to 264192 [ 2336.716757][T21394] EXT4-fs (loop4): #blocks per group too big: 134234112 [ 2336.726882][T21390] loop1: detected capacity change from 0 to 4 [ 2336.734132][T21390] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:50 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2336.760063][T21394] loop4: detected capacity change from 0 to 264192 [ 2336.767108][T21394] EXT4-fs (loop4): #blocks per group too big: 134234112 18:53:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000090040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2336.842403][T21399] loop5: detected capacity change from 0 to 4 [ 2336.863906][T21399] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2336.912830][T21399] loop5: detected capacity change from 0 to 4 [ 2336.920574][T21399] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040003f20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2336.959610][T21407] loop1: detected capacity change from 0 to 4 [ 2336.975692][T21407] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2337.009368][T21409] loop4: detected capacity change from 0 to 264192 [ 2337.031603][T21409] EXT4-fs (loop4): #blocks per group too big: 151011328 [ 2337.040779][T21407] loop1: detected capacity change from 0 to 4 [ 2337.047617][T21407] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:51 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2337.112908][T21409] loop4: detected capacity change from 0 to 264192 [ 2337.125265][T21409] EXT4-fs (loop4): #blocks per group too big: 151011328 [ 2337.136600][T21419] loop5: detected capacity change from 0 to 4 18:53:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040000a0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2337.162319][T21419] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2337.191083][T21419] loop5: detected capacity change from 0 to 4 [ 2337.197809][T21419] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040004020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2337.239752][T21423] loop1: detected capacity change from 0 to 4 [ 2337.257603][T21423] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2337.319529][T21423] loop1: detected capacity change from 0 to 4 [ 2337.329950][T21423] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2337.354941][T21431] loop4: detected capacity change from 0 to 264192 18:53:51 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2337.372844][T21431] EXT4-fs (loop4): #blocks per group too big: 167788544 18:53:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2337.416090][T21431] loop4: detected capacity change from 0 to 264192 [ 2337.423516][T21431] EXT4-fs (loop4): #blocks per group too big: 167788544 18:53:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040000b0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x392}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2337.456354][T21437] loop5: detected capacity change from 0 to 4 [ 2337.480999][T21437] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2337.531602][T21437] loop5: detected capacity change from 0 to 4 [ 2337.539362][T21437] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040004820000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2337.576529][T21446] loop1: detected capacity change from 0 to 4 [ 2337.596900][T21446] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2337.639439][T21446] loop1: detected capacity change from 0 to 4 [ 2337.646532][T21446] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2337.655906][T21450] loop4: detected capacity change from 0 to 264192 [ 2337.670047][T21450] EXT4-fs (loop4): #blocks per group too big: 184565760 18:53:51 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2337.700667][T21450] loop4: detected capacity change from 0 to 264192 [ 2337.709077][T21450] EXT4-fs (loop4): #blocks per group too big: 184565760 [ 2337.754661][T21458] loop5: detected capacity change from 0 to 4 [ 2337.776733][T21458] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040000c0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2337.818615][T21458] loop5: detected capacity change from 0 to 4 [ 2337.835555][T21458] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2337.846950][T21462] loop1: detected capacity change from 0 to 4 18:53:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040004c20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2337.878916][T21462] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2337.921013][T21462] loop1: detected capacity change from 0 to 4 [ 2337.927976][T21462] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:52 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2338.006923][T21471] loop4: detected capacity change from 0 to 264192 [ 2338.036640][T21474] loop5: detected capacity change from 0 to 4 18:53:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2338.052104][T21471] EXT4-fs (loop4): #blocks per group too big: 201342976 [ 2338.074188][T21474] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2338.094375][T21471] loop4: detected capacity change from 0 to 264192 18:53:52 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040000d0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2338.110490][T21471] EXT4-fs (loop4): #blocks per group too big: 201342976 [ 2338.129825][T21474] loop5: detected capacity change from 0 to 4 [ 2338.137322][T21474] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040006020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2338.180161][T21479] loop1: detected capacity change from 0 to 4 [ 2338.202314][T21479] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2338.247867][T21479] loop1: detected capacity change from 0 to 4 [ 2338.254753][T21479] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:52 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:52 