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", 0x1000}], 0x8, &(0x7f0000001d00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x100, 0x40050}, {&(0x7f0000001e00)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002140)=[{&(0x7f0000001e80)="8e66b928e76dbd908542bc8322da405abd26609bb6c10a7ab6f3dbd95cf42afd16fef85c12748490e872a854cbdbfbf4c53e6e6fd755bcc833d5df4017c92fa073d355c5214b7fbc2d51f9f70ee939fa1c3af8ef5235ed2d00e97cdeaa4afe903c7412b5a346dafa82f85c542011d7f3ce6edc952be24b52bb48655416566f06979e7ee32a3e0b8c79c8c9c1ff87c23ca4320cf06106fbfc9aea9eb9ae749323824d87402d7e0b4c2b0a91122f49acad0f8884082e14d10a6a0f9c7a", 0xbc}, {&(0x7f0000001f40)="492a7f7bfdf786482b09c97b5941ce4321a46a6184bfe0d9335d0b8d87db062a16566bbaa2d8f5e184c672a50a", 0x2d}, {&(0x7f0000001f80)="cc620494e0c53195fb5fd83e61205f4f6babfef86a96bf82aee717b01a34c55dac073e369ea4de82b30021ac538b1fcdf4550bb71fe3360dffa3ffa81c0b56ad3f7142deeb6b098700ef4057353fe14ce23327fff25cd1da00bb10f66b362ca42fbc481222ef7a6c8479e27a288c9743b3e608bd3875d163f96a77f581d1ac64bc63528c53db71697ed0cd667c497be59786386994bec6", 0x97}, {&(0x7f0000002040)="f48b7fec278bbb2f249279b4b46f0afd636dafe05737ef", 0x17}, {&(0x7f0000002080)="26ec56bb60edc7d74cf1ef5ff05339dce5316a799c94af5d546a32ef2c837a4ed289b984a91473725aaa64d75aa400d5fe89cac3ad2bd53adf005b9a41d450924d889d91eacbc14d0c8244c786822e0b2e3e282a6d195574ef6b9e737c8cc7ba8b85cd8cdc8be6c8b5f3dd4e8d8a9932ab18ff27a9e747c529bf97cf2faa52b1e2bf6d8ecd3c55a40ab8ffc94b6aaea20a78621dfe2c7e", 0x97}], 0x5, &(0x7f0000002300)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60, 0x84}, {&(0x7f0000002380)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000024c0)=[{&(0x7f0000002400)="6b6ef923e4003d95573c76f4963a66c2973e73e141f453839a2b", 0x1a}, {&(0x7f0000002440)="fb8115684ad30a6e39ac4a755678ab67a339174b830510d0e9a056d8f7eb27618c252127790c05962a32612b307362a007f803b973990bd671c299a0ebd9cadd8011e21620b624507aff59e7e470d1884422aa1e62ca0ac2a2f53cb449ce3c0478cf43dd579e60cfe236f2bf57da2b29dec14c23f071cc1515d912", 0x7b}], 0x2, &(0x7f00000026c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r3}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, 0xffffffffffffffff}}}], 0x108, 0x4008001}], 0x3, 0x4040000) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r8, 0x0) preadv(r8, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@fat=@umask}]}) 12:59:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)) 12:59:01 executing program 4: sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = openat$tcp_mem(0xffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) fstat(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r3) statx(0xffffffffffffffff, &(0x7f0000002500)='./file0\x00', 0x800, 0x8, &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpid() r7 = getuid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002800)=[{&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000080)="fca4d158b6ef3c605b6a4931664a4f771848b3251e2857e84d1572f8bf5a9e84240c8474dad20bc288c369abf01b834293fb", 0x32}, {&(0x7f0000000280)="d0cf560cb521d44a028f61ef316365dd2f7f04a33289aac869dda7ffaa96fcb88fa9b30a5a6c8f81926bae5c7085008dfa68759a9816583995ac570a1f4ec653e6cde4bc209f0697ebccdcec146cc44d66ef9bdba469ba1c34b998779fef33f273d014e93fa2510a71128dfe9439cd69f0c07f42d98d90ad790239457d1b960b786560dc3edfef50877159f285", 0x8d}, {&(0x7f0000000340)="d9a2d3757d23a5cab2724495f2b33f25b3e63e4bfad4ebdc0f8706cee63cca3a5e2356d4e396e69d9d955d9cc85a82661f7217148d501e63c8f1dcaa616ccb9444ef33579e68795c56930f08cc046a54a2908096b73a2657293f05c0e595dab1ef605f946d4898c4838b328fbf045305e5326889cf651a1d9389b2240e465a89320ee931ef8e225a4de1b00380661ca788eb886c4521e7e0e0a63ff1d0a48b4337b56295561a683146f211ac53ce726a56c00beb81dc462fc920b7a8836d41aebf812fdd9faf855a3cd8a5ed9fa9ade05116a908867dc0742cd98a7008252d532bfbabf416dfdba6f5f4e8", 0xeb}, {&(0x7f0000000500)="fb743d27962c7947ad07497e2b6cebfe921efa5a2637f9715333c4b639485b1fc887e2006c66ca9b5c38edeef65d26d8a2e1eaa2fc23598e2c63280136175adfb022f5d313eb963e1e68c3c281826811a3a7627f206ca05884827a50dce07d384245bee59bcb2f609782e1dc39f1c358a851573ed389feb71c6cdd59de6dfec5868369af0f4be8161d2556e76c08fe3e08fd4e20c1c4678491cf68a99ab1d2ff47cd2ba7e142e5987dedc87fde55d5d81c0ce3e947f2b67788312f57be87a5f6c2b39b1f0377074fd9c2cfcb161d31c7a944761949ce552dcd62b30bb4", 0xdd}, {&(0x7f0000000600)="fa127d158ee5fe74fa88ea9dc8d6510486dc6055b9db9130452a51d3d8350605debcfcdf060660a6616d12a4515852856bf5ddb3c12f43d18042b4a1894bbab15278ebdf1647d600083e00a1a24eb4206c2f767edc11cf84b891f28566954d59ca15b1fe8c3cc5ab989d76b5ffcb502748a0e37415ed7827eb986afc07ff9dff1c1b0cc35b5f4b8fa90bf3d44362db5c231be7925a19efd52a49f425722ba4037e5b389689ce5dea942cf4e428c5aac8ffe5a7bf84f3e2ceb4babbb38435", 0xbe}, {&(0x7f00000006c0)="277066344e1486e75ac14553fc1d9d938cbc5ffe80aa5ef4d380d888ab5a402cbe9d637ffe2ddccfb1713518a41c80a7b114fab471bfa0145d4e025bd62184cd8f76dea219336f4a60eb6530c2f99f472d2066477d7421cf47699aa1483c6dab0fc8e8c2fffd781126d091c5a9d9924916725e745c20c9d8a8602351a427c5efc1b6e89f420b8a014a626b4a0cb8fc5f11fa1bbcb6f75c5b4517a68f41f76100bd461f8662", 0xa5}, {&(0x7f0000000780)="e46a7df56ebb7aacf6105df2a21ba1518e925e8384a84c9b86c779a18f34252e35169568f3fe2f1e177633fa55d19fc36ec22d1c9e81a4e3061c54f925b44c0d1838eb83980447e468fe35b9e35c894dbc2d2afb82a55aebf4b9bbaa1a310136777c3d35ed46052807a691d3d5a7990862ab9e25d13560e35271572b2ee141e1d5afb9ca4c04029284fd71ec7db64a49ac0a50a31669a303116123469c87dcc66a45bb0b591529811baf38a30a9dc53fb30a861602c2406c73d502a92d15f10e97c747ef7720597a8ff80fda787685aa417d8f186aa09c45e43676d67bacf98ca8737740826bd00a65da00b6f46fd8ecb555161e8ecab30e", 0xf8}, {&(0x7f0000000880)="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", 0x1000}], 0x8, &(0x7f0000001d00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x100, 0x40050}, {&(0x7f0000001e00)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002140)=[{&(0x7f0000001e80)="8e66b928e76dbd908542bc8322da405abd26609bb6c10a7ab6f3dbd95cf42afd16fef85c12748490e872a854cbdbfbf4c53e6e6fd755bcc833d5df4017c92fa073d355c5214b7fbc2d51f9f70ee939fa1c3af8ef5235ed2d00e97cdeaa4afe903c7412b5a346dafa82f85c542011d7f3ce6edc952be24b52bb48655416566f06979e7ee32a3e0b8c79c8c9c1ff87c23ca4320cf06106fbfc9aea9eb9ae749323824d87402d7e0b4c2b0a91122f49acad0f8884082e14d10a6a0f9c7a", 0xbc}, {&(0x7f0000001f40)="492a7f7bfdf786482b09c97b5941ce4321a46a6184bfe0d9335d0b8d87db062a16566bbaa2d8f5e184c672a50a", 0x2d}, {&(0x7f0000001f80)="cc620494e0c53195fb5fd83e61205f4f6babfef86a96bf82aee717b01a34c55dac073e369ea4de82b30021ac538b1fcdf4550bb71fe3360dffa3ffa81c0b56ad3f7142deeb6b098700ef4057353fe14ce23327fff25cd1da00bb10f66b362ca42fbc481222ef7a6c8479e27a288c9743b3e608bd3875d163f96a77f581d1ac64bc63528c53db71697ed0cd667c497be59786386994bec6", 0x97}, {&(0x7f0000002040)="f48b7fec278bbb2f249279b4b46f0afd636dafe05737ef", 0x17}, {&(0x7f0000002080)="26ec56bb60edc7d74cf1ef5ff05339dce5316a799c94af5d546a32ef2c837a4ed289b984a91473725aaa64d75aa400d5fe89cac3ad2bd53adf005b9a41d450924d889d91eacbc14d0c8244c786822e0b2e3e282a6d195574ef6b9e737c8cc7ba8b85cd8cdc8be6c8b5f3dd4e8d8a9932ab18ff27a9e747c529bf97cf2faa52b1e2bf6d8ecd3c55a40ab8ffc94b6aaea20a78621dfe2c7e", 0x97}], 0x5, &(0x7f0000002300)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60, 0x84}, {&(0x7f0000002380)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000024c0)=[{&(0x7f0000002400)="6b6ef923e4003d95573c76f4963a66c2973e73e141f453839a2b", 0x1a}, {&(0x7f0000002440)="fb8115684ad30a6e39ac4a755678ab67a339174b830510d0e9a056d8f7eb27618c252127790c05962a32612b307362a007f803b973990bd671c299a0ebd9cadd8011e21620b624507aff59e7e470d1884422aa1e62ca0ac2a2f53cb449ce3c0478cf43dd579e60cfe236f2bf57da2b29dec14c23f071cc1515d912", 0x7b}], 0x2, &(0x7f00000026c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r3}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, 0xffffffffffffffff}}}], 0x108, 0x4008001}], 0x3, 0x4040000) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r8, 0x0) preadv(r8, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@fat=@umask}]}) [ 99.289869][ T9333] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 99.300620][ T9349] loop5: detected capacity change from 0 to 4 [ 99.310361][ T9355] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:59:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:01 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, 0x0, 0x0, 0xffffffff, 0x2) 12:59:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpgid(0x0) fcntl$setown(r1, 0x8, r2) sched_setattr(r2, &(0x7f00000000c0)={0x38, 0x6, 0xb6abce7effd811c3, 0x0, 0x2, 0xfffffffffffffffe, 0x8, 0x9, 0xfff, 0x20}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@jqfmt_vfsold}], [{@fowner_eq={'fowner', 0x3d, 0xee00}}]}) r5 = getpgrp(r0) sched_setattr(r5, &(0x7f0000000000)={0x38, 0x2, 0x15, 0x5, 0x5, 0x80000000, 0x20000000000000, 0x7, 0x0, 0x5e2c}, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB="2c7766646e6f3ddc9746b010b23586bfd5caa146648722640ba560876924f0233317c82ad57aa5a590f49d4f2b3c8608f37e08808966db0ae2299a2222e0e1797fcb5ca700961cb864f5fd6386802191efa8c800b577e424bd268110dce13173c9611d6a36e16c495de3180c534b7848e9ccdf248639121dcd1087a968309cd8d94301930481a64a43e4c14543cf11785b80d4deffff1d90c801d99e220d77a49d9880379b8cf4f9554403700b47d4cbe71dd1dbcd3738371d1e8d814e4ea778063d328ed32653743f3247", @ANYRESHEX=r7, @ANYBLOB="adf78e574ce691f3ecbc91b2546ab543f5f338b9a893a0a3fa21ab0177084e3e54629572d44b06f0b2e7bfb99dd93213fe7b204197a9b073c39ef25a722827d9f4991d7170e4988f30dd3a6026cf6e4e66091a66447dad38477e0dafac1ddf44c1f7b4e059f92e600c3eda7ef7ba55ae461ca465cd03eda36affae6d28dd1fea4f8e7a99fbed2c97d76dbf7bfd7e48d13d83c0eec78ab8e1"]) 12:59:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:01 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000140)=""/110, 0x6e}, {&(0x7f00000001c0)=""/130, 0x82}, {&(0x7f0000000280)=""/151, 0x97}, {&(0x7f0000000340)=""/28, 0x1c}, {&(0x7f0000000380)=""/117, 0x75}], 0x6, 0xffffffff, 0x2) [ 99.407525][ T9373] loop2: detected capacity change from 0 to 4096 [ 99.422998][ T9381] loop5: detected capacity change from 0 to 4 [ 99.443871][ T9386] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 99.450165][ T9373] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 12:59:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 12:59:01 executing program 2: chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) 12:59:01 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000140)=""/110, 0x6e}, {&(0x7f00000001c0)=""/130, 0x82}, {&(0x7f0000000280)=""/151, 0x97}, {&(0x7f0000000340)=""/28, 0x1c}], 0x5, 0xffffffff, 0x2) 12:59:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 99.508302][ T9381] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)) 12:59:01 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000140)=""/110, 0x6e}, {&(0x7f00000001c0)=""/130, 0x82}, {&(0x7f0000000280)=""/151, 0x97}], 0x4, 0xffffffff, 0x2) [ 99.575731][ T9407] 9pnet: Insufficient options for proto=fd 12:59:01 executing program 2: chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) 12:59:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 99.602650][ T9413] loop1: detected capacity change from 0 to 4 [ 99.610179][ T9414] loop5: detected capacity change from 0 to 4 [ 99.619242][ T9414] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 99.716214][ T9434] loop1: detected capacity change from 0 to 4 12:59:02 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4100) mmap(&(0x7f00007d4000/0x1000)=nil, 0x1000, 0x0, 0x13, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x136) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80000, 0x0) recvfrom$packet(r2, &(0x7f0000000440)=""/205, 0xcd, 0x100, &(0x7f0000000240)={0x11, 0x10, 0x0, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000001c0), 0x402000, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000280)=0x6, 0x4) dup2(0xffffffffffffffff, r4) sendfile(r0, r3, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r5, 0x0) io_submit(0x0, 0x0, 0xfffffffffffffffd) read(r5, &(0x7f0000000180)=""/19, 0xfffffe47) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000100)='veth1_to_hsr\x00') 12:59:02 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000140)=""/110, 0x6e}, {&(0x7f00000001c0)=""/130, 0x82}], 0x3, 0xffffffff, 0x2) 12:59:02 executing program 2: chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) 12:59:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)) 12:59:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 100.407821][ T9445] 9pnet: Insufficient options for proto=fd 12:59:02 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:02 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000140)=""/110, 0x6e}], 0x2, 0xffffffff, 0x2) [ 100.456895][ T9457] loop5: detected capacity change from 0 to 4 12:59:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 100.477048][ T9457] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 100.485359][ T9458] loop1: detected capacity change from 0 to 4 [ 100.488061][ T9460] loop4: detected capacity change from 0 to 87 [ 100.501531][ T9460] attempt to access beyond end of device [ 100.501531][ T9460] loop4: rw=0, want=94, limit=87 [ 100.508972][ T9460] attempt to access beyond end of device [ 100.508972][ T9460] loop4: rw=0, want=90, limit=87 [ 100.511411][ T9460] Buffer I/O error on dev loop4, logical block 44, async page read 12:59:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)) 12:59:02 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x2) 12:59:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 100.527783][ T9460] attempt to access beyond end of device [ 100.527783][ T9460] loop4: rw=0, want=92, limit=87 [ 100.530637][ T9460] Buffer I/O error on dev loop4, logical block 45, async page read [ 100.532281][ T9460] attempt to access beyond end of device [ 100.532281][ T9460] loop4: rw=0, want=94, limit=87 [ 100.534417][ T9460] Buffer I/O error on dev loop4, logical block 46, async page read [ 100.536770][ T9460] attempt to access beyond end of device [ 100.536770][ T9460] loop4: rw=0, want=90, limit=87 [ 100.539501][ T9460] Buffer I/O error on dev loop4, logical block 44, async page read [ 100.546224][ T9477] loop2: detected capacity change from 0 to 4096 [ 100.549726][ T9460] attempt to access beyond end of device [ 100.549726][ T9460] loop4: rw=0, want=92, limit=87 [ 100.551801][ T9460] Buffer I/O error on dev loop4, logical block 45, async page read [ 100.553227][ T9460] attempt to access beyond end of device [ 100.553227][ T9460] loop4: rw=0, want=94, limit=87 [ 100.554737][ T9460] Buffer I/O error on dev loop4, logical block 46, async page read [ 100.556327][ T9460] attempt to access beyond end of device [ 100.556327][ T9460] loop4: rw=0, want=90, limit=87 [ 100.558005][ T9460] Buffer I/O error on dev loop4, logical block 44, async page read [ 100.560659][ T9460] attempt to access beyond end of device [ 100.560659][ T9460] loop4: rw=0, want=92, limit=87 [ 100.563032][ T9460] Buffer I/O error on dev loop4, logical block 45, async page read [ 100.570153][ T9480] loop1: detected capacity change from 0 to 4 12:59:02 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:02 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:02 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440), 0x0, 0xffffffff, 0x2) 12:59:02 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4100) mmap(&(0x7f00007d4000/0x1000)=nil, 0x1000, 0x0, 0x13, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x136) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80000, 0x0) recvfrom$packet(r2, &(0x7f0000000440)=""/205, 0xcd, 0x100, &(0x7f0000000240)={0x11, 0x10, 0x0, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000001c0), 0x402000, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000280)=0x6, 0x4) dup2(0xffffffffffffffff, r4) sendfile(r0, r3, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r5, 0x0) io_submit(0x0, 0x0, 0xfffffffffffffffd) read(r5, &(0x7f0000000180)=""/19, 0xfffffe47) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000100)='veth1_to_hsr\x00') 12:59:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 100.580088][ T9480] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 100.585642][ T9460] attempt to access beyond end of device [ 100.585642][ T9460] loop4: rw=0, want=94, limit=87 [ 100.587936][ T9460] Buffer I/O error on dev loop4, logical block 46, async page read [ 100.589645][ T9460] Buffer I/O error on dev loop4, logical block 44, async page read 12:59:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)) 12:59:02 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440), 0x0, 0xffffffff, 0x2) 12:59:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:02 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440), 0x0, 0xffffffff, 0x2) [ 100.652669][ T9507] FAULT_INJECTION: forcing a failure. [ 100.652669][ T9507] name failslab, interval 1, probability 0, space 0, times 1 [ 100.655092][ T9507] CPU: 0 PID: 9507 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 100.656867][ T9507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.658541][ T9507] Call Trace: [ 100.659164][ T9507] dump_stack+0x137/0x19d [ 100.659930][ T9507] should_fail+0x23c/0x250 [ 100.660703][ T9507] ? __se_sys_memfd_create+0xfb/0x390 [ 100.662131][ T9507] __should_failslab+0x81/0x90 [ 100.662985][ T9507] should_failslab+0x5/0x20 [ 100.664327][ T9507] __kmalloc+0x66/0x340 [ 100.665007][ T9505] loop2: detected capacity change from 0 to 4096 [ 100.665217][ T9507] ? strnlen_user+0x137/0x1c0 [ 100.665233][ T9507] __se_sys_memfd_create+0xfb/0x390 [ 100.665250][ T9507] __x64_sys_memfd_create+0x2d/0x40 [ 100.669426][ T9507] do_syscall_64+0x4a/0x90 [ 100.670206][ T9507] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 100.671275][ T9507] RIP: 0033:0x4665d9 [ 100.672895][ T9507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 100.676833][ T9507] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 100.678455][ T9507] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 100.679956][ T9507] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 100.681721][ T9507] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 100.683235][ T9507] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 100.684667][ T9507] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 [ 100.695628][ T9509] loop1: detected capacity change from 0 to 4 12:59:02 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 100.703620][ T9509] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:02 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)) 12:59:02 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0xffffffff, 0x2) 12:59:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 100.749605][ T9524] loop4: detected capacity change from 0 to 87 [ 100.797618][ T9535] loop2: detected capacity change from 0 to 4096 [ 100.813095][ T9542] loop1: detected capacity change from 0 to 4 [ 100.816276][ T9543] FAULT_INJECTION: forcing a failure. [ 100.816276][ T9543] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 100.819515][ T9543] CPU: 0 PID: 9543 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 100.821258][ T9543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.823392][ T9543] Call Trace: [ 100.824141][ T9543] dump_stack+0x137/0x19d [ 100.825149][ T9543] should_fail+0x23c/0x250 [ 100.826187][ T9543] should_fail_usercopy+0x16/0x20 [ 100.827008][ T9543] _copy_from_user+0x1c/0xd0 [ 100.827834][ T9543] __se_sys_memfd_create+0x137/0x390 [ 100.829259][ T9543] __x64_sys_memfd_create+0x2d/0x40 [ 100.830285][ T9543] do_syscall_64+0x4a/0x90 [ 100.831006][ T9543] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 100.831978][ T9543] RIP: 0033:0x4665d9 [ 100.832639][ T9543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 100.836057][ T9543] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 100.837472][ T9543] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 100.838738][ T9543] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 100.840141][ T9543] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 100.842480][ T9543] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 100.844286][ T9543] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 12:59:02 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x0, 0x3}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000040)={r1, 0xc443, 0x3}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 12:59:02 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:02 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0xffffffff, 0x2) 12:59:02 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 100.856678][ T9542] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:02 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:02 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0xffffffff, 0x2) [ 100.940894][ T9562] loop2: detected capacity change from 0 to 4096 [ 100.940993][ T9568] FAULT_INJECTION: forcing a failure. [ 100.940993][ T9568] name failslab, interval 1, probability 0, space 0, times 0 [ 100.944219][ T9570] FAULT_INJECTION: forcing a failure. [ 100.944219][ T9570] name failslab, interval 1, probability 0, space 0, times 0 [ 100.945388][ T9568] CPU: 1 PID: 9568 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 100.950051][ T9568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.951921][ T9568] Call Trace: [ 100.952536][ T9568] dump_stack+0x137/0x19d [ 100.953724][ T9568] should_fail+0x23c/0x250 [ 100.954723][ T9568] ? shmem_alloc_inode+0x22/0x30 [ 100.955482][ T9568] __should_failslab+0x81/0x90 [ 100.956408][ T9568] ? shmem_match+0xa0/0xa0 [ 100.957379][ T9568] should_failslab+0x5/0x20 [ 100.958741][ T9568] kmem_cache_alloc+0x46/0x2f0 [ 100.959867][ T9568] ? do_anonymous_page+0x411/0x8b0 [ 100.960787][ T9568] ? fsnotify_perm+0x59/0x2e0 [ 100.961889][ T9568] ? shmem_match+0xa0/0xa0 [ 100.963368][ T9568] shmem_alloc_inode+0x22/0x30 [ 100.964351][ T9568] new_inode_pseudo+0x38/0x1c0 [ 100.965466][ T9568] new_inode+0x21/0x120 [ 100.966598][ T9568] shmem_get_inode+0xa1/0x480 [ 100.967447][ T9568] __shmem_file_setup+0xf1/0x1d0 [ 100.968842][ T9568] shmem_file_setup+0x37/0x40 [ 100.969735][ T9568] __se_sys_memfd_create+0x1eb/0x390 [ 100.970916][ T9568] __x64_sys_memfd_create+0x2d/0x40 [ 100.972128][ T9568] do_syscall_64+0x4a/0x90 [ 100.973248][ T9568] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 100.974218][ T9568] RIP: 0033:0x4665d9 [ 100.974966][ T9568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 100.978079][ T9568] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 100.979420][ T9568] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 100.980994][ T9568] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 100.982652][ T9568] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 100.985272][ T9568] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 100.986635][ T9568] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 12:59:02 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e24}, 0x6e) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e6661feff020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"/704]) 12:59:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:02 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 100.988964][ T9570] CPU: 0 PID: 9570 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 100.992025][ T9570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.995157][ T9570] Call Trace: [ 100.995940][ T9570] dump_stack+0x137/0x19d [ 100.996706][ T9570] should_fail+0x23c/0x250 [ 100.997486][ T9570] ? __se_sys_memfd_create+0xfb/0x390 [ 100.998297][ T9570] __should_failslab+0x81/0x90 [ 100.999138][ T9570] should_failslab+0x5/0x20 [ 101.000176][ T9570] __kmalloc+0x66/0x340 [ 101.000972][ T9570] ? strnlen_user+0x137/0x1c0 [ 101.002694][ T9570] __se_sys_memfd_create+0xfb/0x390 [ 101.003548][ T9570] __x64_sys_memfd_create+0x2d/0x40 [ 101.004645][ T9570] do_syscall_64+0x4a/0x90 [ 101.005653][ T9570] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.006697][ T9570] RIP: 0033:0x4665d9 [ 101.007452][ T9570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.012075][ T9570] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 101.013674][ T9570] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 101.015546][ T9570] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 101.016889][ T9570] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 101.018472][ T9570] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 101.019981][ T9570] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 12:59:03 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 101.066945][ T9580] FAULT_INJECTION: forcing a failure. [ 101.066945][ T9580] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 101.071300][ T9580] CPU: 0 PID: 9580 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 101.073992][ T9580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.075633][ T9580] Call Trace: [ 101.076215][ T9580] dump_stack+0x137/0x19d [ 101.077070][ T9580] should_fail+0x23c/0x250 [ 101.078639][ T9580] should_fail_usercopy+0x16/0x20 [ 101.079611][ T9580] _copy_from_user+0x1c/0xd0 [ 101.080624][ T9580] __se_sys_memfd_create+0x137/0x390 [ 101.082079][ T9580] __x64_sys_memfd_create+0x2d/0x40 [ 101.084004][ T9580] do_syscall_64+0x4a/0x90 [ 101.085187][ T9580] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.086792][ T9580] RIP: 0033:0x4665d9 [ 101.088029][ T9580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.091103][ T9580] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 101.092472][ T9580] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 101.093918][ T9580] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 101.095144][ T9580] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 101.096707][ T9580] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 101.098350][ T9580] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 [ 101.113497][ T9586] loop2: detected capacity change from 0 to 4096 12:59:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:03 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0x0, 0x2) 12:59:03 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:03 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 101.123516][ T9592] FAULT_INJECTION: forcing a failure. [ 101.123516][ T9592] name failslab, interval 1, probability 0, space 0, times 0 [ 101.126433][ T9592] CPU: 1 PID: 9592 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 101.128478][ T9592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.130530][ T9592] Call Trace: [ 101.131477][ T9592] dump_stack+0x137/0x19d [ 101.132627][ T9592] should_fail+0x23c/0x250 [ 101.133567][ T9592] ? security_inode_alloc+0x30/0x180 [ 101.134412][ T9592] __should_failslab+0x81/0x90 [ 101.135547][ T9592] should_failslab+0x5/0x20 [ 101.136635][ T9592] kmem_cache_alloc+0x46/0x2f0 [ 101.137511][ T9592] security_inode_alloc+0x30/0x180 [ 101.139191][ T9592] inode_init_always+0x20b/0x420 [ 101.140256][ T9592] ? shmem_match+0xa0/0xa0 [ 101.141373][ T9592] new_inode_pseudo+0x73/0x1c0 [ 101.142714][ T9592] new_inode+0x21/0x120 [ 101.143502][ T9592] shmem_get_inode+0xa1/0x480 [ 101.144725][ T9592] __shmem_file_setup+0xf1/0x1d0 [ 101.145972][ T9592] shmem_file_setup+0x37/0x40 [ 101.147152][ T9592] __se_sys_memfd_create+0x1eb/0x390 [ 101.148937][ T9592] __x64_sys_memfd_create+0x2d/0x40 [ 101.150382][ T9592] do_syscall_64+0x4a/0x90 [ 101.151362][ T9592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.152306][ T9592] RIP: 0033:0x4665d9 [ 101.153195][ T9592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.158000][ T9592] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 101.159875][ T9592] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 101.162678][ T9592] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 101.164352][ T9592] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 101.165733][ T9592] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 101.167709][ T9592] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 12:59:03 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 101.182649][ T9581] loop4: detected capacity change from 0 to 3480 [ 101.200007][ T9581] FAT-fs (loop4): bogus logical sector size 767 [ 101.201511][ T9581] FAT-fs (loop4): Can't find a valid FAT filesystem [ 101.213344][ T9603] FAULT_INJECTION: forcing a failure. [ 101.213344][ T9603] name failslab, interval 1, probability 0, space 0, times 0 [ 101.216273][ T9603] CPU: 1 PID: 9603 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 101.218213][ T9603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.219808][ T9603] Call Trace: [ 101.220377][ T9603] dump_stack+0x137/0x19d [ 101.221254][ T9603] should_fail+0x23c/0x250 [ 101.222264][ T9603] ? __d_alloc+0x36/0x370 [ 101.223088][ T9603] __should_failslab+0x81/0x90 [ 101.223890][ T9603] should_failslab+0x5/0x20 [ 101.225006][ T9603] kmem_cache_alloc+0x46/0x2f0 [ 101.225892][ T9603] ? __init_rwsem+0x59/0x70 [ 101.226802][ T9603] __d_alloc+0x36/0x370 [ 101.227980][ T9603] ? current_time+0xdb/0x190 [ 101.228817][ T9603] d_alloc_pseudo+0x1a/0x50 [ 101.230153][ T9603] alloc_file_pseudo+0x63/0x130 [ 101.231186][ T9603] __shmem_file_setup+0x14c/0x1d0 [ 101.232202][ T9603] shmem_file_setup+0x37/0x40 [ 101.233623][ T9603] __se_sys_memfd_create+0x1eb/0x390 [ 101.234601][ T9603] __x64_sys_memfd_create+0x2d/0x40 [ 101.236012][ T9603] do_syscall_64+0x4a/0x90 [ 101.236850][ T9603] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.238252][ T9603] RIP: 0033:0x4665d9 [ 101.239298][ T9603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.244004][ T9603] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 101.245965][ T9603] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 101.247424][ T9603] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 101.249002][ T9603] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 101.250727][ T9603] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 101.252523][ T9603] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 [ 101.268524][ T9606] FAULT_INJECTION: forcing a failure. [ 101.268524][ T9606] name failslab, interval 1, probability 0, space 0, times 0 [ 101.270902][ T9606] CPU: 0 PID: 9606 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 101.273030][ T9606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.275889][ T9606] Call Trace: [ 101.276697][ T9606] dump_stack+0x137/0x19d [ 101.277751][ T9606] should_fail+0x23c/0x250 [ 101.278842][ T9606] ? shmem_alloc_inode+0x22/0x30 [ 101.280006][ T9606] __should_failslab+0x81/0x90 [ 101.280958][ T9606] ? shmem_match+0xa0/0xa0 12:59:03 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0x0, 0x2) 12:59:03 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 101.282238][ T9606] should_failslab+0x5/0x20 [ 101.283229][ T9606] kmem_cache_alloc+0x46/0x2f0 [ 101.284082][ T9606] ? do_anonymous_page+0x411/0x8b0 [ 101.285185][ T9606] ? fsnotify_perm+0x59/0x2e0 [ 101.286727][ T9606] ? shmem_match+0xa0/0xa0 [ 101.287528][ T9606] shmem_alloc_inode+0x22/0x30 [ 101.288425][ T9606] new_inode_pseudo+0x38/0x1c0 [ 101.289227][ T9606] new_inode+0x21/0x120 [ 101.290205][ T9606] shmem_get_inode+0xa1/0x480 [ 101.291737][ T9606] __shmem_file_setup+0xf1/0x1d0 [ 101.292752][ T9606] shmem_file_setup+0x37/0x40 [ 101.293710][ T9606] __se_sys_memfd_create+0x1eb/0x390 [ 101.295123][ T9606] __x64_sys_memfd_create+0x2d/0x40 [ 101.296181][ T9606] do_syscall_64+0x4a/0x90 [ 101.297147][ T9606] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.298645][ T9606] RIP: 0033:0x4665d9 [ 101.299461][ T9606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.303421][ T9606] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 101.305580][ T9606] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 101.306810][ T9606] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 101.308172][ T9606] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 101.309716][ T9606] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 101.310586][ T9614] loop2: detected capacity change from 0 to 4096 [ 101.311234][ T9606] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 12:59:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x533, &(0x7f0000000580), &(0x7f0000ffa000/0x3000)=nil, &(0x7f00005ea000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000100)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r1}, 0x0) io_uring_enter(r1, 0x266f, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0xef8, &(0x7f0000000040)={0x0, 0x4449, 0x0, 0x1, 0x3ba, 0x0, r1}, &(0x7f0000413000/0x4000)=nil, &(0x7f00005fa000/0x11000)=nil, &(0x7f00000000c0), &(0x7f0000000140)) 12:59:03 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:03 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0x0, 0x2) 12:59:03 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 101.336958][ T9620] FAULT_INJECTION: forcing a failure. [ 101.336958][ T9620] name failslab, interval 1, probability 0, space 0, times 0 [ 101.340193][ T9620] CPU: 1 PID: 9620 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 101.342193][ T9620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.344119][ T9620] Call Trace: [ 101.344768][ T9620] dump_stack+0x137/0x19d [ 101.345718][ T9620] should_fail+0x23c/0x250 [ 101.346846][ T9620] ? __alloc_file+0x2e/0x1a0 [ 101.347887][ T9620] __should_failslab+0x81/0x90 [ 101.348767][ T9620] should_failslab+0x5/0x20 [ 101.349441][ T9620] kmem_cache_alloc+0x46/0x2f0 [ 101.350486][ T9620] ? inode_doinit_with_dentry+0x382/0x950 [ 101.351501][ T9620] __alloc_file+0x2e/0x1a0 [ 101.352320][ T9620] alloc_empty_file+0xcd/0x1c0 [ 101.353753][ T9620] alloc_file+0x3a/0x280 [ 101.354562][ T9620] alloc_file_pseudo+0xe2/0x130 [ 101.355491][ T9620] __shmem_file_setup+0x14c/0x1d0 [ 101.356853][ T9620] shmem_file_setup+0x37/0x40 [ 101.358064][ T9620] __se_sys_memfd_create+0x1eb/0x390 [ 101.359563][ T9620] __x64_sys_memfd_create+0x2d/0x40 [ 101.360488][ T9620] do_syscall_64+0x4a/0x90 [ 101.362229][ T9620] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.363123][ T9620] RIP: 0033:0x4665d9 [ 101.363753][ T9620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.366996][ T9620] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 101.369167][ T9620] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 101.371199][ T9620] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 101.372744][ T9620] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 101.374806][ T9620] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 101.376406][ T9620] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 12:59:03 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 101.446804][ T9632] FAULT_INJECTION: forcing