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2338.359551][T21490] loop4: detected capacity change from 0 to 264192 [ 2338.366593][T21492] loop5: detected capacity change from 0 to 4 [ 2338.384023][T21492] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2338.393598][T21490] EXT4-fs (loop4): #blocks per group too big: 218120192 18:53:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2338.440116][T21490] loop4: detected capacity change from 0 to 264192 [ 2338.448664][T21490] EXT4-fs (loop4): #blocks per group too big: 218120192 [ 2338.456316][T21492] loop5: detected capacity change from 0 to 4 [ 2338.470463][T21499] loop1: detected capacity change from 0 to 4 [ 2338.478664][T21492] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2338.501481][T21499] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x7, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:52 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040000e0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040006820000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2338.589990][T21499] loop1: detected capacity change from 0 to 4 [ 2338.596345][T21499] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:52 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2338.706617][T21513] loop4: detected capacity change from 0 to 264192 [ 2338.721478][T21514] loop5: detected capacity change from 0 to 4 [ 2338.730959][T21513] EXT4-fs (loop4): #blocks per group too big: 234897408 18:53:52 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2338.761004][T21514] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2338.772251][T21513] loop4: detected capacity change from 0 to 264192 [ 2338.780551][T21513] EXT4-fs (loop4): #blocks per group too big: 234897408 18:53:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040000f0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2338.810773][T21514] loop5: detected capacity change from 0 to 4 [ 2338.817721][T21514] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2338.850360][T21516] loop1: detected capacity change from 0 to 4 18:53:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040006c20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2338.869645][T21516] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2338.921907][T21516] loop1: detected capacity change from 0 to 4 [ 2338.928656][T21516] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:53 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x9, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2338.999938][T21526] loop4: detected capacity change from 0 to 264192 [ 2339.014640][T21526] EXT4-fs (loop4): #blocks per group too big: 251674624 [ 2339.050100][T21526] loop4: detected capacity change from 0 to 264192 [ 2339.057473][T21526] EXT4-fs (loop4): #blocks per group too big: 251674624 18:53:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000100040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2339.092974][T21530] loop5: detected capacity change from 0 to 4 [ 2339.115249][T21530] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2339.168052][T21536] loop1: detected capacity change from 0 to 4 [ 2339.189672][T21530] loop5: detected capacity change from 0 to 4 [ 2339.201332][T21530] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xa, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2339.211014][T21536] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040007420000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2339.269815][T21536] loop1: detected capacity change from 0 to 4 [ 2339.288228][T21536] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:53 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2339.327645][T21543] loop4: detected capacity change from 0 to 264192 [ 2339.348901][T21543] EXT4-fs (loop4): #blocks per group too big: 268451840 18:53:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000110040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2339.400647][T21543] loop4: detected capacity change from 0 to 264192 [ 2339.407781][T21543] EXT4-fs (loop4): #blocks per group too big: 268451840 18:53:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xb, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2339.481625][T21551] loop5: detected capacity change from 0 to 4 [ 2339.499295][T21551] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2339.526199][T21555] loop1: detected capacity change from 0 to 4 [ 2339.543079][T21555] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2339.573148][T21551] loop5: detected capacity change from 0 to 4 [ 2339.580751][T21551] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2339.592478][T21555] loop1: detected capacity change from 0 to 4 [ 2339.599084][T21555] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:53 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2339.631833][T21561] loop4: detected capacity change from 0 to 264192 [ 2339.660551][T21561] EXT4-fs (loop4): #blocks per group too big: 285229056 18:53:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040007a20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xc, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2339.699830][T21561] loop4: detected capacity change from 0 to 264192 [ 2339.718702][T21561] EXT4-fs (loop4): #blocks per group too big: 285229056 18:53:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000120040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2339.860752][T21573] loop5: detected capacity change from 0 to 4 [ 2339.876762][T21573] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2339.886627][T21574] loop1: detected capacity change from 0 to 4 [ 2339.902498][T21574] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2339.914241][T21573] loop5: detected capacity change from 0 to 4 [ 2339.928153][T21573] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040017d20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xd, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2339.959981][T21574] loop1: detected capacity change from 0 to 4 [ 2339.970713][T21581] loop4: detected capacity change from 0 to 264192 [ 2339.981921][T21574] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2339.998314][T21581] EXT4-fs (loop4): #blocks per group too big: 302006272 18:53:54 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000130040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2340.050433][T21581] loop4: detected capacity change from 0 to 264192 [ 2340.057549][T21581] EXT4-fs (loop4): #blocks per group too big: 302006272 18:53:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2340.112649][T21588] loop5: detected capacity change from 0 to 4 [ 2340.134037][T21588] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xe, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2340.190720][T21588] loop5: detected capacity change from 0 to 4 [ 2340.197677][T21588] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2340.209114][T21593] loop1: detected capacity change from 0 to 4 [ 2340.232532][T21593] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2340.268405][T21597] loop4: detected capacity change from 0 to 264192 18:53:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040027d20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2340.291728][T21593] loop1: detected capacity change from 0 to 4 [ 2340.299070][T21597] EXT4-fs (loop4): #blocks per group too big: 318783488 [ 2340.306180][T21593] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:54 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2340.353393][T21597] loop4: detected capacity change from 0 to 264192 [ 2340.363277][T21597] EXT4-fs (loop4): #blocks per group too big: 318783488 18:53:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000180040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2340.440312][T21609] loop5: detected capacity change from 0 to 4 [ 2340.474210][T21609] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xf, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2340.491032][T21612] loop1: detected capacity change from 0 to 4 [ 2340.501865][T21612] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2340.552713][T21609] loop5: detected capacity change from 0 to 4 [ 2340.559204][T21612] loop1: detected capacity change from 0 to 4 [ 2340.565974][T21609] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2340.577196][T21612] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:54 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040018220000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x10, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2340.666581][T21616] loop4: detected capacity change from 0 to 264192 [ 2340.692693][T21616] EXT4-fs (loop4): #blocks per group too big: 402669568 [ 2340.759823][T21616] loop4: detected capacity change from 0 to 264192 [ 2340.766734][T21616] EXT4-fs (loop4): #blocks per group too big: 402669568 [ 2340.794530][T21625] loop1: detected capacity change from 0 to 4 [ 2340.801509][T21626] loop5: detected capacity change from 0 to 4 18:53:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040001b0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2340.822605][T21625] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2340.831840][T21626] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2340.869876][T21625] loop1: detected capacity change from 0 to 4 [ 2340.876874][T21626] loop5: detected capacity change from 0 to 4 [ 2340.896737][T21625] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2340.905851][T21626] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x11, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:55 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f00000000000000010000000100000000400000004001a320000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2340.949000][T21636] loop4: detected capacity change from 0 to 264192 [ 2340.966870][T21636] EXT4-fs (loop4): #blocks per group too big: 453001216 18:53:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2341.010090][T21636] loop4: detected capacity change from 0 to 264192 [ 2341.017931][T21636] EXT4-fs (loop4): #blocks per group too big: 453001216 18:53:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000220040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x12, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2341.127257][T21648] loop5: detected capacity change from 0 to 4 [ 2341.148041][T21648] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2341.159740][T21649] loop1: detected capacity change from 0 to 4 18:53:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x9203}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2341.189807][T21648] loop5: detected capacity change from 0 to 4 [ 2341.198460][T21649] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2341.207842][T21648] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040fffe20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2341.243381][T21649] loop1: detected capacity change from 0 to 4 [ 2341.250158][T21649] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:55 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f0000000000000000db000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x27, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2341.319472][T21657] loop4: detected capacity change from 0 to 264192 [ 2341.338803][T21657] EXT4-fs (loop4): #blocks per group too big: 570441728 18:53:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2341.380177][T21657] loop4: detected capacity change from 0 to 264192 [ 2341.388326][T21657] EXT4-fs (loop4): #blocks per group too big: 570441728 