a failure. [ 101.446804][ T9632] name failslab, interval 1, probability 0, space 0, times 0 [ 101.449239][ T9632] CPU: 0 PID: 9632 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 101.450539][ T9632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.452131][ T9632] Call Trace: [ 101.452666][ T9632] dump_stack+0x137/0x19d [ 101.454524][ T9632] should_fail+0x23c/0x250 [ 101.455252][ T9632] ? security_file_alloc+0x30/0x190 [ 101.456100][ T9632] __should_failslab+0x81/0x90 [ 101.456935][ T9632] should_failslab+0x5/0x20 [ 101.458198][ T9632] kmem_cache_alloc+0x46/0x2f0 [ 101.459146][ T9632] security_file_alloc+0x30/0x190 [ 101.460126][ T9632] __alloc_file+0x83/0x1a0 [ 101.461097][ T9632] alloc_empty_file+0xcd/0x1c0 [ 101.461812][ T9632] alloc_file+0x3a/0x280 [ 101.462553][ T9632] alloc_file_pseudo+0xe2/0x130 [ 101.463458][ T9632] __shmem_file_setup+0x14c/0x1d0 [ 101.464752][ T9632] shmem_file_setup+0x37/0x40 [ 101.465671][ T9632] __se_sys_memfd_create+0x1eb/0x390 [ 101.466742][ T9632] __x64_sys_memfd_create+0x2d/0x40 [ 101.467709][ T9632] do_syscall_64+0x4a/0x90 [ 101.468631][ T9632] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.469610][ T9632] RIP: 0033:0x4665d9 [ 101.470464][ T9632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.474383][ T9632] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 101.476108][ T9632] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 101.477783][ T9632] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 101.478933][ T9632] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 101.480252][ T9632] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 101.481456][ T9632] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 12:59:03 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:03 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:03 executing program 4: unshare(0x40000000) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040)={0x3f, 0x7fff, 0x7}, 0xc) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000003c80)={{0x2, 0x0, @local}, {0x304}, 0xf5ffffff, {0x2, 0x4e21, @private=0x8000}}) r1 = accept4(r0, &(0x7f0000000080)=@sco={0x1f, @fixed}, &(0x7f0000000100)=0x80, 0x80000) sendto$inet(r1, &(0x7f0000000140)="1155ef32b35d4ee814d726db16958939c6f52d190b950d7041bba757626a064c9ed9e071f92ca00fea85ca55c5f2f2720f2bdcd6681953d3039845a2b08076d02e3e31ad3826c2675ed6c586f7332c8c7ed10d78f2a622d4c1de8cc457d2e1948b7b6aaab9c4c4be5e8eb5e27d9579e23a53376599761d3bf066ecf48679829356d7d64ac43eee1179de861f797a69fe548c8d2248479341632e501ee670cb848c55469e9b7144c78b45708607130c8c1e6104e360ebccd16b6ee0bad59026dc932987dc549d45fe42ba3c13734a4defa8a75d0e014cfb932864dc95b861446f370d2aac686696f5", 0xe8, 0x20004000, &(0x7f0000000240)={0x2, 0x4e21, @multicast2}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00003f2000/0x4000)=nil, 0x4000, 0x2000004, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000000)) [ 101.496322][ T9640] FAULT_INJECTION: forcing a failure. [ 101.496322][ T9640] name failslab, interval 1, probability 0, space 0, times 0 [ 101.498820][ T9640] CPU: 1 PID: 9640 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 101.501949][ T9640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.503928][ T9640] Call Trace: [ 101.504482][ T9640] dump_stack+0x137/0x19d [ 101.505321][ T9640] should_fail+0x23c/0x250 [ 101.506140][ T9640] ? security_inode_alloc+0x30/0x180 [ 101.507172][ T9640] __should_failslab+0x81/0x90 [ 101.507982][ T9640] should_failslab+0x5/0x20 [ 101.508893][ T9640] kmem_cache_alloc+0x46/0x2f0 [ 101.509863][ T9640] security_inode_alloc+0x30/0x180 [ 101.511779][ T9640] inode_init_always+0x20b/0x420 [ 101.512776][ T9640] ? shmem_match+0xa0/0xa0 [ 101.513869][ T9640] new_inode_pseudo+0x73/0x1c0 [ 101.515029][ T9640] new_inode+0x21/0x120 [ 101.515745][ T9640] shmem_get_inode+0xa1/0x480 [ 101.516539][ T9640] __shmem_file_setup+0xf1/0x1d0 [ 101.517957][ T9640] shmem_file_setup+0x37/0x40 [ 101.518933][ T9640] __se_sys_memfd_create+0x1eb/0x390 [ 101.519977][ T9640] __x64_sys_memfd_create+0x2d/0x40 [ 101.521447][ T9640] do_syscall_64+0x4a/0x90 [ 101.522446][ T9640] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.524071][ T9640] RIP: 0033:0x4665d9 [ 101.525079][ T9640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.529544][ T9640] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 101.531727][ T9640] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 101.533368][ T9640] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 101.535053][ T9640] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 101.536715][ T9640] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 101.538836][ T9640] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 12:59:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 101.550541][ T9639] loop2: detected capacity change from 0 to 768 12:59:03 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 101.578422][ T9639] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) [ 101.591983][ T9654] FAULT_INJECTION: forcing a failure. [ 101.591983][ T9654] name failslab, interval 1, probability 0, space 0, times 0 [ 101.594921][ T9654] CPU: 0 PID: 9654 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 101.596803][ T9654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.599260][ T9654] Call Trace: [ 101.600263][ T9654] dump_stack+0x137/0x19d [ 101.601137][ T9654] should_fail+0x23c/0x250 [ 101.602081][ T9654] ? __d_alloc+0x36/0x370 [ 101.603178][ T9654] __should_failslab+0x81/0x90 [ 101.604792][ T9654] should_failslab+0x5/0x20 [ 101.606401][ T9654] kmem_cache_alloc+0x46/0x2f0 [ 101.607548][ T9654] ? __init_rwsem+0x59/0x70 [ 101.608408][ T9654] __d_alloc+0x36/0x370 [ 101.610210][ T9654] ? current_time+0xdb/0x190 [ 101.611503][ T9654] d_alloc_pseudo+0x1a/0x50 [ 101.612552][ T9654] alloc_file_pseudo+0x63/0x130 [ 101.613736][ T9654] __shmem_file_setup+0x14c/0x1d0 [ 101.616658][ T9654] shmem_file_setup+0x37/0x40 [ 101.618269][ T9654] __se_sys_memfd_create+0x1eb/0x390 [ 101.619896][ T9654] __x64_sys_memfd_create+0x2d/0x40 [ 101.620980][ T9654] do_syscall_64+0x4a/0x90 [ 101.621051][ T9656] FAULT_INJECTION: forcing a failure. [ 101.621051][ T9656] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 101.622084][ T9654] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.626092][ T9654] RIP: 0033:0x4665d9 12:59:03 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 101.626727][ T9654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.630706][ T9654] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 101.632640][ T9654] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 101.634951][ T9654] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 101.636269][ T9654] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 101.637523][ T9654] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 101.638635][ T9654] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 [ 101.640050][ T9656] CPU: 1 PID: 9656 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 101.641549][ T9656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.643240][ T9656] Call Trace: [ 101.643767][ T9656] dump_stack+0x137/0x19d [ 101.644760][ T9656] should_fail+0x23c/0x250 [ 101.645506][ T9656] __alloc_pages+0x102/0x320 [ 101.646347][ T9656] alloc_pages_vma+0x391/0x660 [ 101.647575][ T9656] shmem_getpage_gfp+0x980/0x1410 [ 101.649087][ T9656] ? mls_context_isvalid+0x76/0x1e0 [ 101.650239][ T9656] shmem_write_begin+0x7e/0x100 [ 101.651221][ T9656] generic_perform_write+0x196/0x3a0 [ 101.652295][ T9656] ? file_update_time+0x1bd/0x3e0 [ 101.653693][ T9656] __generic_file_write_iter+0x161/0x300 [ 101.655733][ T9656] ? generic_write_checks+0x250/0x290 [ 101.656842][ T9656] generic_file_write_iter+0x75/0x130 [ 101.658032][ T9656] vfs_write+0x69d/0x770 [ 101.659468][ T9656] __x64_sys_pwrite64+0xf5/0x150 [ 101.661021][ T9656] do_syscall_64+0x4a/0x90 [ 101.662249][ T9656] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.664015][ T9656] RIP: 0033:0x419777 [ 101.665480][ T9656] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 101.670961][ T9656] RSP: 002b:00007f0cfa4b5f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 101.672870][ T9656] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 101.674748][ T9656] RDX: 000000000000003a RSI: 0000000020010000 RDI: 0000000000000004 [ 101.676543][ T9656] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff 12:59:03 executing program 0 (fault-call:4 fault-nth:0): r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 101.678020][ T9656] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 101.679477][ T9656] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 12:59:03 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:03 executing program 4: set_mempolicy(0x1, &(0x7f0000000000)=0x3, 0x6) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) socket$packet(0x11, 0x3, 0x300) [ 101.711703][ T9656] loop5: detected capacity change from 0 to 4 [ 101.715468][ T9656] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 101.728060][ T9681] FAULT_INJECTION: forcing a failure. [ 101.728060][ T9681] name failslab, interval 1, probability 0, space 0, times 0 [ 101.730238][ T9681] CPU: 0 PID: 9681 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 101.731656][ T9681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.734206][ T9681] Call Trace: [ 101.735002][ T9681] dump_stack+0x137/0x19d [ 101.735994][ T9681] should_fail+0x23c/0x250 [ 101.736786][ T9681] ? __alloc_file+0x2e/0x1a0 [ 101.738155][ T9681] __should_failslab+0x81/0x90 [ 101.738982][ T9681] should_failslab+0x5/0x20 [ 101.739727][ T9681] kmem_cache_alloc+0x46/0x2f0 [ 101.740546][ T9681] ? inode_doinit_with_dentry+0x382/0x950 [ 101.742104][ T9681] __alloc_file+0x2e/0x1a0 [ 101.742941][ T9681] alloc_empty_file+0xcd/0x1c0 [ 101.743804][ T9681] alloc_file+0x3a/0x280 [ 101.745015][ T9681] alloc_file_pseudo+0xe2/0x130 [ 101.746879][ T9681] __shmem_file_setup+0x14c/0x1d0 [ 101.748543][ T9681] shmem_file_setup+0x37/0x40 [ 101.750142][ T9681] __se_sys_memfd_create+0x1eb/0x390 [ 101.751477][ T9681] __x64_sys_memfd_create+0x2d/0x40 [ 101.752535][ T9681] do_syscall_64+0x4a/0x90 [ 101.754917][ T9681] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.756485][ T9681] RIP: 0033:0x4665d9 [ 101.757846][ T9681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.762438][ T9681] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 101.763840][ T9681] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 101.765119][ T9681] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 101.766709][ T9681] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 101.769185][ T9681] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 101.770961][ T9681] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 [ 101.775727][ T9682] FAULT_INJECTION: forcing a failure. [ 101.775727][ T9682] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 101.781347][ T9682] CPU: 0 PID: 9682 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 101.784760][ T9682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.788451][ T9682] Call Trace: [ 101.789558][ T9682] dump_stack+0x137/0x19d [ 101.790531][ T9682] should_fail+0x23c/0x250 [ 101.792476][ T9682] should_fail_usercopy+0x16/0x20 [ 101.794089][ T9682] _copy_from_user+0x1c/0xd0 [ 101.796074][ T9682] iovec_from_user+0xc4/0x2d0 [ 101.797843][ T9682] __import_iovec+0x49/0x270 [ 101.801578][ T9682] ? fsnotify_perm+0x59/0x2e0 [ 101.802870][ T9682] ? __fsnotify_parent+0x32f/0x430 [ 101.804646][ T9682] import_iovec+0x69/0x80 [ 101.805456][ T9682] do_preadv+0x109/0x230 [ 101.807315][ T9682] ? __fget_light+0x21b/0x260 [ 101.808291][ T9682] ? __cond_resched+0x11/0x40 [ 101.810225][ T9682] ? fput+0x2d/0x130 [ 101.811939][ T9682] ? ksys_write+0x157/0x180 [ 101.813386][ T9682] __x64_sys_preadv+0x54/0x60 [ 101.814319][ T9682] do_syscall_64+0x4a/0x90 [ 101.815446][ T9682] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.817085][ T9682] RIP: 0033:0x4665d9 [ 101.818417][ T9682] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.824353][ T9682] RSP: 002b:00007f7c0150c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 101.826080][ T9682] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 101.827906][ T9682] RDX: 0000000000000001 RSI: 0000000020000440 RDI: 0000000000000003 [ 101.830602][ T9682] RBP: 00007f7c0150c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 101.832946][ T9682] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 101.835417][ T9682] R13: 00007ffe8cfcb87f R14: 00007f7c0150c300 R15: 0000000000022000 12:59:03 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:03 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:03 executing program 0 (fault-call:4 fault-nth:1): r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 101.861012][ T9685] loop2: detected capacity change from 0 to 768 [ 101.870493][ T9685] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) [ 101.896982][ T9701] FAULT_INJECTION: forcing a failure. [ 101.896982][ T9701] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 101.897828][ T9699] FAULT_INJECTION: forcing a failure. [ 101.897828][ T9699] name failslab, interval 1, probability 0, space 0, times 0 [ 101.902002][ T9701] CPU: 0 PID: 9701 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 101.902023][ T9701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.902033][ T9701] Call Trace: [ 101.902039][ T9701] dump_stack+0x137/0x19d [ 101.918684][ T9701] should_fail+0x23c/0x250 [ 101.919827][ T9701] should_fail_usercopy+0x16/0x20 [ 101.922092][ T9701] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 101.923923][ T9701] ? shmem_write_begin+0x7e/0x100 [ 101.925680][ T9701] generic_perform_write+0x1e4/0x3a0 [ 101.927841][ T9701] ? file_update_time+0x1bd/0x3e0 [ 101.929390][ T9701] __generic_file_write_iter+0x161/0x300 [ 101.930957][ T9701] ? generic_write_checks+0x250/0x290 [ 101.933297][ T9701] generic_file_write_iter+0x75/0x130 [ 101.935643][ T9701] vfs_write+0x69d/0x770 [ 101.937550][ T9701] __x64_sys_pwrite64+0xf5/0x150 [ 101.938699][ T9701] do_syscall_64+0x4a/0x90 [ 101.940551][ T9701] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.942132][ T9701] RIP: 0033:0x419777 [ 101.943545][ T9701] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 101.949709][ T9701] RSP: 002b:00007f0cfa4b5f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 101.952773][ T9701] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 101.955107][ T9701] RDX: 000000000000003a RSI: 0000000020010000 RDI: 0000000000000004 [ 101.956624][ T9701] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 101.957910][ T9701] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 101.959851][ T9701] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 101.961013][ T9699] CPU: 1 PID: 9699 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 101.963950][ T9699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.966506][ T9699] Call Trace: [ 101.967054][ T9699] dump_stack+0x137/0x19d [ 101.968503][ T9699] should_fail+0x23c/0x250 [ 101.969575][ T9699] ? security_file_alloc+0x30/0x190 [ 101.970744][ T9699] __should_failslab+0x81/0x90 [ 101.972127][ T9699] should_failslab+0x5/0x20 [ 101.973022][ T9699] kmem_cache_alloc+0x46/0x2f0 [ 101.973966][ T9699] security_file_alloc+0x30/0x190 [ 101.974949][ T9699] __alloc_file+0x83/0x1a0 [ 101.975803][ T9699] alloc_empty_file+0xcd/0x1c0 [ 101.976560][ T9699] alloc_file+0x3a/0x280 [ 101.977296][ T9699] alloc_file_pseudo+0xe2/0x130 [ 101.978458][ T9699] __shmem_file_setup+0x14c/0x1d0 [ 101.980118][ T9699] shmem_file_setup+0x37/0x40 [ 101.981116][ T9699] __se_sys_memfd_create+0x1eb/0x390 [ 101.982052][ T9699] __x64_sys_memfd_create+0x2d/0x40 [ 101.983362][ T9699] do_syscall_64+0x4a/0x90 [ 101.984157][ T9699] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.985384][ T9699] RIP: 0033:0x4665d9 [ 101.986198][ T9699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.990558][ T9699] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 101.992433][ T9699] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 101.993824][ T9699] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 101.995045][ T9699] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 101.996015][ T9702] FAULT_INJECTION: forcing a failure. [ 101.996015][ T9702] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 101.996717][ T9699] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 102.000097][ T9699] R13: 0000000020000100 R14: 0000000000000800 R15: 00000000200000c0 [ 102.002466][ T9702] CPU: 0 PID: 9702 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 102.004967][ T9702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.007084][ T9702] Call Trace: [ 102.007821][ T9702] dump_stack+0x137/0x19d [ 102.009253][ T9702] should_fail+0x23c/0x250 [ 102.010091][ T9702] __alloc_pages+0x102/0x320 [ 102.011352][ T9702] alloc_pages+0x21d/0x310 12:59:03 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 102.012097][ T9702] __page_cache_alloc+0x4d/0xf0 [ 102.013052][ T9702] filemap_read+0x703/0x1230 [ 102.014131][ T9702] ? inode_init_always+0x2f0/0x420 [ 102.016157][ T9702] ? get_page_from_freelist+0x53e/0x800 [ 102.017487][ T9702] generic_file_read_iter+0x75/0x2c0 [ 102.017521][ T9701] loop5: detected capacity change from 0 to 4 [ 102.019649][ T9702] ? selinux_file_permission+0x22e/0x530 [ 102.020649][ T9702] ext4_file_read_iter+0x1db/0x290 [ 102.021525][ T9702] do_iter_readv_writev+0x2e8/0x360 [ 102.022841][ T9702] do_iter_read+0x109/0x4b0 [ 102.023547][ T9701] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 102.023670][ T9702] do_preadv+0x13b/0x230 [ 102.026550][ T9702] ? __cond_resched+0x11/0x40 [ 102.027577][ T9702] ? fput+0x2d/0x130 [ 102.028408][ T9702] ? ksys_write+0x157/0x180 [ 102.029214][ T9702] __x64_sys_preadv+0x54/0x60 [ 102.031095][ T9702] do_syscall_64+0x4a/0x90 [ 102.032179][ T9702] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.034251][ T9702] RIP: 0033:0x4665d9 [ 102.034996][ T9702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 102.039714][ T9702] RSP: 002b:00007f7c0150c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 102.041628][ T9702] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 102.043796][ T9702] RDX: 0000000000000001 RSI: 0000000020000440 RDI: 0000000000000003 [ 102.046264][ T9702] RBP: 00007f7c0150c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 102.048471][ T9702] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 102.050144][ T9702] R13: 00007ffe8cfcb87f R14: 00007f7c0150c300 R15: 0000000000022000 12:59:04 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:04 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:04 executing program 0 (fault-call:4 fault-nth:2): r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:04 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) r4 = creat(0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000001940)='/proc/self/exe\x00', 0x0, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000500)='ns/mnt\x00') ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000900)=0x10) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000940)={0x0, 0x0}, &(0x7f0000000980)=0xc) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000009c0)={0x0, 0x0, 0x0}, &(0x7f0000000a00)=0xc) syz_mount_image$iso9660(&(0x7f0000000540), &(0x7f0000000080)='./bus\x00', 0x7fff, 0x9, &(0x7f00000010c0)=[{&(0x7f0000000140)="0b058bf005fe73d6bc14dc5b9dc04bc3a4974ea0e1062c0c4c220d803286e76062c62300acea16be594ec4795688d9cb0942ca6b471e4d9f97c7239ad37a7ed98f0c01547d04d162299b23780152b600297129f8859d9e7bdc32c2bfd2c93bf094b1226483bd1f77c7440aa6155d2bdd7fde8c5d1c9956690f7f9e0b4f2d4109c1db4c86d1df251cdc63f90e3d81094316c6b71fd442ac198ff9675d4bede72b5bc42dc57283497c4ea9737bce3c901b0d877332b9db66fde04d950f5b04a3c96258bca2b7559b134d377c03389ed6b31e71660a7fb1b6da34fd06", 0xdb, 0xfff}, {&(0x7f0000000280)="0a67858d9c54dfa96b2b9508f7bc433de5e559731c9375391a0bce9620b9a96954f5d0b0a4bc0b87f7b3e72f93c6bfbaa1937c1426ae22ebdea4d28182ba152fc19d344ac6f22719840f100da63d71837bdf251be902fdac8bab770b7e6690b37f1e4428b52c515d60c9a798e4251a729538ab29c494a27017db3328fa561239e30a68f440ce2534cefda51159ad04f6671c02c12847badbd5548ed916a5a1f3bbf35fdc6143ab2b8a203bb9fb67fe2047af6cea73af448d9ab9ecb3fcdb8b757d62f88e9725734a979f244dc5d1e169", 0xd0, 0x400}, {&(0x7f0000000380)="a512dbe04b7685ab976185765bb79464e891c611a9ebfd06e6a6baf9bd0200908de4754e90b52d96c4213ce247099320f5b7d92966b7d43c78483f632c7abc3c95b2725c95014180a0226de666e064e1c169dd986cb43c92b9d1656905007bbe04de9398f95db4656904e99b7d09d86071ea9d975fd7c8bf785c1f7598641a9a2e7c82e4540e7de25d11256a368bc7100ecec594cfa0f2fe4067a01589b6dccf7fa5b39e6f161f70090f673da0ef4030639ed8c049f7f33f0f17b4164e4f57bab65e07d87dadb1e17dda5c10ecc11163af1f", 0xd2, 0x3}, {&(0x7f0000000480)="92f6a385dd7fa508fa", 0x9, 0x4}, {&(0x7f00000004c0)="119686972746e051ba162526d411121cddd5c15ae44513d38f", 0x19, 0x1}, {&(0x7f0000000580)="5037830d6e4163fe8391ba6ca9931f01017105156606c1a5f252a25d2fbddc2b02821df2cc408299d0fb3b05af8a6f43deb1364aa554800721129e572b295786f497e9d6a848f8cdb1c0fad0c7ba1de69d02ba7c753c68858acb36540f6c912ecc1f9ce509381995b7fc05fe04dc661b4438e6a27e9d8b563a66879a2fe2304505f8735541d0453037743f2792f4623bd02db9df6fa5d3dfa5ee7f3d39f5e8cef10c5d2111ae90b7af38795d2ab7b3ed1d3515608ccee502e52093d578b891735adda73d67d467cbc404454a0029900699c45e0e", 0xd4, 0x2df}, {&(0x7f0000000680)="0756314723f5e23d484da1dfefe06f52b4cf42d62a28073f21147ab46c375fb71c7a101ea4e68eb343b8e5e86603de9d812996787f3ee84495f1d899365c6065867edd63b5b140f027fc5fedbaa07e776d49167631628067f96e4ccdd7c77a2dec67d275d7a9943df4a455e6e47fc0e102c7c4f75f15dd7bee0aa9910b715573527e6c145e7210da25f94c9b75215115", 0x90, 0x8000}, {&(0x7f0000000740)="fe0a058dba2c9ba188582680f0359e93432f63cd3e6e6c5a78846925ee117e66f8a3930a4168129484a8b7939a4351673cbc3e5b3479cbaeba335b125d9cd0b26e4b4832d7118f20b8d6b9b21e39ec3fd0a07c7f6b9e3830ed93cf760c580203e44ea85953c7e387a22c03faead5a95a8ba04f6c9ea093d16ff647d1dad1b2bded003f4f0500df5bc3378076196938a2bfec3afe632b9ec6332f266cf33e496aa1bfbe6614b5bf1b5c85a664404f4bf3b489f47b4745726e187481e99230e5f921c625eb76", 0xc5}, {&(0x7f0000001040)="faf04b0a59aff93c1396d96cd7acff065625008c6a5483adbcdf26ff6f9b57dd3fdbedc663861a07b62dea2e9b86626b5c1bcb91cccbb92d24dd6c5d50f929f79ccd56fcb1e0d0f9d1677474213f4ba3ece30dfd1236", 0x56, 0x6}], 0x8000, &(0x7f0000000a40)=ANY=[@ANYBLOB='dmode=0x0000000000000004,norock,hide,unhide,norock,uid=', @ANYRESHEX=r7, @ANYBLOB="93f6c73c3d", @ANYRESHEX=r8, @ANYBLOB=',check=strict,cruft,appraise_type=imasig,obj_user=,,\x00']) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r9 = socket(0x10, 0x803, 0x0) sendto(r9, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r9, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) r11 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r11, 0x0) io_submit(r3, 0x6, &(0x7f0000001000)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x0, 0x0, r0, &(0x7f0000000000), 0x0, 0x8043ff, 0x0, 0x1}, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x7, 0x1, r9, &(0x7f0000000b00)="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", 0xfd, 0x3, 0x0, 0x1, r4}, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x2, 0x1, r10, &(0x7f0000000c40)="3de18b048adda673ab8abe6939447864fd09f68508ef3b98d7c7640ae81d0669f580a9ad0ec7ba8ef5e4e166f101b80289bee0a3c136ca62a818a7c9e1ee2bcbc415a75bb4a7e4d0fc4b4ac5b34bd30f09507ed4f5efea22273d42f5ae0252e53327a1daac25e758bf4b7bf9caa26ba5c934a0241830b4743cbd411193c672f1d21cb39bceb4afbdb6c834a4f24d485e2d1f4b87e5aedbb9357a73feedc6ccce06b1c1c10b51c161995f2415498e8d64ea1442a106de998cc338b4e64e8183e482b893a3e48c66", 0xc7, 0x9, 0x0, 0x1}, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x7, 0x8, 0xffffffffffffffff, &(0x7f0000000dc0)="5f38fa8181c8a33bc172ade07bb698befa0aa099dac7b76d27621045b840a86cb2ac295aa3dc8a68f9da9c614310b2a6657ece62b30b50e1dfecd0796ab4d57d1c75df9b34d72dcab45f83f0f83996382e926183771922771a17711785e39c388fd566b8d91968674807cf5e82c3787a4c47bd282f69da855d33dcb830b91496b0e50133a37830e24fbacfc199dabe018a10", 0x92, 0x3ff, 0x0, 0x2}, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x8, 0x1ed, r2, &(0x7f0000000f00)="5ba3ec1abf35eb61861dc981b20eb0c4a71e9bed8fec8b47ab09d8e4d8fede141bab722384c0d50f867f663e0f0ea50e65d4c3dd", 0x34, 0x3ff, 0x0, 0x1}, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x9, 0x1, 0xffffffffffffffff, &(0x7f0000000f80)="0260530668577cfc9395db4e4d82a580c5146b2e21f0caafed16fe3092b7ce4e21e70f2526082dbe3ea4e33baf03a0c6d3688a89dc243fac627c6c18", 0x3c, 0x1000000000, 0x0, 0x2}]) [ 102.116149][ T9710] FAULT_INJECTION: forcing a failure. [ 102.116149][ T9710] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 102.119750][ T9710] CPU: 1 PID: 9710 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 102.121487][ T9710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.123408][ T9710] Call Trace: [ 102.124055][ T9710] dump_stack+0x137/0x19d [ 102.124902][ T9710] should_fail+0x23c/0x250 [ 102.125822][ T9710] __alloc_pages+0x102/0x320 [ 102.126662][ T9710] alloc_pages_vma+0x391/0x660 [ 102.127663][ T9710] shmem_getpage_gfp+0x980/0x1410 [ 102.129126][ T9710] ? mls_context_isvalid+0x76/0x1e0 [ 102.129978][ T9710] shmem_write_begin+0x7e/0x100 [ 102.130840][ T9710] generic_perform_write+0x196/0x3a0 [ 102.132009][ T9710] ? file_update_time+0x1bd/0x3e0 [ 102.132930][ T9710] __generic_file_write_iter+0x161/0x300 [ 102.134074][ T9710] ? generic_write_checks+0x250/0x290 [ 102.135430][ T9710] generic_file_write_iter+0x75/0x130 [ 102.136543][ T9710] vfs_write+0x69d/0x770 [ 102.137400][ T9710] __x64_sys_pwrite64+0xf5/0x150 [ 102.138517][ T9710] do_syscall_64+0x4a/0x90 [ 102.139449][ T9710] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.140584][ T9710] RIP: 0033:0x419777 [ 102.141178][ T9710] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 102.142154][ T9719] loop2: detected capacity change from 0 to 768 [ 102.144921][ T9710] RSP: 002b:00007f6ea9873f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 102.144942][ T9710] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 102.149101][ T9710] RDX: 000000000000003a RSI: 0000000020010000 RDI: 0000000000000004 [ 102.150666][ T9710] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 102.153782][ T9710] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 102.155710][ T9710] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 102.160380][ T9721] FAULT_INJECTION: forcing a failure. [ 102.160380][ T9721] name failslab, interval 1, probability 0, space 0, times 0 [ 102.164062][ T9721] CPU: 0 PID: 9721 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 12:59:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 102.165822][ T9721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.167924][ T9721] Call Trace: [ 102.168672][ T9721] dump_stack+0x137/0x19d [ 102.169426][ T9721] should_fail+0x23c/0x250 [ 102.170165][ T9721] ? xas_create+0x96b/0xb30 [ 102.171120][ T9721] __should_failslab+0x81/0x90 [ 102.172519][ T9721] should_failslab+0x5/0x20 [ 102.173515][ T9721] kmem_cache_alloc+0x46/0x2f0 [ 102.174775][ T9721] xas_create+0x96b/0xb30 [ 102.176579][ T9721] xas_store+0x70/0xca0 [ 102.177517][ T9721] ? xas_find_conflict+0x422/0x4c0 [ 102.178349][ T9721] __add_to_page_cache_locked+0x1eb/0x4e0 [ 102.179509][ T9721] ? workingset_activation+0x270/0x270 [ 102.180385][ T9721] add_to_page_cache_lru+0xa0/0x1b0 [ 102.181489][ T9721] filemap_read+0x735/0x1230 [ 102.182272][ T9721] ? inode_init_always+0x2f0/0x420 [ 102.183686][ T9721] ? get_page_from_freelist+0x53e/0x800 [ 102.184656][ T9721] generic_file_read_iter+0x75/0x2c0 [ 102.186568][ T9721] ? selinux_file_permission+0x22e/0x530 [ 102.187510][ T9721] ext4_file_read_iter+0x1db/0x290 [ 102.188707][ T9721] do_iter_readv_writev+0x2e8/0x360 [ 102.189955][ T9721] do_iter_read+0x109/0x4b0 [ 102.191242][ T9724] FAULT_INJECTION: forcing a failure. [ 102.191242][ T9724] name failslab, interval 1, probability 0, space 0, times 0 [ 102.191305][ T9721] do_preadv+0x13b/0x230 [ 102.194878][ T9721] ? __cond_resched+0x11/0x40 [ 102.195693][ T9721] ? fput+0x2d/0x130 [ 102.196590][ T9721] ? ksys_write+0x157/0x180 [ 102.197432][ T9721] __x64_sys_preadv+0x54/0x60 [ 102.198287][ T9721] do_syscall_64+0x4a/0x90 [ 102.199098][ T9721] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.200444][ T9721] RIP: 0033:0x4665d9 [ 102.201205][ T9721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 102.205456][ T9721] RSP: 002b:00007f7c0150c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 102.207178][ T9721] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 102.209080][ T9721] RDX: 0000000000000001 RSI: 0000000020000440 RDI: 0000000000000003 [ 102.210754][ T9721] RBP: 00007f7c0150c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 102.212779][ T9721] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 102.214078][ T9721] R13: 00007ffe8cfcb87f R14: 00007f7c0150c300 R15: 0000000000022000 [ 102.215723][ T9724] CPU: 1 PID: 9724 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 102.217716][ T9724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.220200][ T9724] Call Trace: [ 102.221048][ T9724] dump_stack+0x137/0x19d [ 102.222276][ T9724] should_fail+0x23c/0x250 [ 102.223211][ T9724] ? getname_flags+0x84/0x3d0 [ 102.224160][ T9724] __should_failslab+0x81/0x90 [ 102.225889][ T9724] should_failslab+0x5/0x20 [ 102.226800][ T9724] kmem_cache_alloc+0x46/0x2f0 [ 102.227686][ T9724] getname_flags+0x84/0x3d0 [ 102.228397][ T9724] ? vfs_write+0x50c/0x770 [ 102.229093][ T9724] getname+0x15/0x20 [ 102.229851][ T9724] do_sys_openat2+0x5b/0x250 [ 102.230820][ T9724] __x64_sys_openat+0xef/0x110 [ 102.231497][ T9724] do_syscall_64+0x4a/0x90 [ 102.232638][ T9724] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.233730][ T9724] RIP: 0033:0x4196c4 [ 102.234344][ T9724] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 102.237293][ T9724] RSP: 002b:00007f0cfa4b5ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 102.239007][ T9724] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 102.241174][ T9724] RDX: 0000000000000002 RSI: 00007f0cfa4b6000 RDI: 00000000ffffff9c [ 102.242357][ T9724] RBP: 00007f0cfa4b6000 R08: 0000000000000000 R09: ffffffffffffffff [ 102.245480][ T9724] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 102.246869][ T9724] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 102.254105][ T9719] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) 12:59:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:04 executing program 0 (fault-call:4 fault-nth:3): r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:04 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 102.264395][ T9731] loop4: detected capacity change from 0 to 128 12:59:04 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 102.311319][ T9739] FAULT_INJECTION: forcing a failure. [ 102.311319][ T9739] name failslab, interval 1, probability 0, space 0, times 0 [ 102.315110][ T9739] CPU: 1 PID: 9739 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 102.317850][ T9739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.321926][ T9739] Call Trace: [ 102.322572][ T9739] dump_stack+0x137/0x19d [ 102.323416][ T9739] should_fail+0x23c/0x250 [ 102.324617][ T9739] ? xas_create+0x96b/0xb30 [ 102.325632][ T9739] __should_failslab+0x81/0x90 [ 102.326724][ T9739] should_failslab+0x5/0x20 [ 102.327787][ T9739] kmem_cache_alloc+0x46/0x2f0 [ 102.328636][ T9739] ? xas_create+0x96b/0xb30 [ 102.329861][ T9739] xas_create+0x96b/0xb30 [ 102.330567][ T9739] xas_store+0x70/0xca0 [ 102.331254][ T9739] ? xas_find_conflict+0x422/0x4c0 [ 102.332640][ T9739] __add_to_page_cache_locked+0x1eb/0x4e0 [ 102.334438][ T9739] ? workingset_activation+0x270/0x270 [ 102.335407][ T9739] add_to_page_cache_lru+0xa0/0x1b0 [ 102.336422][ T9739] filemap_read+0x735/0x1230 [ 102.337578][ T9739] ? inode_init_always+0x2f0/0x420 [ 102.338541][ T9739] ? get_page_from_freelist+0x53e/0x800 [ 102.339986][ T9739] generic_file_read_iter+0x75/0x2c0 [ 102.341585][ T9739] ? selinux_file_permission+0x22e/0x530 [ 102.342516][ T9739] ext4_file_read_iter+0x1db/0x290 [ 102.343506][ T9739] do_iter_readv_writev+0x2e8/0x360 [ 102.344601][ T9739] do_iter_read+0x109/0x4b0 [ 102.345923][ T9739] do_preadv+0x13b/0x230 [ 102.347013][ T9739] ? __cond_resched+0x11/0x40 [ 102.347931][ T9739] ? fput+0x2d/0x130 [ 102.348857][ T9739] ? ksys_write+0x157/0x180 [ 102.349915][ T9739] __x64_sys_preadv+0x54/0x60 [ 102.350663][ T9739] do_syscall_64+0x4a/0x90 [ 102.351394][ T9739] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.352871][ T9739] RIP: 0033:0x4665d9 [ 102.353578][ T9739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 102.357315][ T9739] RSP: 002b:00007f7c0150c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 102.359567][ T9739] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 12:59:04 executing program 0 (fault-call:4 fault-nth:4): r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 102.360744][ T9739] RDX: 0000000000000001 RSI: 0000000020000440 RDI: 0000000000000003 [ 102.363084][ T9739] RBP: 00007f7c0150c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 102.364600][ T9739] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 102.366400][ T9739] R13: 00007ffe8cfcb87f R14: 00007f7c0150c300 R15: 0000000000022000 [ 102.391522][ T9731] loop4: detected capacity change from 0 to 128 [ 102.391939][ T9710] loop1: detected capacity change from 0 to 4 [ 102.400233][ T9710] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 102.414253][ T9752] FAULT_INJECTION: forcing a failure. [ 102.414253][ T9752] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.417077][ T9752] CPU: 1 PID: 9752 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 102.419361][ T9752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.421496][ T9752] Call Trace: [ 102.422284][ T9752] dump_stack+0x137/0x19d [ 102.423671][ T9752] should_fail+0x23c/0x250 [ 102.424468][ T9752] should_fail_usercopy+0x16/0x20 [ 102.425410][ T9752] strncpy_from_user+0x21/0x250 [ 102.426634][ T9752] getname_flags+0xb8/0x3d0 [ 102.427542][ T9752] ? vfs_write+0x50c/0x770 [ 102.428228][ T9752] getname+0x15/0x20 [ 102.428536][ T9755] FAULT_INJECTION: forcing a failure. [ 102.428536][ T9755] name failslab, interval 1, probability 0, space 0, times 0 [ 102.429013][ T9752] do_sys_openat2+0x5b/0x250 [ 102.433604][ T9752] __x64_sys_openat+0xef/0x110 [ 102.434733][ T9752] do_syscall_64+0x4a/0x90 [ 102.435474][ T9752] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.436481][ T9752] RIP: 0033:0x4196c4 [ 102.437073][ T9752] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 102.440122][ T9752] RSP: 002b:00007f0cfa4b5ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 102.441624][ T9752] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 102.443139][ T9752] RDX: 0000000000000002 RSI: 00007f0cfa4b6000 RDI: 00000000ffffff9c [ 102.445630][ T9752] RBP: 00007f0cfa4b6000 R08: 0000000000000000 R09: ffffffffffffffff [ 102.446996][ T9752] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 102.448270][ T9752] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 102.449611][ T9755] CPU: 0 PID: 9755 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 102.451126][ T9755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.453542][ T9755] Call Trace: [ 102.454063][ T9755] dump_stack+0x137/0x19d [ 102.455061][ T9755] should_fail+0x23c/0x250 [ 102.456024][ T9755] ? xas_create+0x96b/0xb30 [ 102.456822][ T9755] __should_failslab+0x81/0x90 [ 102.458033][ T9755] should_failslab+0x5/0x20 [ 102.459528][ T9755] kmem_cache_alloc+0x46/0x2f0 [ 102.460412][ T9755] ? xas_create+0x96b/0xb30 [ 102.461435][ T9755] xas_create+0x96b/0xb30 [ 102.462808][ T9755] xas_store+0x70/0xca0 [ 102.463503][ T9755] ? xas_find_conflict+0x422/0x4c0 [ 102.465229][ T9755] __add_to_page_cache_locked+0x1eb/0x4e0 [ 102.466503][ T9755] ? workingset_activation+0x270/0x270 [ 102.467855][ T9755] add_to_page_cache_lru+0xa0/0x1b0 [ 102.468901][ T9755] filemap_read+0x735/0x1230 [ 102.469797][ T9755] ? inode_init_always+0x2f0/0x420 [ 102.470668][ T9755] ? get_page_from_freelist+0x53e/0x800 [ 102.471546][ T9755] generic_file_read_iter+0x75/0x2c0 [ 102.472578][ T9755] ? selinux_file_permission+0x22e/0x530 [ 102.473787][ T9755] ext4_file_read_iter+0x1db/0x290 [ 102.474955][ T9755] do_iter_readv_writev+0x2e8/0x360 [ 102.476137][ T9755] do_iter_read+0x109/0x4b0 [ 102.477498][ T9755] do_preadv+0x13b/0x230 [ 102.478543][ T9755] ? __cond_resched+0x11/0x40 [ 102.479347][ T9755] ? fput+0x2d/0x130 [ 102.480122][ T9755] ? ksys_write+0x157/0x180 [ 102.481308][ T9755] __x64_sys_preadv+0x54/0x60 [ 102.482609][ T9755] do_syscall_64+0x4a/0x90 [ 102.484933][ T9755] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.486442][ T9755] RIP: 0033:0x4665d9 [ 102.487277][ T9755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 102.491467][ T9755] RSP: 002b:00007f7c0150c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 102.493298][ T9755] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 102.494799][ T9755] RDX: 0000000000000001 RSI: 0000000020000440 RDI: 0000000000000003 [ 102.497161][ T9755] RBP: 00007f7c0150c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 102.498960][ T9755] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 102.500807][ T9755] R13: 00007ffe8cfcb87f R14: 00007f7c0150c300 R15: 0000000000022000 12:59:04 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:04 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:04 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="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"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 12:59:04 executing program 0 (fault-call:4 fault-nth:5): r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:04 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 102.577408][ T9771] FAULT_INJECTION: forcing a failure. [ 102.577408][ T9771] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.580105][ T9771] CPU: 1 PID: 9771 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 102.582055][ T9771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.584572][ T9771] Call Trace: [ 102.585315][ T9771] dump_stack+0x137/0x19d [ 102.586052][ T9771] should_fail+0x23c/0x250 [ 102.586809][ T9771] should_fail_usercopy+0x16/0x20 [ 102.587822][ T9771] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 102.589009][ T9771] ? shmem_write_begin+0x7e/0x100 [ 102.590009][ T9771] generic_perform_write+0x1e4/0x3a0 [ 102.591007][ T9771] ? file_update_time+0x1bd/0x3e0 [ 102.592081][ T9771] __generic_file_write_iter+0x161/0x300 [ 102.593428][ T9771] ? generic_write_checks+0x250/0x290 [ 102.594332][ T9771] generic_file_write_iter+0x75/0x130 [ 102.595572][ T9771] vfs_write+0x69d/0x770 [ 102.596385][ T9771] __x64_sys_pwrite64+0xf5/0x150 [ 102.597284][ T9771] do_syscall_64+0x4a/0x90 [ 102.598560][ T9771] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.600067][ T9771] RIP: 0033:0x419777 [ 102.600768][ T9771] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 102.604939][ T9771] RSP: 002b:00007f6ea9873f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 102.607120][ T9771] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 102.608470][ T9771] RDX: 000000000000003a RSI: 0000000020010000 RDI: 0000000000000004 [ 102.609987][ T9771] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 102.611866][ T9771] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 102.613802][ T9771] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 102.619797][ T9768] FAULT_INJECTION: forcing a failure. [ 102.619797][ T9768] name failslab, interval 1, probability 0, space 0, times 0 [ 102.620078][ T9774] FAULT_INJECTION: forcing a failure. [ 102.620078][ T9774] name failslab, interval 1, probability 0, space 0, times 0 [ 102.622381][ T9768] CPU: 0 PID: 9768 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 102.622400][ T9768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.630672][ T9768] Call Trace: [ 102.631677][ T9768] dump_stack+0x137/0x19d [ 102.632703][ T9768] should_fail+0x23c/0x250 [ 102.633542][ T9768] ? xas_create+0x96b/0xb30 [ 102.634310][ T9768] __should_failslab+0x81/0x90 [ 102.635592][ T9768] should_failslab+0x5/0x20 [ 102.636367][ T9768] kmem_cache_alloc+0x46/0x2f0 [ 102.637048][ T9768] ? xas_create+0x96b/0xb30 [ 102.638591][ T9768] xas_create+0x96b/0xb30 [ 102.639433][ T9768] xas_store+0x70/0xca0 [ 102.640746][ T9768] ? xas_find_conflict+0x422/0x4c0 [ 102.641986][ T9768] __add_to_page_cache_locked+0x1eb/0x4e0 [ 102.643606][ T9768] ? workingset_activation+0x270/0x270 [ 102.644849][ T9768] add_to_page_cache_lru+0xa0/0x1b0 [ 102.646286][ T9768] filemap_read+0x735/0x1230 [ 102.646982][ T9768] ? inode_init_always+0x2f0/0x420 [ 102.648264][ T9768] ? get_page_from_freelist+0x53e/0x800 [ 102.649147][ T9768] generic_file_read_iter+0x75/0x2c0 [ 102.650183][ T9768] ? selinux_file_permission+0x22e/0x530 [ 102.651038][ T9768] ext4_file_read_iter+0x1db/0x290 [ 102.652424][ T9768] do_iter_readv_writev+0x2e8/0x360 [ 102.653795][ T9768] do_iter_read+0x109/0x4b0 [ 102.655174][ T9768] do_preadv+0x13b/0x230 [ 102.655849][ T9768] ? __cond_resched+0x11/0x40 [ 102.656628][ T9768] ? fput+0x2d/0x130 [ 102.657363][ T9768] ? ksys_write+0x157/0x180 [ 102.658510][ T9768] __x64_sys_preadv+0x54/0x60 [ 102.659475][ T9768] do_syscall_64+0x4a/0x90 [ 102.660321][ T9768] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.661639][ T9768] RIP: 0033:0x4665d9 [ 102.662492][ T9768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 102.667688][ T9768] RSP: 002b:00007f7c0150c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 102.669542][ T9768] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 102.671758][ T9768] RDX: 0000000000000001 RSI: 0000000020000440 RDI: 0000000000000003 [ 102.673782][ T9768] RBP: 00007f7c0150c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 102.675502][ T9768] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 12:59:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 102.677073][ T9768] R13: 00007ffe8cfcb87f R14: 00007f7c0150c300 R15: 0000000000022000 [ 102.679539][ T9774] CPU: 1 PID: 9774 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 102.681840][ T9774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.683811][ T9774] Call Trace: [ 102.684447][ T9774] dump_stack+0x137/0x19d [ 102.685278][ T9774] should_fail+0x23c/0x250 [ 102.686163][ T9774] ? __alloc_file+0x2e/0x1a0 [ 102.687238][ T9774] __should_failslab+0x81/0x90 [ 102.687988][ T9774] should_failslab+0x5/0x20 [ 102.689401][ T9774] kmem_cache_alloc+0x46/0x2f0 [ 102.690240][ T9774] __alloc_file+0x2e/0x1a0 [ 102.691534][ T9774] alloc_empty_file+0xcd/0x1c0 [ 102.692707][ T9774] path_openat+0x6a/0x20b0 [ 102.693682][ T9774] ? iov_iter_advance+0x291/0xe10 [ 102.695275][ T9774] ? shmem_write_end+0x37d/0x3d0 [ 102.696075][ T9774] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 102.697129][ T9774] ? generic_perform_write+0x332/0x3a0 [ 102.698283][ T9774] do_filp_open+0xd9/0x1f0 [ 102.699675][ T9774] ? __virt_addr_valid+0x15a/0x1a0 [ 102.700778][ T9774] ? __check_object_size+0x253/0x310 [ 102.701600][ T9774] ? _find_next_bit+0x16a/0x190 [ 102.702439][ T9774] ? alloc_fd+0x388/0x3e0 [ 102.704023][ T9774] do_sys_openat2+0xa3/0x250 [ 102.705075][ T9774] __x64_sys_openat+0xef/0x110 [ 102.706032][ T9774] do_syscall_64+0x4a/0x90 [ 102.706903][ T9774] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.707959][ T9774] RIP: 0033:0x4196c4 [ 102.709097][ T9774] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 102.712612][ T9774] RSP: 002b:00007f0cfa4b5ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 102.713976][ T9774] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 102.715251][ T9774] RDX: 0000000000000002 RSI: 00007f0cfa4b6000 RDI: 00000000ffffff9c [ 102.716925][ T9774] RBP: 00007f0cfa4b6000 R08: 0000000000000000 R09: ffffffffffffffff [ 102.718480][ T9774] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 102.720217][ T9774] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 12:59:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xffffffffffffff81, 0x9) mmap(&(0x7f00001c8000/0x3000)=nil, 0x3000, 0x2000002, 0x110, 0xffffffffffffffff, 0x0) mlockall(0x0) mlockall(0x6) 12:59:04 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:04 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 102.739607][ T9771] loop1: detected capacity change from 0 to 4 [ 102.742739][ T9771] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:04 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:04 executing program 0 (fault-call:4 fault-nth:6): r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:04 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) getpid() r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1ad042, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1fd, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000140)) sendfile(r0, r0, 0x0, 0x8080ffffff7e) [ 102.828402][ T9803] loop2: detected capacity change from 0 to 4096 [ 102.835753][ T9807] FAULT_INJECTION: forcing a failure. [ 102.835753][ T9807] name failslab, interval 1, probability 0, space 0, times 0 [ 102.838918][ T9804] FAULT_INJECTION: forcing a failure. [ 102.838918][ T9804] name failslab, interval 1, probability 0, space 0, times 0 [ 102.839480][ T9807] CPU: 1 PID: 9807 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 102.842892][ T9807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.844485][ T9807] Call Trace: [ 102.845050][ T9807] dump_stack+0x137/0x19d [ 102.845705][ T9807] should_fail+0x23c/0x250 [ 102.846426][ T9807] ? getname_flags+0x84/0x3d0 [ 102.847559][ T9807] __should_failslab+0x81/0x90 [ 102.848370][ T9807] should_failslab+0x5/0x20 [ 102.849199][ T9807] kmem_cache_alloc+0x46/0x2f0 [ 102.850382][ T9807] getname_flags+0x84/0x3d0 [ 102.851283][ T9807] ? vfs_write+0x50c/0x770 [ 102.852061][ T9807] getname+0x15/0x20 [ 102.852604][ T9807] do_sys_openat2+0x5b/0x250 [ 102.853299][ T9807] __x64_sys_openat+0xef/0x110 [ 102.853974][ T9807] do_syscall_64+0x4a/0x90 [ 102.854632][ T9807] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.856100][ T9807] RIP: 0033:0x4196c4 [ 102.856759][ T9807] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 102.861904][ T9807] RSP: 002b:00007f6ea9873ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 102.863363][ T9807] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 102.865396][ T9807] RDX: 0000000000000002 RSI: 00007f6ea9874000 RDI: 00000000ffffff9c [ 102.867630][ T9807] RBP: 00007f6ea9874000 R08: 0000000000000000 R09: ffffffffffffffff [ 102.869312][ T9807] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 102.871619][ T9807] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 102.873169][ T9804] CPU: 0 PID: 9804 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 102.875062][ T9804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.876983][ T9804] Call Trace: [ 102.877873][ T9804] dump_stack+0x137/0x19d [ 102.878961][ T9804] should_fail+0x23c/0x250 [ 102.879671][ T9804] ? security_file_alloc+0x30/0x190 [ 102.880070][ T9808] FAULT_INJECTION: forcing a failure. [ 102.880070][ T9808] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.880801][ T9804] __should_failslab+0x81/0x90 [ 102.883800][ T9804] should_failslab+0x5/0x20 [ 102.884917][ T9804] kmem_cache_alloc+0x46/0x2f0 [ 102.886101][ T9804] security_file_alloc+0x30/0x190 [ 102.886870][ T9804] __alloc_file+0x83/0x1a0 [ 102.887769][ T9804] alloc_empty_file+0xcd/0x1c0 [ 102.889042][ T9804] path_openat+0x6a/0x20b0 [ 102.890229][ T9804] ? iov_iter_advance+0x291/0xe10 [ 102.891505][ T9804] ? shmem_write_end+0x37d/0x3d0 [ 102.892381][ T9804] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 102.893301][ T9804] ? generic_perform_write+0x332/0x3a0 [ 102.894144][ T9804] do_filp_open+0xd9/0x1f0 [ 102.894904][ T9804] ? __virt_addr_valid+0x15a/0x1a0 [ 102.895982][ T9804] ? __check_object_size+0x253/0x310 [ 102.896915][ T9804] ? _find_next_bit+0x16a/0x190 [ 102.897879][ T9804] ? alloc_fd+0x388/0x3e0 [ 102.898959][ T9804] do_sys_openat2+0xa3/0x250 [ 102.900135][ T9804] __x64_sys_openat+0xef/0x110 [ 102.901510][ T9804] do_syscall_64+0x4a/0x90 [ 102.902478][ T9804] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.903616][ T9804] RIP: 0033:0x4196c4 [ 102.904344][ T9804] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 102.908026][ T9804] RSP: 002b:00007f0cfa4b5ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 102.909477][ T9804] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 102.911020][ T9804] RDX: 0000000000000002 RSI: 00007f0cfa4b6000 RDI: 00000000ffffff9c [ 102.912614][ T9804] RBP: 00007f0cfa4b6000 R08: 0000000000000000 R09: ffffffffffffffff [ 102.913916][ T9804] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 102.915618][ T9804] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 102.917059][ T9808] CPU: 1 PID: 9808 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 102.917884][ T9803] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 102.919044][ T9808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.919054][ T9808] Call Trace: [ 102.919060][ T9808] dump_stack+0x137/0x19d [ 102.921861][ T9803] EXT4-fs (loop2): mount failed [ 102.923732][ T9808] should_fail+0x23c/0x250 12:59:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:04 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 102.927873][ T9808] should_fail_usercopy+0x16/0x20 [ 102.929745][ T9808] _copy_to_user+0x1c/0x90 [ 102.930587][ T9808] simple_read_from_buffer+0xab/0x120 [ 102.931904][ T9808] proc_fail_nth_read+0xf6/0x140 [ 102.932975][ T9808] ? rw_verify_area+0x136/0x250 [ 102.934012][ T9808] ? proc_fault_inject_write+0x200/0x200 [ 102.935437][ T9808] vfs_read+0x154/0x5d0 [ 102.936539][ T9808] ? __fget_light+0x21b/0x260 [ 102.937679][ T9808] ? __cond_resched+0x11/0x40 [ 102.938782][ T9808] ksys_read+0xce/0x180 [ 102.939746][ T9808] __x64_sys_read+0x3e/0x50 [ 102.940702][ T9808] do_syscall_64+0x4a/0x90 [ 102.941590][ T9808] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.943305][ T9808] RIP: 0033:0x41935c [ 102.944167][ T9808] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 102.947828][ T9808] RSP: 002b:00007f7c0150c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 102.949439][ T9808] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041935c [ 102.950815][ T9808] RDX: 000000000000000f RSI: 00007f7c0150c1e0 RDI: 0000000000000005 [ 102.952709][ T9808] RBP: 00007f7c0150c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 102.954922][ T9808] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 102.957449][ T9808] R13: 00007ffe8cfcb87f R14: 00007f7c0150c300 R15: 0000000000022000 [ 102.996560][ T9820] FAULT_INJECTION: forcing a failure. [ 102.996560][ T9820] name failslab, interval 1, probability 0, space 0, times 0 [ 102.999230][ T9820] CPU: 1 PID: 9820 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 103.000972][ T9820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.003832][ T9820] Call Trace: [ 103.004519][ T9820] dump_stack+0x137/0x19d [ 103.005572][ T9820] should_fail+0x23c/0x250 [ 103.006658][ T9820] ? loop_set_status_from_info+0x3a0/0x3a0 [ 103.007816][ T9820] __should_failslab+0x81/0x90 [ 103.008716][ T9820] ? __kthread_create_on_node+0x7a/0x290 [ 103.010004][ T9820] should_failslab+0x5/0x20 [ 103.010716][ T9820] kmem_cache_alloc_trace+0x49/0x310 [ 103.011581][ T9820] ? loop_set_status_from_info+0x3a0/0x3a0 [ 103.012671][ T9820] __kthread_create_on_node+0x7a/0x290 [ 103.013711][ T9820] ? __blkdev_get+0xc1/0x6d0 [ 103.014584][ T9820] ? loop_set_status_from_info+0x3a0/0x3a0 [ 103.015771][ T9820] kthread_create_on_node+0x72/0xa0 [ 103.016944][ T9820] loop_configure+0x597/0xcb0 [ 103.017847][ T9820] ? mntput+0x45/0x70 [ 103.018472][ T9820] lo_ioctl+0x555/0x11f0 [ 103.019190][ T9820] ? path_openat+0x19ab/0x20b0 [ 103.020148][ T9820] ? putname+0xa5/0xc0 [ 103.021022][ T9820] ? ___cache_free+0x3c/0x300 [ 103.022071][ T9820] ? blkdev_common_ioctl+0x9c3/0x1040 [ 103.023394][ T9820] ? selinux_file_ioctl+0x8e0/0x970 [ 103.024703][ T9820] ? lo_release+0x120/0x120 [ 103.025714][ T9820] blkdev_ioctl+0x1d0/0x3c0 [ 103.026502][ T9820] block_ioctl+0x6d/0x80 [ 103.027778][ T9820] ? blkdev_iopoll+0x70/0x70 [ 103.029151][ T9820] __se_sys_ioctl+0xcb/0x140 [ 103.030029][ T9820] __x64_sys_ioctl+0x3f/0x50 [ 103.030846][ T9820] do_syscall_64+0x4a/0x90 [ 103.031757][ T9820] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 103.032849][ T9820] RIP: 0033:0x466397 [ 103.033777][ T9820] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 103.038700][ T9820] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 103.040124][ T9820] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 103.042060][ T9820] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 103.043998][ T9820] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 12:59:04 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:04 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:04 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 103.045422][ T9820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 103.047354][ T9820] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 12:59:05 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 103.091180][ T9832] FAULT_INJECTION: forcing a failure. [ 103.091180][ T9832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.094408][ T9832] CPU: 0 PID: 9832 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 103.096270][ T9832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.098338][ T9832] Call Trace: [ 103.098985][ T9832] dump_stack+0x137/0x19d [ 103.100393][ T9832] should_fail+0x23c/0x250 [ 103.101880][ T9832] should_fail_usercopy+0x16/0x20 [ 103.102845][ T9832] strncpy_from_user+0x21/0x250 [ 103.104067][ T9832] getname_flags+0xb8/0x3d0 [ 103.105021][ T9832] ? vfs_write+0x50c/0x770 [ 103.105756][ T9832] getname+0x15/0x20 [ 103.106767][ T9832] do_sys_openat2+0x5b/0x250 [ 103.107529][ T9832] __x64_sys_openat+0xef/0x110 [ 103.108569][ T9832] do_syscall_64+0x4a/0x90 [ 103.109533][ T9832] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 103.110964][ T9832] RIP: 0033:0x4196c4 [ 103.111658][ T9832] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 103.115037][ T9832] RSP: 002b:00007f6ea9873ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 103.116699][ T9832] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 103.118841][ T9832] RDX: 0000000000000002 RSI: 00007f6ea9874000 RDI: 00000000ffffff9c [ 103.120837][ T9832] RBP: 00007f6ea9874000 R08: 0000000000000000 R09: ffffffffffffffff [ 103.122336][ T9832] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 103.124268][ T9832] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 103.127270][ T9830] loop2: detected capacity change from 0 to 4096 12:59:05 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x2}], 0x1, 0xffffffff, 0x0) [ 103.152642][ T9830] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 103.157125][ T9830] EXT4-fs (loop2): mount failed [ 103.168596][ T9845] FAULT_INJECTION: forcing a failure. [ 103.168596][ T9845] name failslab, interval 1, probability 0, space 0, times 0 [ 103.171830][ T9845] CPU: 0 PID: 9845 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 103.173179][ T9845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.175081][ T9845] Call Trace: [ 103.176707][ T9845] dump_stack+0x137/0x19d [ 103.177554][ T9845] should_fail+0x23c/0x250 [ 103.178507][ T9845] ? __kernfs_new_node+0x6a/0x330 [ 103.179514][ T9845] __should_failslab+0x81/0x90 [ 103.180425][ T9845] should_failslab+0x5/0x20 [ 103.181209][ T9845] kmem_cache_alloc+0x46/0x2f0 [ 103.182259][ T9845] ? kvm_sched_clock_read+0xd/0x20 [ 103.184302][ T9845] __kernfs_new_node+0x6a/0x330 [ 103.185469][ T9845] ? select_task_rq_fair+0x186/0xc00 [ 103.186470][ T9845] ? rb_insert_color+0x7e/0x310 [ 103.187504][ T9845] kernfs_create_dir_ns+0x5e/0x140 [ 103.188714][ T9845] internal_create_group+0x138/0x850 [ 103.189771][ T9845] ? check_preempt_wakeup+0x1bb/0x360 [ 103.191002][ T9845] sysfs_create_group+0x1b/0x20 [ 103.192564][ T9845] loop_configure+0xa21/0xcb0 [ 103.193643][ T9845] lo_ioctl+0x555/0x11f0 [ 103.194872][ T9845] ? path_openat+0x19ab/0x20b0 [ 103.195979][ T9845] ? putname+0xa5/0xc0 [ 103.196908][ T9845] ? ___cache_free+0x3c/0x300 [ 103.197867][ T9845] ? blkdev_common_ioctl+0x9c3/0x1040 [ 103.198847][ T9845] ? selinux_file_ioctl+0x8e0/0x970 [ 103.200036][ T9845] ? lo_release+0x120/0x120 [ 103.201373][ T9845] blkdev_ioctl+0x1d0/0x3c0 12:59:05 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20000120}], 0x1, 0xffffffff, 0x0) 12:59:05 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 103.202384][ T9845] block_ioctl+0x6d/0x80 [ 103.203529][ T9845] ? blkdev_iopoll+0x70/0x70 [ 103.204704][ T9845] __se_sys_ioctl+0xcb/0x140 [ 103.205491][ T9845] __x64_sys_ioctl+0x3f/0x50 [ 103.206514][ T9845] do_syscall_64+0x4a/0x90 [ 103.207449][ T9845] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 103.208689][ T9845] RIP: 0033:0x466397 [ 103.209718][ T9845] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 103.213247][ T9845] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 103.214895][ T9845] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 103.216372][ T9845] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 103.217927][ T9845] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 103.220352][ T9845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 103.221945][ T9845] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 103.223752][ T9845] loop5: detected capacity change from 0 to 4 [ 103.256371][ T9845] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 103.284817][ T9865] FAULT_INJECTION: forcing a failure. [ 103.284817][ T9865] name failslab, interval 1, probability 0, space 0, times 0 [ 103.288040][ T9865] CPU: 0 PID: 9865 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 103.289548][ T9865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.292659][ T9865] Call Trace: [ 103.293571][ T9865] dump_stack+0x137/0x19d [ 103.294693][ T9865] should_fail+0x23c/0x250 [ 103.296444][ T9865] ? __alloc_file+0x2e/0x1a0 [ 103.297360][ T9865] __should_failslab+0x81/0x90 [ 103.298284][ T9865] should_failslab+0x5/0x20 [ 103.299025][ T9865] kmem_cache_alloc+0x46/0x2f0 [ 103.299831][ T9865] __alloc_file+0x2e/0x1a0 [ 103.300865][ T9865] alloc_empty_file+0xcd/0x1c0 [ 103.301900][ T9865] path_openat+0x6a/0x20b0 [ 103.303059][ T9865] ? iov_iter_advance+0x291/0xe10 [ 103.304492][ T9865] ? shmem_write_end+0x37d/0x3d0 [ 103.305701][ T9865] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 103.306700][ T9865] ? generic_perform_write+0x332/0x3a0 [ 103.307594][ T9865] do_filp_open+0xd9/0x1f0 [ 103.308343][ T9865] ? __virt_addr_valid+0x15a/0x1a0 [ 103.309225][ T9865] ? __check_object_size+0x253/0x310 [ 103.310536][ T9865] ? _find_next_bit+0x16a/0x190 [ 103.311266][ T9865] ? alloc_fd+0x388/0x3e0 [ 103.312704][ T9865] do_sys_openat2+0xa3/0x250 [ 103.313532][ T9865] __x64_sys_openat+0xef/0x110 [ 103.314415][ T9865] do_syscall_64+0x4a/0x90 [ 103.315278][ T9865] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 103.316261][ T9865] RIP: 0033:0x4196c4 [ 103.316913][ T9865] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 103.320419][ T9865] RSP: 002b:00007f6ea9873ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 103.321890][ T9865] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 103.323376][ T9865] RDX: 0000000000000002 RSI: 00007f6ea9874000 RDI: 00000000ffffff9c [ 103.324512][ T9865] RBP: 00007f6ea9874000 R08: 0000000000000000 R09: ffffffffffffffff [ 103.326118][ T9865] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 103.328067][ T9865] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 12:59:05 executing program 4: symlink(&(0x7f0000000700)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000006c0)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=@known='trusted.overlay.impure\x00', 0x0, 0x0, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x100010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') openat(r0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x341c00, 0x98) statfs(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000780)=""/4096) 12:59:05 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:05 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:05 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:05 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x7ffff000}], 0x1, 0xffffffff, 0x0) 12:59:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 103.963745][ T9886] FAULT_INJECTION: forcing a failure. [ 103.963745][ T9886] name failslab, interval 1, probability 0, space 0, times 0 [ 103.964597][ T9885] loop2: detected capacity change from 0 to 4096 [ 103.967143][ T9886] CPU: 0 PID: 9886 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 103.970239][ T9886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.974751][ T9886] Call Trace: [ 103.975736][ T9886] dump_stack+0x137/0x19d [ 103.977370][ T9886] should_fail+0x23c/0x250 [ 103.979052][ T9886] ? security_file_alloc+0x30/0x190 [ 103.980699][ T9886] __should_failslab+0x81/0x90 [ 103.982400][ T9886] should_failslab+0x5/0x20 [ 103.983959][ T9886] kmem_cache_alloc+0x46/0x2f0 [ 103.985795][ T9886] security_file_alloc+0x30/0x190 [ 103.987832][ T9886] __alloc_file+0x83/0x1a0 [ 103.989962][ T9886] alloc_empty_file+0xcd/0x1c0 [ 103.992041][ T9886] path_openat+0x6a/0x20b0 [ 103.993672][ T9886] ? iov_iter_advance+0x291/0xe10 [ 103.996159][ T9886] ? shmem_write_end+0x37d/0x3d0 [ 103.997889][ T9886] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 103.999984][ T9886] ? generic_perform_write+0x332/0x3a0 [ 104.001928][ T9886] do_filp_open+0xd9/0x1f0 [ 104.003527][ T9886] ? __virt_addr_valid+0x15a/0x1a0 [ 104.005935][ T9886] ? __check_object_size+0x253/0x310 [ 104.008002][ T9886] ? _find_next_bit+0x16a/0x190 [ 104.010332][ T9886] ? alloc_fd+0x388/0x3e0 12:59:05 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0xffffffff000}], 0x1, 0xffffffff, 0x0) [ 104.011994][ T9886] do_sys_openat2+0xa3/0x250 [ 104.014310][ T9886] __x64_sys_openat+0xef/0x110 [ 104.016252][ T9886] do_syscall_64+0x4a/0x90 [ 104.018301][ T9886] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 104.020602][ T9886] RIP: 0033:0x4196c4 [ 104.021815][ T9886] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 104.029761][ T9886] RSP: 002b:00007f6ea9873ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 104.034547][ T9886] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 104.036925][ T9886] RDX: 0000000000000002 RSI: 00007f6ea9874000 RDI: 00000000ffffff9c [ 104.038677][ T9886] RBP: 00007f6ea9874000 R08: 0000000000000000 R09: ffffffffffffffff [ 104.040410][ T9886] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 104.042951][ T9886] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 12:59:06 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000500)={0x64ad}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0214f9f407000904000a002000000000000000000008001d0000000000", 0x24) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xc) bind(r2, &(0x7f0000000f80)=@l2={0x1f, 0x6, @any, 0x4, 0x2}, 0x80) socketpair(0x2b, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$netlink(r3, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe, 0x20}, 0xc) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000000c0)={0x0, 0x3, 0x8}) open$dir(&(0x7f0000001000)='./file0\x00', 0x210000, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000540)={0x2, 0xffffffffffffbebd, @start={r4, 0x0, "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", "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"}, [0x1, 0x3, 0x1, 0x9, 0xb727, 0x5520, 0x1, 0x7fffffff, 0x0, 0xf5, 0x7ff, 0x100000001, 0x7, 0x1, 0x9, 0xffff, 0x4, 0x1, 0xb0d3, 0x40, 0x8, 0x7ff, 0x200004, 0x7, 0x0, 0x4, 0x4, 0x3, 0xf300, 0x800, 0xfffffffffffff96b, 0x401, 0x3, 0x7e0000, 0x1, 0x99, 0x7e, 0x6, 0x3, 0x6, 0x2, 0x4, 0x8, 0x5, 0xcdd, 0xbec, 0x4, 0x6, 0x0, 0x5d, 0x8, 0xa9, 0xb05, 0x1, 0xc89, 0x2, 0x2, 0x200, 0xa28, 0xde5, 0x1, 0x2, 0x207]}) r5 = socket(0x10, 0x803, 0x0) getpeername$netlink(r0, &(0x7f0000001040), &(0x7f0000001080)=0xc) sendto(r5, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$FIONCLEX(r5, 0x5450) [ 104.061267][ T9885] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 104.067559][ T9885] EXT4-fs (loop2): mount failed [ 104.070763][ T9888] FAULT_INJECTION: forcing a failure. [ 104.070763][ T9888] name failslab, interval 1, probability 0, space 0, times 0 [ 104.074418][ T9888] CPU: 0 PID: 9888 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 104.075732][ T9888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.077507][ T9888] Call Trace: [ 104.077997][ T9888] dump_stack+0x137/0x19d [ 104.078985][ T9888] should_fail+0x23c/0x250 [ 104.079907][ T9888] ? radix_tree_node_alloc+0x154/0x1f0 [ 104.081298][ T9888] __should_failslab+0x81/0x90 [ 104.082452][ T9888] should_failslab+0x5/0x20 [ 104.083256][ T9888] kmem_cache_alloc+0x46/0x2f0 [ 104.084007][ T9888] ? kvm_sched_clock_read+0xd/0x20 [ 104.085208][ T9888] ? sched_clock_cpu+0x11/0x180 [ 104.086202][ T9888] radix_tree_node_alloc+0x154/0x1f0 [ 104.087162][ T9888] idr_get_free+0x22a/0x5d0 [ 104.088393][ T9888] idr_alloc_cyclic+0xe3/0x2d0 [ 104.089463][ T9888] ? __radix_tree_preload+0x16f/0x190 [ 104.090671][ T9888] __kernfs_new_node+0xb4/0x330 [ 104.091836][ T9888] ? select_task_rq_fair+0x186/0xc00 [ 104.093149][ T9888] ? rb_insert_color+0x7e/0x310 [ 104.094208][ T9888] kernfs_create_dir_ns+0x5e/0x140 [ 104.095067][ T9888] internal_create_group+0x138/0x850 [ 104.095976][ T9888] ? check_preempt_wakeup+0x1bb/0x360 [ 104.097335][ T9888] sysfs_create_group+0x1b/0x20 [ 104.098168][ T9888] loop_configure+0xa21/0xcb0 [ 104.099395][ T9888] lo_ioctl+0x555/0x11f0 [ 104.100438][ T9888] ? path_openat+0x19ab/0x20b0 [ 104.101668][ T9888] ? putname+0xa5/0xc0 [ 104.102491][ T9888] ? ___cache_free+0x3c/0x300 [ 104.103485][ T9888] ? blkdev_common_ioctl+0x9c3/0x1040 [ 104.104977][ T9888] ? selinux_file_ioctl+0x8e0/0x970 [ 104.106043][ T9888] ? lo_release+0x120/0x120 [ 104.107938][ T9888] blkdev_ioctl+0x1d0/0x3c0 [ 104.109866][ T9888] block_ioctl+0x6d/0x80 [ 104.110915][ T9888] ? blkdev_iopoll+0x70/0x70 [ 104.112154][ T9888] __se_sys_ioctl+0xcb/0x140 12:59:06 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 104.113232][ T9888] __x64_sys_ioctl+0x3f/0x50 [ 104.114369][ T9888] do_syscall_64+0x4a/0x90 [ 104.115579][ T9888] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 104.117030][ T9888] RIP: 0033:0x466397 [ 104.117822][ T9888] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 104.122416][ T9888] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 104.124529][ T9888] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 104.126309][ T9888] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 104.127552][ T9888] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 104.128790][ T9888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 104.130106][ T9888] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 104.131666][ T9888] loop5: detected capacity change from 0 to 4 [ 104.136993][ T9888] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 104.140621][ T9914] FAULT_INJECTION: forcing a failure. [ 104.140621][ T9914] name failslab, interval 1, probability 0, space 0, times 0 [ 104.143958][ T9914] CPU: 1 PID: 9914 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 104.145689][ T9914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.149140][ T9914] Call Trace: [ 104.150328][ T9914] dump_stack+0x137/0x19d [ 104.151806][ T9914] should_fail+0x23c/0x250 [ 104.153447][ T9914] ? loop_set_status_from_info+0x3a0/0x3a0 [ 104.155437][ T9914] __should_failslab+0x81/0x90 [ 104.157325][ T9914] ? __kthread_create_on_node+0x7a/0x290 [ 104.159414][ T9914] should_failslab+0x5/0x20 [ 104.160623][ T9914] kmem_cache_alloc_trace+0x49/0x310 12:59:06 executing program 4: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000002c0)) r1 = dup(r0) fchmod(r1, 0x0) 12:59:06 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0xffffffffffffffff}], 0x1, 0xffffffff, 0x0) 12:59:06 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x3, 0xffffffff, 0x0) [ 104.162240][ T9914] ? loop_set_status_from_info+0x3a0/0x3a0 [ 104.164819][ T9914] __kthread_create_on_node+0x7a/0x290 [ 104.166474][ T9914] ? __blkdev_get+0xc1/0x6d0 [ 104.167983][ T9914] ? loop_set_status_from_info+0x3a0/0x3a0 [ 104.169725][ T9914] kthread_create_on_node+0x72/0xa0 [ 104.171474][ T9914] loop_configure+0x597/0xcb0 [ 104.173345][ T9914] ? mntput+0x45/0x70 [ 104.174864][ T9914] lo_ioctl+0x555/0x11f0 [ 104.176072][ T9914] ? path_openat+0x19ab/0x20b0 [ 104.177634][ T9914] ? putname+0xa5/0xc0 [ 104.179496][ T9914] ? ___cache_free+0x3c/0x300 [ 104.180741][ T9914] ? blkdev_common_ioctl+0x9c3/0x1040 [ 104.183022][ T9914] ? selinux_file_ioctl+0x8e0/0x970 [ 104.184646][ T9914] ? lo_release+0x120/0x120 [ 104.186696][ T9914] blkdev_ioctl+0x1d0/0x3c0 [ 104.188652][ T9914] block_ioctl+0x6d/0x80 [ 104.189999][ T9914] ? blkdev_iopoll+0x70/0x70 [ 104.192543][ T9914] __se_sys_ioctl+0xcb/0x140 [ 104.194528][ T9914] __x64_sys_ioctl+0x3f/0x50 [ 104.195592][ T9914] do_syscall_64+0x4a/0x90 [ 104.196805][ T9914] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 