18:53:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000230040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2341.433455][T21666] loop5: detected capacity change from 0 to 4 [ 2341.450877][T21666] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2341.460846][T21667] loop1: detected capacity change from 0 to 4 [ 2341.478263][T21668] ================================================================== [ 2341.486362][T21668] BUG: KCSAN: data-race in _find_next_bit / ext4_free_inode [ 2341.493652][T21668] [ 2341.495990][T21668] read-write to 0xffff88823ff27098 of 8 bytes by task 513 on cpu 1: [ 2341.503952][T21668] ext4_free_inode+0x5bf/0xa30 [ 2341.508724][T21668] ext4_evict_inode+0xbff/0xf10 [ 2341.513574][T21668] evict+0x1aa/0x410 [ 2341.517470][T21668] iput+0x3fa/0x510 [ 2341.521275][T21668] do_unlinkat+0x2d4/0x540 [ 2341.525693][T21668] __x64_sys_unlink+0x2c/0x30 [ 2341.530358][T21668] do_syscall_64+0x44/0xa0 [ 2341.534947][T21668] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2341.540850][T21668] [ 2341.543161][T21668] read to 0xffff88823ff27098 of 8 bytes by task 21668 on cpu 0: [ 2341.550780][T21668] _find_next_bit+0xe0/0x190 [ 2341.555370][T21668] find_inode_bit+0xc8/0x330 [ 2341.559959][T21668] __ext4_new_inode+0xc9a/0x2fc0 [ 2341.564902][T21668] ext4_symlink+0x2cc/0x700 [ 2341.569412][T21668] vfs_symlink+0x23f/0x350 [ 2341.573827][T21668] do_symlinkat+0x104/0x380 [ 2341.578332][T21668] __x64_sys_symlink+0x52/0x60 [ 2341.583109][T21668] do_syscall_64+0x44/0xa0 [ 2341.587531][T21668] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2341.593424][T21668] [ 2341.595738][T21668] value changed: 0x000003efffffffff -> 0x000003ef6fffffff [ 2341.602832][T21668] [ 2341.605164][T21668] Reported by Kernel Concurrency Sanitizer on: [ 2341.611297][T21668] CPU: 0 PID: 21668 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 2341.619705][T21668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2341.629754][T21668] ================================================================== [ 2341.639676][T21667] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2341.670941][T21666] loop5: detected capacity change from 0 to 4 18:53:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:55 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2341.680592][T21667] loop1: detected capacity change from 0 to 4 [ 2341.687490][T21674] loop4: detected capacity change from 0 to 264192 [ 2341.694320][T21666] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2341.705045][T21667] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2341.719728][T21674] EXT4-fs (loop4): #blocks per group too big: 587218944 18:53:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f0000000000000001000000010000000040000000400fff20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x48, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2341.759678][T21674] loop4: detected capacity change from 0 to 264192 [ 2341.768726][T21674] EXT4-fs (loop4): #blocks per group too big: 587218944 18:53:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000240040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2341.877815][T21682] loop1: detected capacity change from 0 to 4 [ 2341.899662][T21682] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x4c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2341.942777][T21688] loop5: detected capacity change from 0 to 4 [ 2341.952468][T21682] loop1: detected capacity change from 0 to 4 [ 2341.963432][T21688] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2341.973458][T21682] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:56 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f0000000000000000dd000000000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2342.033926][T21688] loop5: detected capacity change from 0 to 4 [ 2342.051570][T21688] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2342.063035][T21693] loop4: detected capacity change from 0 to 264192 18:53:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040feff20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2342.084939][T21693] EXT4-fs (loop4): #blocks per group too big: 603996160 18:53:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2342.131515][T21693] loop4: detected capacity change from 0 to 264192 [ 2342.140593][T21693] EXT4-fs (loop4): #blocks per group too big: 603996160 18:53:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000250040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2342.223191][T21703] loop1: detected capacity change from 0 to 4 [ 2342.251673][T21703] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x68, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2342.276229][T21706] loop5: detected capacity change from 0 to 4 [ 2342.292601][T21706] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2342.310946][T21703] loop1: detected capacity change from 0 to 4 18:53:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2342.319110][T21703] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:56 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2342.349784][T21706] loop5: detected capacity change from 0 to 4 [ 2342.356424][T21706] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000060000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2342.390218][T21711] loop4: detected capacity change from 0 to 264192 [ 2342.412300][T21711] EXT4-fs (loop4): #blocks per group too big: 620773376 18:53:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2342.470678][T21711] loop4: detected capacity change from 0 to 264192 [ 2342.482531][T21711] EXT4-fs (loop4): #blocks per group too big: 620773376 18:53:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040002e0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2342.550418][T21721] loop1: detected capacity change from 0 to 4 [ 