104.198176][ T9914] RIP: 0033:0x466397 [ 104.199029][ T9914] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 104.203768][ T9914] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 104.205964][ T9914] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 104.207583][ T9914] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 104.208971][ T9914] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 104.210814][ T9914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 12:59:06 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 104.212629][ T9914] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 12:59:06 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:06 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x8, 0xffffffff, 0x0) 12:59:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000140)=0x3, 0x1000) pipe2(&(0x7f0000002200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000040)="cb", 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f00000002c0)='asymmetric\x00', 0x0, &(0x7f0000000340)="b7", 0x1, r1) 12:59:06 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 104.289683][ T9935] loop2: detected capacity change from 0 to 4096 [ 104.324403][ T9935] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 104.327524][ T9952] FAULT_INJECTION: forcing a failure. [ 104.327524][ T9952] name failslab, interval 1, probability 0, space 0, times 0 [ 104.331102][ T9935] EXT4-fs (loop2): mount failed [ 104.332789][ T9952] CPU: 1 PID: 9952 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 104.336006][ T9952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.337858][ T9952] Call Trace: [ 104.338461][ T9953] FAULT_INJECTION: forcing a failure. [ 104.338461][ T9953] name failslab, interval 1, probability 0, space 0, times 0 [ 104.338527][ T9952] dump_stack+0x137/0x19d [ 104.342246][ T9952] should_fail+0x23c/0x250 [ 104.343283][ T9952] ? __kernfs_new_node+0x6a/0x330 [ 104.344520][ T9952] __should_failslab+0x81/0x90 [ 104.345929][ T9952] should_failslab+0x5/0x20 [ 104.346551][ T9952] kmem_cache_alloc+0x46/0x2f0 [ 104.347505][ T9952] ? kvm_sched_clock_read+0xd/0x20 [ 104.348357][ T9952] __kernfs_new_node+0x6a/0x330 [ 104.349362][ T9952] ? select_task_rq_fair+0x186/0xc00 [ 104.350970][ T9952] ? rb_insert_color+0x2dc/0x310 [ 104.352041][ T9952] kernfs_create_dir_ns+0x5e/0x140 [ 104.353019][ T9952] internal_create_group+0x138/0x850 [ 104.354501][ T9952] ? check_preempt_wakeup+0x1bb/0x360 [ 104.355800][ T9952] sysfs_create_group+0x1b/0x20 [ 104.356519][ T9952] loop_configure+0xa21/0xcb0 [ 104.357480][ T9952] lo_ioctl+0x555/0x11f0 [ 104.358691][ T9952] ? path_openat+0x19ab/0x20b0 [ 104.359428][ T9952] ? putname+0xa5/0xc0 [ 104.360245][ T9952] ? ___cache_free+0x3c/0x300 [ 104.361452][ T9952] ? blkdev_common_ioctl+0x9c3/0x1040 [ 104.362564][ T9952] ? selinux_file_ioctl+0x8e0/0x970 [ 104.363484][ T9952] ? lo_release+0x120/0x120 [ 104.364650][ T9952] blkdev_ioctl+0x1d0/0x3c0 [ 104.365570][ T9952] block_ioctl+0x6d/0x80 [ 104.366235][ T9952] ? blkdev_iopoll+0x70/0x70 [ 104.366949][ T9952] __se_sys_ioctl+0xcb/0x140 [ 104.367693][ T9952] __x64_sys_ioctl+0x3f/0x50 [ 104.368528][ T9952] do_syscall_64+0x4a/0x90 [ 104.369309][ T9952] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 104.370929][ T9952] RIP: 0033:0x466397 [ 104.371692][ T9952] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 104.375063][ T9952] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 104.377587][ T9952] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 104.379388][ T9952] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 104.381381][ T9952] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 104.382754][ T9952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 104.385092][ T9952] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 104.386584][ T9953] CPU: 0 PID: 9953 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 104.386660][ T9952] loop1: detected capacity change from 0 to 4 [ 104.388212][ T9953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.388221][ T9953] Call Trace: [ 104.388227][ T9953] dump_stack+0x137/0x19d [ 104.394383][ T9953] should_fail+0x23c/0x250 [ 104.395618][ T9953] ? __kernfs_new_node+0x6a/0x330 [ 104.396559][ T9953] __should_failslab+0x81/0x90 [ 104.397440][ T9953] should_failslab+0x5/0x20 [ 104.398437][ T9953] kmem_cache_alloc+0x46/0x2f0 [ 104.399316][ T9953] ? __cond_resched+0x11/0x40 [ 104.400598][ T9953] __kernfs_new_node+0x6a/0x330 [ 104.401753][ T9953] ? idr_alloc_cyclic+0x249/0x2d0 [ 104.403039][ T9953] ? rb_insert_color+0x7e/0x310 [ 104.403946][ T9953] kernfs_new_node+0x5b/0xd0 [ 104.405782][ T9953] __kernfs_create_file+0x45/0x1a0 [ 104.407341][ T9953] sysfs_add_file_mode_ns+0x1c1/0x250 [ 104.408746][ T9953] internal_create_group+0x2e4/0x850 [ 104.409954][ T9953] sysfs_create_group+0x1b/0x20 [ 104.410856][ T9953] loop_configure+0xa21/0xcb0 [ 104.412169][ T9953] lo_ioctl+0x555/0x11f0 [ 104.413116][ T9953] ? path_openat+0x19ab/0x20b0 [ 104.414177][ T9953] ? putname+0xa5/0xc0 [ 104.415162][ T9953] ? ___cache_free+0x3c/0x300 [ 104.416214][ T9953] ? blkdev_common_ioctl+0x9c3/0x1040 [ 104.417335][ T9953] ? selinux_file_ioctl+0x8e0/0x970 [ 104.418373][ T9953] ? lo_release+0x120/0x120 [ 104.419092][ T9953] blkdev_ioctl+0x1d0/0x3c0 [ 104.420153][ T9953] block_ioctl+0x6d/0x80 [ 104.421254][ T9953] ? blkdev_iopoll+0x70/0x70 [ 104.422221][ T9953] __se_sys_ioctl+0xcb/0x140 [ 104.423203][ T9953] __x64_sys_ioctl+0x3f/0x50 12:59:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="b800000013000100000000000000000000000000000000000000000000000001ff020000000000000000000000000001000000000000000002"], 0xb8}}, 0x0) [ 104.423996][ T9953] do_syscall_64+0x4a/0x90 [ 104.424748][ T9953] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 104.425789][ T9953] RIP: 0033:0x466397 [ 104.426570][ T9953] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 104.431095][ T9953] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 104.433584][ T9953] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 104.435825][ T9953] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 104.437090][ T9953] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 104.438466][ T9953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 104.440585][ T9953] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 104.442997][ T9953] loop5: detected capacity change from 0 to 4 12:59:06 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x300, 0xffffffff, 0x0) 12:59:06 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 104.469891][ T9953] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:06 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x24f4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xaad57c81b7a27570, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)="56f765c4db93fe9e944731d32fc8d55f3d803fa69936aae06436a06fe0a1e1238783bea182611a48273260f00972c1e0c71831c6afb0536e19843814689ff418af005c0d84907d93a98ba9286829bfb8250b70c521327e41b7437ac9827867a9aa1f2b3229ed1d04830c60bd61e07d658319d4924e978f87eed583d15fba32edd956e569b3ef1e5f73d8cfd2c49db31b7b3f4b999f2982510716cee2424321abb4a44f1863", 0xa5, 0x800, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) r2 = socket$inet6(0xa, 0x3, 0x8000) sendmmsg$sock(r2, &(0x7f0000000dc0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x2, 0x3, 0x3, {0xa, 0x4e22, 0x8, @loopback, 0xa604}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="6f3bd7c9ced450e849b6630b3894924f90b52926da1dfa0bdfe4e455a80ad03e72c94a71e07ddfabad019cb5388adb52de5b3f8f6095b445b64f97f4dc34cb3b3375c9dfef7f55112b65ab0f81b464cf9d269678336aa4e97c830f8a0fddc2caaaba4aea38d1a885eb8b7a7c432d36efb6e6f1af1696bdb829591c16373346c2bd63f88ae669995208ab6d048e0523f5eed86d4c66414fbe4596312e45f9415c0417d30859857c9c1db7d45f2d74d3777839b3d3bff8606955b1149425adb255380b3539fc", 0xc5}, {&(0x7f0000000340)="0616db64c578f7632f7cd4e9ee37d491762f427772f868e5a52c244eae577a29c826e0d4965fa6931c0729ec1f306837ea8876560e5ff5b83027409e8293a8bfee75a5c6927531a65c3f677f436ee70cc408e467bc86506a62062c6b7f27449da3f401ba61", 0x65}, {&(0x7f00000003c0)="6ca9157f24b9b1bd41b075b6171516b10cbee144ac1c745a9baeb55bd06f3369d07aa79d0eb755b54eaba451a8b85e4433d4c70659d44cc8700042b00d71f80bf1dc1a3bf4aa92884d03bd412cf381a4093b1f0618b68ad5672ab52a9ac7b0da6c480d21f30f285178131c3226c08464ac325236cedfa8f869", 0x79}, {&(0x7f0000000440)="58331645e01178916a3903e21f368c66aec4035b654dbc8533792b4e43ac977d4814cb11c911db07fd9a3d46e045617504effb486b464ab72c315980461a7e5bdba95dcd8f999289f3ba438c541e506c02d19c8f6c912cfae93ed1d4e3902329be0cc7", 0x63}], 0x5, &(0x7f0000000540)=[@txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x8000}}], 0x30}}, {{&(0x7f0000000580)=@in6={0xa, 0x4e24, 0x4, @mcast2, 0x4}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=[@timestamping={{0x14, 0x1, 0x25, 0xffffffff}}, @mark={{0x14, 0x1, 0x24, 0x7ff}}, @txtime={{0x18, 0x1, 0x3d, 0x4100e00e}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x100000001}}, @timestamping={{0x14, 0x1, 0x25, 0xffff8001}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}], 0xd8}}, {{&(0x7f0000000740)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000007c0)="fbb8d456408ae9b9f5cb0745600049cb7f9bcdfb4125ff1e915f6603e3503628fca1482154b724239de68b90228a43ab86a173c9257c79f0d1401bfdc1ff2afcb06312bfee6e9ab3cf94e4b4ba42", 0x4e}, {&(0x7f0000000840)="1bf03255a75fc2ceb08fd68975c19bc17097ed46f24e4aef7a27e4ea20d892b1f87bf09f177749c4551c0662e563a1ec0f70566044287d7de0d64915c92065ebf34aa82686f72548d67061009afb3fcee259c795abbb047466350d1eb3e6cb55c1aec26c79f64e5410bf8b15ee4ded85bf180a4e5bf514762a70425bce8e6c6b614e2f408e063003dd48ec6f46a457202dba05659654128df86de090e20c2687e4596b64a6501a736437a569f526c879c967f18420ae0eb7a0dc571c13eabb73b56a9198f100a0d10be2b9521ee18d779c0f27", 0xd3}, {&(0x7f0000000940)="5bef0092d0d35df7d336b3f6fe70005b75cc5545cfc3f65249045bed3c3925be2afd433826ef9e1a66f05bf69b0cf22bdbe0c31589bdf5615d1689a6c59a7f5c895d96616943d182e28ed099e9655a0e8071b0ff8c911c730e6191a1745a04d9dba1f86c62e6735ef50b2512527597d18e2c42e431af6386a598651e99ebd21d756d5ca2822b1175023d6920a0a8db0d300964617d7864fe9df7861b2e0987f85129fe6d8c1bae81d7e13f02a55e6cac621648c700aeedfa8856aa322312d1b12fee0fa5d6b27517fd8582bc4ee50544424f36e6a5f172499700", 0xda}, {&(0x7f0000000a40)="1f3b89687119d3f9ce08cc8e665a4f9c06c3ff79d965dfa3bc9c601aa16b0a702172e67ff20549011d0bbd7b9fbd1330d6e2ea5d97293536757ba26e459653956a22b7395c075c34c921f0f36d583c19e98d7ba9e5dbf3a3fb2aed161ec4b13625f6ac21a7e709758a06c0e0f8e384e8eb999deee9c39a44b979f97f83d7f2eea0897dac67fc402116d5c8fab0d55ac6f0d3f5aa1cbcf52d6211700f581ee500c0104b", 0xa3}, {&(0x7f0000000b00)="f69e73066159c1899773404b95ec26fc", 0x10}, {&(0x7f0000000b40)="ecad3773d4566793f625fdab31484b9e50f6b0967276ba4680d0bca74604d0727e506de6529563e986ea2a43ed91dcc9cf52e57ca15358a90af6fa065e71a571adb5e5e0df4a51f9a009b9a884440459d83d9e59af7b451c168ade7930a4e9e81bf6514d7f649df8fcd875a449a73b714a09cc7cef9b4bfe28a2e95c3af2b847c263dda859c279c62bf477550509c51982a229529e02b83cba3c2b9d93acc62af0e96abdd44ac03a989c324ac13310b7e5e660cb8856492726967d2c89a15b946b94387c070a1bd7c6f48def7b946da2b14d30337ad562eefcff4902adcc0418681fcc559d1194ecaffdf2ee55e2e4cc7c77606a4eb9f2", 0xf7}], 0x6, &(0x7f0000000cc0)=[@timestamping={{0x14, 0x1, 0x25, 0x7fffffff}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffff000}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x3ff}}, @mark={{0x14, 0x1, 0x24, 0x44}}, @mark={{0x14, 0x1, 0x24, 0xfffffffc}}], 0xf0}}], 0x3, 0x8080) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 12:59:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 104.491731][ T9952] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:06 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:06 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 104.543188][ T9975] loop2: detected capacity change from 0 to 4096 [ 104.564084][ T9975] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 104.567976][ T9975] EXT4-fs (loop2): mount failed [ 104.577106][ T9990] FAULT_INJECTION: forcing a failure. [ 104.577106][ T9990] name failslab, interval 1, probability 0, space 0, times 0 [ 104.580505][ T9990] CPU: 1 PID: 9990 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 104.582335][ T9990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.584490][ T9990] Call Trace: [ 104.585240][ T9990] dump_stack+0x137/0x19d [ 104.586244][ T9990] should_fail+0x23c/0x250 [ 104.587888][ T9990] ? radix_tree_node_alloc+0x154/0x1f0 [ 104.589441][ T9990] __should_failslab+0x81/0x90 [ 104.590129][ T9990] should_failslab+0x5/0x20 [ 104.590997][ T9990] kmem_cache_alloc+0x46/0x2f0 [ 104.592192][ T9990] ? kvm_sched_clock_read+0xd/0x20 [ 104.592980][ T9990] ? __perf_event_task_sched_out+0xce0/0xd30 [ 104.594889][ T9990] radix_tree_node_alloc+0x154/0x1f0 [ 104.595922][ T9990] idr_get_free+0x22a/0x5d0 [ 104.597091][ T9990] idr_alloc_cyclic+0xe3/0x2d0 [ 104.598031][ T9990] ? __radix_tree_preload+0x16f/0x190 [ 104.599168][ T9990] __kernfs_new_node+0xb4/0x330 [ 104.600822][ T9990] ? select_task_rq_fair+0x186/0xc00 [ 104.601971][ T9990] ? rb_insert_color+0x7e/0x310 [ 104.602880][ T9990] kernfs_create_dir_ns+0x5e/0x140 [ 104.603797][ T9990] internal_create_group+0x138/0x850 [ 104.604669][ T9990] ? check_preempt_wakeup+0x1bb/0x360 [ 104.605543][ T9990] sysfs_create_group+0x1b/0x20 [ 104.606574][ T9990] loop_configure+0xa21/0xcb0 [ 104.607833][ T9990] lo_ioctl+0x555/0x11f0 [ 104.608668][ T9990] ? path_openat+0x19ab/0x20b0 [ 104.609539][ T9990] ? putname+0xa5/0xc0 [ 104.610674][ T9990] ? ___cache_free+0x3c/0x300 [ 104.611528][ T9990] ? blkdev_common_ioctl+0x9c3/0x1040 [ 104.612352][ T9990] ? selinux_file_ioctl+0x8e0/0x970 12:59:06 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 104.613444][ T9990] ? lo_release+0x120/0x120 [ 104.614488][ T9990] blkdev_ioctl+0x1d0/0x3c0 [ 104.615234][ T9990] block_ioctl+0x6d/0x80 [ 104.616276][ T9990] ? blkdev_iopoll+0x70/0x70 [ 104.617732][ T9990] __se_sys_ioctl+0xcb/0x140 [ 104.618577][ T9990] __x64_sys_ioctl+0x3f/0x50 [ 104.619653][ T9990] do_syscall_64+0x4a/0x90 [ 104.620306][ T9990] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 104.621560][ T9990] RIP: 0033:0x466397 [ 104.622383][ T9990] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 104.626098][ T9990] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 104.628493][ T9990] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 104.629805][ T9990] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 104.631707][ T9990] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 104.633064][ T9990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 104.634776][ T9990] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 104.636788][ T9992] FAULT_INJECTION: forcing a failure. [ 104.636788][ T9992] name failslab, interval 1, probability 0, space 0, times 0 [ 104.639515][ T9992] CPU: 0 PID: 9992 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 104.641961][ T9992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.644167][ T9992] Call Trace: [ 104.645665][ T9992] dump_stack+0x137/0x19d [ 104.646488][ T9992] should_fail+0x23c/0x250 [ 104.647219][ T9992] ? __kernfs_new_node+0x6a/0x330 [ 104.648691][ T9992] __should_failslab+0x81/0x90 [ 104.649755][ T9992] should_failslab+0x5/0x20 [ 104.651445][ T9992] kmem_cache_alloc+0x46/0x2f0 [ 104.652324][ T9992] __kernfs_new_node+0x6a/0x330 [ 104.653976][ T9992] ? __cond_resched+0x11/0x40 [ 104.654072][ T9990] loop1: detected capacity change from 0 to 4 [ 104.655466][ T9992] ? mutex_lock+0x9/0x30 [ 104.655484][ T9992] kernfs_new_node+0x5b/0xd0 [ 104.659189][ T9992] __kernfs_create_file+0x45/0x1a0 [ 104.660193][ T9992] sysfs_add_file_mode_ns+0x1c1/0x250 [ 104.661613][ T9992] internal_create_group+0x2e4/0x850 [ 104.662858][ T9992] sysfs_create_group+0x1b/0x20 [ 104.664093][ T9992] loop_configure+0xa21/0xcb0 [ 104.665023][ T9992] lo_ioctl+0x555/0x11f0 [ 104.665901][ T9992] ? path_openat+0x19ab/0x20b0 [ 104.667070][ T9992] ? putname+0xa5/0xc0 [ 104.668315][ T9992] ? ___cache_free+0x3c/0x300 [ 104.669492][ T9992] ? blkdev_common_ioctl+0x9c3/0x1040 [ 104.670476][ T9992] ? selinux_file_ioctl+0x8e0/0x970 [ 104.671356][ T9992] ? lo_release+0x120/0x120 [ 104.672393][ T9992] blkdev_ioctl+0x1d0/0x3c0 [ 104.673360][ T9992] block_ioctl+0x6d/0x80 [ 104.675479][ T9992] ? blkdev_iopoll+0x70/0x70 [ 104.676595][ T9992] __se_sys_ioctl+0xcb/0x140 [ 104.677970][ T9992] __x64_sys_ioctl+0x3f/0x50 [ 104.679009][ T9992] do_syscall_64+0x4a/0x90 [ 104.680638][ T9992] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 104.682885][ T9992] RIP: 0033:0x466397 [ 104.684409][ T9992] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 104.691751][ T9992] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 104.694836][ T9992] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 104.697667][ T9992] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 104.701386][ T9992] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 104.704837][ T9992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 104.707316][ T9992] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 12:59:06 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:06 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x2) 12:59:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 104.726312][ T9992] loop5: detected capacity