2342.558816][T21722] loop5: detected capacity change from 0 to 4 [ 2342.568397][T21721] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2342.581204][T21722] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:56 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2342.613851][T21721] loop1: detected capacity change from 0 to 4 [ 2342.622271][T21722] loop5: detected capacity change from 0 to 4 [ 2342.623782][T21721] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2342.637820][T21722] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f00000000000000010000000100000000400000004000000a000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x74, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2342.755951][T21732] loop4: detected capacity change from 0 to 264192 [ 2342.768379][T21732] EXT4-fs (loop4): #blocks per group too big: 771768320 18:53:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2342.816614][T21732] loop4: detected capacity change from 0 to 264192 [ 2342.823815][T21732] EXT4-fs (loop4): #blocks per group too big: 771768320 [ 2342.855019][T21737] loop1: detected capacity change from 0 to 4 [ 2342.862007][T21739] loop5: detected capacity change from 0 to 4 [ 2342.873646][T21737] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2342.882749][T21739] EXT4-fs (loop5): invalid inodes per group: 10 [ 2342.882749][T21739] 18:53:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000320040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x7a, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2342.960242][T21739] loop5: detected capacity change from 0 to 4 [ 2342.966779][T21737] loop1: detected capacity change from 0 to 4 [ 2342.977975][T21739] EXT4-fs (loop5): invalid inodes per group: 10 [ 2342.977975][T21739] [ 2342.986792][T21737] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:57 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000011000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2343.037154][T21749] loop4: detected capacity change from 0 to 264192 [ 2343.063077][T21749] EXT4-fs (loop4): #blocks per group too big: 838877184 18:53:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xc0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2343.121662][T21749] loop4: detected capacity change from 0 to 264192 [ 2343.129044][T21749] EXT4-fs (loop4): #blocks per group too big: 838877184 18:53:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000480040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2343.204694][T21760] loop1: detected capacity change from 0 to 4 [ 2343.220644][T21761] loop5: detected capacity change from 0 to 4 [ 2343.229074][T21760] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2343.249343][T21761] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:57 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2343.292903][T21760] loop1: detected capacity change from 0 to 4 [ 2343.303139][T21760] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2343.314989][T21761] loop5: detected capacity change from 0 to 4 [ 2343.321648][T21761] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000012000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2343.384189][T21773] loop4: detected capacity change from 0 to 264192 [ 2343.401412][T21773] EXT4-fs (loop4): #blocks per group too big: 1207975936 18:53:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2343.449972][T21773] loop4: detected capacity change from 0 to 264192 [ 2343.457698][T21773] EXT4-fs (loop4): #blocks per group too big: 1207975936 [ 2343.516892][T21782] loop1: detected capacity change from 0 to 4 [ 2343.541756][T21784] loop5: detected capacity change from 0 to 4 [ 2343.548446][T21782] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040004c0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2343.567654][T21784] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2343.599951][T21782] loop1: detected capacity change from 0 to 4 [ 2343.606977][T21782] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:57 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2343.619106][T21784] loop5: detected capacity change from 0 to 4 [ 2343.631920][T21784] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000018000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2343.728789][T21794] loop4: detected capacity change from 0 to 264192 [ 2343.745365][T21794] EXT4-fs (loop4): #blocks per group too big: 1275084800 [ 2343.771327][T21794] loop4: detected capacity change from 0 to 264192 [ 2343.779044][T21794] EXT4-fs (loop4): #blocks per group too big: 1275084800 18:53:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000500040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2343.824876][T21802] loop5: detected capacity change from 0 to 4 [ 2343.825029][T21803] loop1: detected capacity change from 0 to 4 [ 2343.847238][T21803] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2343.859226][T21802] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:58 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2343.900173][T21803] loop1: detected capacity change from 0 to 4 [ 2343.906719][T21803] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2343.919386][T21802] loop5: detected capacity change from 0 to 4 [ 2343.926087][T21802] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000019000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2344.062659][T21813] loop4: detected capacity change from 0 to 264192 [ 2344.089941][T21813] EXT4-fs (loop4): #blocks per group too big: 1342193664 [ 2344.126674][T21818] loop5: detected capacity change from 0 to 4 [ 2344.133409][T21817] loop1: detected capacity change from 0 to 4 [ 2344.148158][T21817] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2344.148628][T21818] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2344.171412][T21817] loop1: detected capacity change from 0 to 4 [ 2344.178711][T21813] loop4: detected capacity change from 0 to 264192 [ 2344.186535][T21817] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2344.197975][T21818] loop5: detected capacity change from 0 to 4 [ 2344.204249][T21813] EXT4-fs (loop4): #blocks per group too big: 1342193664 [ 2344.211667][T21818] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:58 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000600040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f00000000000000010000000100000000400000004000001f000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2344.377455][T21829] loop1: detected capacity change from 0 to 4 [ 2344.395217][T21829] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2344.419994][T21835] loop4: detected capacity change from 0 to 264192 [ 2344.444122][T21835] EXT4-fs (loop4): #blocks per group too big: 1610629120 [ 2344.452985][T21829] loop1: detected capacity change from 0 to 4 [ 2344.463887][T21829] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2344.475827][T21839] loop5: detected capacity change from 0 to 4 18:53:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:58 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2344.486061][T21839] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2344.509857][T21835] loop4: detected capacity change from 0 to 264192 [ 2344.524213][T21835] EXT4-fs (loop4): #blocks per group too big: 1610629120 [ 2344.533906][T21839] loop5: detected capacity change from 0 to 4 18:53:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000220000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000680040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2344.546527][T21839] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2344.671115][T21847] loop1: detected capacity change from 0 to 4 [ 2344.697655][T21847] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2344.710181][T21850] loop4: detected capacity change from 0 to 264192 [ 2344.723427][T21850] EXT4-fs (loop4): #blocks per group too big: 1744846848 [ 2344.740275][T21847] loop1: detected capacity change from 0 to 4 [ 2344.746992][T21847] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:58 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2344.770059][T21854] loop5: detected capacity change from 0 to 4 [ 2344.787488][T21850] loop4: detected capacity change from 0 to 264192 [ 2344.796059][T21854] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2344.806821][T21850] EXT4-fs (loop4): #blocks per group too big: 1744846848 18:53:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040006c0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2344.855912][T21854] loop5: detected capacity change from 0 to 4 [ 2344.873478][T21854] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000320000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2344.983946][T21864] loop1: detected capacity change from 0 to 4 [ 2345.002097][T21864] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2345.036973][T21870] loop4: detected capacity change from 0 to 264192 [ 2345.057131][T21864] loop1: detected capacity change from 0 to 4 [ 2345.064043][T21864] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2345.073676][T21870] EXT4-fs (loop4): #blocks per group too big: 1811955712 18:53:59 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2345.124052][T21870] loop4: detected capacity change from 0 to 264192 [ 2345.132957][T21870] EXT4-fs (loop4): #blocks per group too big: 1811955712 [ 2345.145137][T21873] loop5: detected capacity change from 0 to 4 [ 2345.163171][T21873] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000740040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2345.199408][T21873] loop5: detected capacity change from 0 to 4 [ 2345.207281][T21873] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000420000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2345.314256][T21882] loop1: detected capacity change from 0 to 4 [ 2345.332777][T21882] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2345.380044][T21886] loop4: detected capacity change from 0 to 264192 [ 2345.387476][T21882] loop1: detected capacity change from 0 to 4 [ 2345.399078][T21886] EXT4-fs (loop4): #blocks per group too big: 1946173440 [ 2345.406767][T21882] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2345.440067][T21886] loop4: detected capacity change from 0 to 264192 [ 2345.447779][T21891] loop5: detected capacity change from 0 to 4 [ 2345.474252][T21891] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:59 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2345.484913][T21886] EXT4-fs (loop4): #blocks per group too big: 1946173440 18:53:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000760040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2345.540570][T21891] loop5: detected capacity change from 0 to 4 [ 2345.556328][T21891] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000520000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:53:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2345.632283][T21903] loop1: detected capacity change from 0 to 4 [ 2345.649101][T21903] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:53:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0xa, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:59 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2345.692107][T21903] loop1: detected capacity change from 0 to 4 [ 2345.699599][T21903] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2345.718913][T21907] loop4: detected capacity change from 0 to 264192 [ 2345.734566][T21907] EXT4-fs (loop4): #blocks per group too big: 1979727872 [ 2345.779641][T21907] loop4: detected capacity change from 0 to 264192 [ 2345.787713][T21907] EXT4-fs (loop4): #blocks per group too big: 1979727872 [ 2345.796937][T21912] loop5: detected capacity change from 0 to 4 18:53:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:53:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040007a0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2345.823357][T21912] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:53:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2345.880116][T21912] loop5: detected capacity change from 0 to 4 [ 2345.888904][T21912] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2345.906576][T21919] loop1: detected capacity change from 0 to 4 18:54:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0xb, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000620000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:54:00 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2345.926144][T21919] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2345.950290][T21919] loop1: detected capacity change from 0 to 4 [ 2345.960306][T21919] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:54:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2345.994977][T21925] loop4: detected capacity change from 0 to 264192 [ 2346.011479][T21925] EXT4-fs (loop4): #blocks per group too big: 2046836736 18:54:00 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2346.039670][T21925] loop4: detected capacity change from 0 to 264192 [ 2346.047697][T21925] EXT4-fs (loop4): #blocks per group too big: 2046836736 18:54:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000a40040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c65300000000004000000000000000000000000000000000079072601000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81066f03e9afec7f507c3c140aeb0006c04aaf3e", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:54:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0xc, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:00 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2346.146090][T21935] loop5: detected capacity change from 0 to 4 [ 2346.174389][T21935] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:54:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2346.206975][T21938] loop1: detected capacity change from 0 to 4 [ 2346.221041][T21935] loop5: detected capacity change from 0 to 4 [ 2346.221496][T21938] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2346.237647][T21935] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:54:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000720000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:54:00 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2346.272717][T21938] loop1: detected capacity change from 0 to 4 [ 2346.289755][T21938] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:54:00 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0xd, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2346.347018][T21943] loop4: detected capacity change from 0 to 264192 [ 2346.369133][T21943] EXT4-fs (loop4): #blocks per group too big: 2751479808 18:54:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2346.420878][T21943] loop4: detected capacity change from 0 to 264192 [ 2346.432700][T21943] EXT4-fs (loop4): #blocks per group too big: 2751479808 18:54:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000bb0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2346.474739][T21951] loop5: detected capacity change from 0 to 4 [ 2346.494818][T21951] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2346.516452][T21954] loop1: detected capacity change from 0 to 4 [ 2346.527098][T21954] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2346.551573][T21951] loop5: detected capacity change from 0 to 4 [ 2346.561245][T21951] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2346.561258][T21954] loop1: detected capacity change from 0 to 4 18:54:00 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000820000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2346.561598][T21954] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:54:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0xe, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:00 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f0000000000000000f2ffff7f000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:54:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2346.730136][T21963] loop4: detected capacity change from 0 to 264192 [ 2346.748394][T21963] EXT4-fs (loop4): #blocks per group too big: 3137355776 18:54:00 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2346.780215][T21963] loop4: detected capacity change from 0 to 264192 [ 2346.790658][T21963] EXT4-fs (loop4): #blocks per group too big: 3137355776 [ 2346.801428][T21971] loop5: detected capacity change from 0 to 4 [ 2346.814182][T21971] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:54:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0xf, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2346.840474][T21974] loop1: detected capacity change from 0 to 4 [ 2346.854479][T21974] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2346.869362][T21971] loop5: detected capacity change from 0 to 4 [ 2346.878005][T21971] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) 18:54:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000fe0040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2346.889641][T21974] loop1: detected capacity change from 0 to 4 [ 2346.896156][T21974] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:54:01 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:01 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:54:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000920000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:54:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x10, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2347.020331][T21984] loop4: detected capacity change from 0 to 264192 [ 2347.036876][T21984] EXT4-fs (loop4): #blocks per group too big: 4261429248 18:54:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0x92030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2347.060555][T21984] loop4: detected capacity change from 0 to 264192 [ 2347.069354][T21984] EXT4-fs (loop4): #blocks per group too big: 4261429248 18:54:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f0000000000000001000000010000000040008a0140000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:54:01 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2347.135818][T21993] loop5: detected capacity change from 0 to 4 [ 2347.142766][T21994] loop1: detected capacity change from 0 to 4 [ 2347.155859][T21993] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2347.169835][T21994] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:54:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x11, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2347.199781][T21993] loop5: detected capacity change from 0 to 4 [ 2347.210036][T21993] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2347.223449][T21994] loop1: detected capacity change from 0 to 4 [ 2347.230578][T21994] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:54:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000a20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:54:01 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="200000008000000006000086e940000000000000000000000100000001000000004000000040000020000000d3f4655f072700000000000053ef010001020000d3f4655f0000000000000000f9ffff7f000000000b00000000026ac2d07063cd147da40ffc7a6aa0ff53815eeb637bd01e92fde752142242b046592a071804ed8915d4e0c822a947386dcda040c2209292d2e641384fc6bce593f8ce7eca04aa510c76e3d5697181505000b77ae36615aa55b34430f516840000000000d95a8f000000000000000030a439c42c4728af3a75c3333fee3800f2425e238f9be0e9a00e9abd5cd4cf32d6291c796ba6d10a4a110108fd101370375410f4d49142b432", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:54:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:01 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2347.359768][T22003] loop4: detected capacity change from 0 to 264192 [ 2347.383831][T22003] EXT4-fs (loop4): #blocks per group too big: 2315272192 18:54:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x12, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2347.430594][T22003] loop4: detected capacity change from 0 to 264192 [ 2347.439003][T22003] EXT4-fs (loop4): #blocks per group too big: 2315272192 [ 2347.456493][T22010] loop5: detected capacity change from 0 to 4 18:54:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000b00140000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) 18:54:01 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2347.472442][T22010] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2347.488208][T22012] loop1: detected capacity change from 0 to 4 [ 2347.516723][T22012] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:54:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000b20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2347.551076][T22010] loop5: detected capacity change from 0 to 4 [ 2347.558180][T22010] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2347.572168][T22012] loop1: detected capacity change from 0 to 4 [ 2347.578577][T22012] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 18:54:01 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:54:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x27, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:01 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2347.632401][T22022] loop4: detected capacity change from 0 to 264192 [ 2347.657555][T22022] EXT4-fs (loop4): #blocks per group too big: 2952806400 [ 2347.690563][T22022] loop4: detected capacity change from 0 to 264192 [ 2347.697609][T22022] EXT4-fs (loop4): #blocks per group too big: 2952806400 [ 2347.735372][T22028] loop5: detected capacity change from 0 to 4 [ 2347.752634][T22028] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2347.766921][T22032] loop1: detected capacity change from 0 to 4 18:54:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000bb0140000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2347.781601][T22032] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2347.810430][T22028] loop5: detected capacity change from 0 to 4 [ 2347.834543][T22028] EXT4-fs (loop5): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2347.844649][T22032] loop1: detected capacity change from 0 to 4 18:54:01 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x48, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100002}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:54:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2347.858393][T22032] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 2347.868053][T22039] loop4: detected capacity change from 0 to 264192 [ 2347.887156][T22039] EXT4-fs (loop4): #blocks per group too big: 3137355776 18:54:02 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 18:54:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001020000000006000000600000000f000000000000000100000001000000004000000040000c20000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 2347.953875][T22039] loop4: detected capacity change from 0 to 264192 [ 2347.963541][T22039] EXT4-fs (loop4): #blocks per group too big: 3137355776 18:54:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000008000000006000000600000000f000000000000000100000001000000004000f90140000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="ed41000000080000d2f4655fd2d9655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000