change from 0 to 4 [ 104.737968][ T9992] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 104.749064][ T9990] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:06 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:06 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 104.808919][T10009] loop2: detected capacity change from 0 to 4096 12:59:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 104.829371][T10009] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 104.836769][T10009] EXT4-fs (loop2): mount failed [ 104.862003][T10026] FAULT_INJECTION: forcing a failure. [ 104.862003][T10026] name failslab, interval 1, probability 0, space 0, times 0 [ 104.862048][T10023] FAULT_INJECTION: forcing a failure. [ 104.862048][T10023] name failslab, interval 1, probability 0, space 0, times 0 [ 104.865231][T10026] CPU: 1 PID: 10026 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 104.869581][T10026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.871390][T10026] Call Trace: [ 104.872846][T10026] dump_stack+0x137/0x19d [ 104.873662][T10026] should_fail+0x23c/0x250 [ 104.874475][T10026] ? __kernfs_new_node+0x6a/0x330 [ 104.875442][T10026] __should_failslab+0x81/0x90 [ 104.876229][T10026] should_failslab+0x5/0x20 [ 104.877394][T10026] kmem_cache_alloc+0x46/0x2f0 [ 104.878433][T10026] __kernfs_new_node+0x6a/0x330 [ 104.879135][T10026] ? __cond_resched+0x11/0x40 [ 104.879915][T10026] ? mutex_lock+0x9/0x30 [ 104.880786][T10026] kernfs_new_node+0x5b/0xd0 [ 104.881907][T10026] __kernfs_create_file+0x45/0x1a0 [ 104.883017][T10026] sysfs_add_file_mode_ns+0x1c1/0x250 [ 104.884073][T10026] internal_create_group+0x2e4/0x850 [ 104.884997][T10026] sysfs_create_group+0x1b/0x20 [ 104.886497][T10026] loop_configure+0xa21/0xcb0 [ 104.887298][T10026] lo_ioctl+0x555/0x11f0 [ 104.887972][T10026] ? path_openat+0x19ab/0x20b0 [ 104.888883][T10026] ? putname+0xa5/0xc0 [ 104.889910][T10026] ? ___cache_free+0x3c/0x300 [ 104.890875][T10026] ? blkdev_common_ioctl+0x9c3/0x1040 [ 104.892180][T10026] ? selinux_file_ioctl+0x8e0/0x970 [ 104.893225][T10026] ? lo_release+0x120/0x120 [ 104.893980][T10026] blkdev_ioctl+0x1d0/0x3c0 [ 104.895274][T10026] block_ioctl+0x6d/0x80 [ 104.896189][T10026] ? blkdev_iopoll+0x70/0x70 [ 104.897116][T10026] __se_sys_ioctl+0xcb/0x140 [ 104.897917][T10026] __x64_sys_ioctl+0x3f/0x50 [ 104.899298][T10026] do_syscall_64+0x4a/0x90 [ 104.900284][T10026] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 104.901695][T10026] RIP: 0033:0x466397 [ 104.902339][T10026] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 104.906299][T10026] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 104.908435][T10026] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 104.910268][T10026] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 104.911550][T10026] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 104.913138][T10026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 104.914498][T10026] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 104.915940][T10023] CPU: 0 PID: 10023 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 104.916212][T10026] loop1: detected capacity change from 0 to 4 [ 104.917472][T10023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.917488][T10023] Call Trace: [ 104.917494][T10023] dump_stack+0x137/0x19d [ 104.923450][T10023] should_fail+0x23c/0x250 [ 104.924314][T10023] ? __kernfs_new_node+0x6a/0x330 [ 104.925413][T10023] __should_failslab+0x81/0x90 [ 104.926812][T10023] should_failslab+0x5/0x20 [ 104.927563][T10023] kmem_cache_alloc+0x46/0x2f0 [ 104.929298][T10023] __kernfs_new_node+0x6a/0x330 [ 104.930149][T10023] ? __cond_resched+0x11/0x40 [ 104.930964][T10023] ? mutex_lock+0x9/0x30 [ 104.931776][T10023] kernfs_new_node+0x5b/0xd0 [ 104.932695][T10023] __kernfs_create_file+0x45/0x1a0 [ 104.933631][T10023] sysfs_add_file_mode_ns+0x1c1/0x250 [ 104.934707][T10026] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 104.935145][T10023] internal_create_group+0x2e4/0x850 [ 104.937841][T10023] sysfs_create_group+0x1b/0x20 [ 104.938942][T10023] loop_configure+0xa21/0xcb0 [ 104.939839][T10023] lo_ioctl+0x555/0x11f0 [ 104.941190][T10023] ? path_openat+0x19ab/0x20b0 [ 104.942007][T10023] ? putname+0xa5/0xc0 [ 104.943060][T10023] ? ___cache_free+0x3c/0x300 [ 104.943875][T10023] ? blkdev_common_ioctl+0x9c3/0x1040 [ 104.945325][T10023] ? selinux_file_ioctl+0x8e0/0x970 [ 104.947056][T10023] ? lo_release+0x120/0x120 [ 104.948091][T10023] blkdev_ioctl+0x1d0/0x3c0 [ 104.949121][T10023] block_ioctl+0x6d/0x80 [ 104.950312][T10023] ? blkdev_iopoll+0x70/0x70 [ 104.951382][T10023] __se_sys_ioctl+0xcb/0x140 [ 104.952701][T10023] __x64_sys_ioctl+0x3f/0x50 [ 104.953923][T10023] do_syscall_64+0x4a/0x90 [ 104.954657][T10023] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 104.955845][T10023] RIP: 0033:0x466397 [ 104.956652][T10023] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 104.961314][T10023] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 104.963656][T10023] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 104.966173][T10023] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 104.967936][T10023] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 104.969838][T10023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 104.972151][T10023] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 104.974351][T10023] loop5: detected capacity change from 0 to 4 [ 105.017994][T10023] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:07 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) r1 = socket$inet6(0xa, 0x800, 0x4) close(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x44142, 0x0) ftruncate(r2, 0x2008000) sendfile(r1, r2, 0x0, 0x200fff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:59:07 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x10) 12:59:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:07 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:07 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:07 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 105.442822][T10056] loop2: detected capacity change from 0 to 4096 [ 105.455503][T10061] FAULT_INJECTION: forcing a failure. [ 105.455503][T10061] name failslab, interval 1, probability 0, space 0, times 0 [ 105.460865][T10061] CPU: 0 PID: 10061 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 105.463464][T10061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.466477][T10061] Call Trace: [ 105.466517][T10056] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 105.467307][T10061] dump_stack+0x137/0x19d [ 105.471661][T10060] FAULT_INJECTION: forcing a failure. [ 105.471661][T10060] name failslab, interval 1, probability 0, space 0, times 0 [ 105.473133][T10061] should_fail+0x23c/0x250 [ 105.479914][T10061] ? __kernfs_new_node+0x6a/0x330 [ 105.481052][T10061] __should_failslab+0x81/0x90 [ 105.482406][T10061] should_failslab+0x5/0x20 [ 105.483613][T10061] kmem_cache_alloc+0x46/0x2f0 [ 105.485926][T10061] __kernfs_new_node+0x6a/0x330 [ 105.487059][T10061] ? __cond_resched+0x11/0x40 [ 105.488662][T10061] ? mutex_lock+0x9/0x30 [ 105.489539][T10061] kernfs_new_node+0x5b/0xd0 [ 105.490419][T10061] __kernfs_create_file+0x45/0x1a0 [ 105.491592][T10061] sysfs_add_file_mode_ns+0x1c1/0x250 [ 105.492926][T10061] internal_create_group+0x2e4/0x850 [ 105.493771][T10061] sysfs_create_group+0x1b/0x20 [ 105.494489][T10061] loop_configure+0xa21/0xcb0 [ 105.495194][T10061] lo_ioctl+0x555/0x11f0 [ 105.495957][T10061] ? path_openat+0x19ab/0x20b0 [ 105.496733][T10061] ? putname+0xa5/0xc0 [ 105.497404][T10061] ? ___cache_free+0x3c/0x300 [ 105.498457][T10061] ? blkdev_common_ioctl+0x9c3/0x1040 [ 105.499468][T10061] ? selinux_file_ioctl+0x8e0/0x970 [ 105.500712][T10061] ? lo_release+0x120/0x120 [ 105.502028][T10061] blkdev_ioctl+0x1d0/0x3c0 [ 105.503173][T10061] block_ioctl+0x6d/0x80 [ 105.504335][T10061] ? blkdev_iopoll+0x70/0x70 [ 105.505379][T10061] __se_sys_ioctl+0xcb/0x140 [ 105.506342][T10061] __x64_sys_ioctl+0x3f/0x50 [ 105.507388][T10061] do_syscall_64+0x4a/0x90 [ 105.508317][T10061] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 105.509917][T10061] RIP: 0033:0x466397 [ 105.510767][T10061] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 105.514585][T10061] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 105.516730][T10061] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 105.519131][T10061] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 105.520923][T10061] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 105.522657][T10061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 105.524557][T10061] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 105.526478][T10060] CPU: 1 PID: 10060 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 105.529075][T10060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.531263][T10060] Call Trace: [ 105.532009][T10060] dump_stack+0x137/0x19d [ 105.532818][T10060] should_fail+0x23c/0x250 [ 105.533717][T10060] ? __kernfs_new_node+0x6a/0x330 [ 105.534901][T10060] __should_failslab+0x81/0x90 [ 105.535767][T10060] should_failslab+0x5/0x20 [ 105.536631][T10060] kmem_cache_alloc+0x46/0x2f0 [ 105.537391][T10060] __kernfs_new_node+0x6a/0x330 [ 105.538892][T10060] ? __cond_resched+0x11/0x40 [ 105.539706][T10060] ? mutex_lock+0x9/0x30 [ 105.540499][T10060] kernfs_new_node+0x5b/0xd0 [ 105.541371][T10060] __kernfs_create_file+0x45/0x1a0 12:59:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:07 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x18) [ 105.542970][T10060] sysfs_add_file_mode_ns+0x1c1/0x250 [ 105.544493][T10060] internal_create_group+0x2e4/0x850 [ 105.544986][T10056] EXT4-fs (loop2): mount failed [ 105.545894][T10060] sysfs_create_group+0x1b/0x20 [ 105.545973][T10060] loop_configure+0xa21/0xcb0 [ 105.546004][T10060] lo_ioctl+0x555/0x11f0 [ 105.550203][T10060] ? path_openat+0x19ab/0x20b0 [ 105.551476][T10060] ? putname+0xa5/0xc0 [ 105.552452][T10060] ? ___cache_free+0x3c/0x300 [ 105.553213][T10060] ? blkdev_common_ioctl+0x9c3/0x1040 [ 105.554074][T10060] ? selinux_file_ioctl+0x8e0/0x970 [ 105.555086][T10060] ? lo_release+0x120/0x120 [ 105.556112][T10060] blkdev_ioctl+0x1d0/0x3c0 [ 105.556970][T10060] block_ioctl+0x6d/0x80 [ 105.558794][T10060] ? blkdev_iopoll+0x70/0x70 [ 105.560260][T10060] __se_sys_ioctl+0xcb/0x140 [ 105.561322][T10060] __x64_sys_ioctl+0x3f/0x50 [ 105.562302][T10060] do_syscall_64+0x4a/0x90 [ 105.563183][T10060] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 105.564775][T10060] RIP: 0033:0x466397 [ 105.566750][T10060] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 105.570190][T10060] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 105.571466][T10060] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 105.572684][T10060] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 105.574496][T10060] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 105.576141][T10060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 105.577450][T10060] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 105.579101][T10060] loop1: detected capacity change from 0 to 4 [ 105.581172][T10060] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:07 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:07 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x1800) 12:59:07 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 105.594588][T10061] loop5: detected capacity change from 0 to 4 [ 105.605021][T10061] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:07 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:07 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0xeffd) [ 105.673037][T10094] loop2: detected capacity change from 0 to 4096 [ 105.699450][T10097] FAULT_INJECTION: forcing a failure. [ 105.699450][T10097] name failslab, interval 1, probability 0, space 0, times 0 [ 105.702700][T10097] CPU: 0 PID: 10097 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 105.704783][T10097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.706890][T10097] Call Trace: [ 105.707479][T10097] dump_stack+0x137/0x19d [ 105.708478][T10097] should_fail+0x23c/0x250 [ 105.709535][T10097] ? __kernfs_new_node+0x6a/0x330 [ 105.710598][T10097] __should_failslab+0x81/0x90 [ 105.712030][T10097] should_failslab+0x5/0x20 [ 105.713320][T10097] kmem_cache_alloc+0x46/0x2f0 [ 105.714287][T10097] __kernfs_new_node+0x6a/0x330 [ 105.715063][T10097] ? __cond_resched+0x11/0x40 [ 105.715728][T10097] ? mutex_lock+0x9/0x30 [ 105.716374][T10097] kernfs_new_node+0x5b/0xd0 [ 105.717178][T10097] __kernfs_create_file+0x45/0x1a0 [ 105.717985][T10097] sysfs_add_file_mode_ns+0x1c1/0x250 [ 105.718919][T10097] internal_create_group+0x2e4/0x850 [ 105.720218][T10097] sysfs_create_group+0x1b/0x20 [ 105.721095][T10097] loop_configure+0xa21/0xcb0 [ 105.721907][T10097] lo_ioctl+0x555/0x11f0 [ 105.722580][T10097] ? path_openat+0x19ab/0x20b0 [ 105.723247][T10097] ? common_interrupt+0xf/0x90 [ 105.724069][T10097] ? __perf_event_task_sched_out+0xce0/0xd30 [ 105.725180][T10097] ? putname+0xa5/0xc0 [ 105.726207][T10097] ? __perf_event_task_sched_in+0x471/0x4c0 [ 105.727833][T10097] ? blkdev_common_ioctl+0x9c3/0x1040 [ 105.729119][T10097] ? selinux_file_ioctl+0x8e0/0x970 [ 105.730188][T10097] ? lo_release+0x120/0x120 [ 105.730937][T10097] blkdev_ioctl+0x1d0/0x3c0 [ 105.731968][T10097] block_ioctl+0x6d/0x80 [ 105.733157][T10097] ? blkdev_iopoll+0x70/0x70 [ 105.734154][T10097] __se_sys_ioctl+0xcb/0x140 [ 105.734839][T10097] __x64_sys_ioctl+0x3f/0x50 [ 105.736155][T10097] do_syscall_64+0x4a/0x90 [ 105.736835][T10097] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 105.737756][T10097] RIP: 0033:0x466397 [ 105.738541][T10097] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 105.742255][T10097] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 105.744440][T10097] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 105.746309][T10097] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 105.747584][T10097] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 105.748846][T10097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 105.750111][T10097] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 105.757149][T10094] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 105.763330][T10094] EXT4-fs (loop2): mount failed [ 105.769488][T10097] loop1: detected capacity change from 0 to 4 [ 105.776651][T10097] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 105.780661][T10109] FAULT_INJECTION: forcing a failure. [ 105.780661][T10109] name failslab, interval 1, probability 0, space 0, times 0 [ 105.784660][T10109] CPU: 1 PID: 10109 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 105.787144][T10109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.791615][T10109] Call Trace: [ 105.792881][T10109] dump_stack+0x137/0x19d [ 105.794692][T10109] should_fail+0x23c/0x250 [ 105.796836][T10109] ? __kernfs_new_node+0x6a/0x330 12:59:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000500)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @dev={0xac, 0x14, 0x14, 0x14}}, 0x8) r1 = socket(0x10, 0x803, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000040)={0x2, {{0x2, 0x4e23, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @private}}}, 0x108) 12:59:07 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0xfdef) 12:59:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 105.799414][T10109] __should_failslab+0x81/0x90 [ 105.801255][T10109] should_failslab+0x5/0x20 [ 105.802973][T10109] kmem_cache_alloc+0x46/0x2f0 [ 105.805170][T10109] __kernfs_new_node+0x6a/0x330 [ 105.808110][T10109] ? __cond_resched+0x11/0x40 [ 105.810296][T10109] ? mutex_lock+0x9/0x30 [ 105.811959][T10109] kernfs_new_node+0x5b/0xd0 [ 105.813356][T10109] __kernfs_create_file+0x45/0x1a0 [ 105.815449][T10109] sysfs_add_file_mode_ns+0x1c1/0x250 [ 105.817821][T10109] internal_create_group+0x2e4/0x850 [ 105.819947][T10109] sysfs_create_group+0x1b/0x20 [ 105.821806][T10109] loop_configure+0xa21/0xcb0 [ 105.823525][T10109] lo_ioctl+0x555/0x11f0 [ 105.826180][T10109] ? path_openat+0x19ab/0x20b0 [ 105.828086][T10109] ? putname+0xa5/0xc0 [ 105.830091][T10109] ? ___cache_free+0x3c/0x300 [ 105.832364][T10109] ? blkdev_common_ioctl+0x9c3/0x1040 [ 105.834627][T10109] ? selinux_file_ioctl+0x8e0/0x970 [ 105.836262][T10109] ? lo_release+0x120/0x120 [ 105.837239][T10109] blkdev_ioctl+0x1d0/0x3c0 [ 105.838786][T10109] block_ioctl+0x6d/0x80 [ 105.840226][T10109] ? blkdev_iopoll+0x70/0x70 [ 105.841683][T10109] __se_sys_ioctl+0xcb/0x140 [ 105.843136][T10109] __x64_sys_ioctl+0x3f/0x50 [ 105.844179][T10109] do_syscall_64+0x4a/0x90 [ 105.845309][T10109] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 105.847739][T10109] RIP: 0033:0x466397 [ 105.848862][T10109] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 105.855117][T10109] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 105.857890][T10109] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 105.861206][T10109] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 105.863239][T10109] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 105.866789][T10109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 105.869177][T10109] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 105.879038][T10109] loop5: detected capacity change from 0 to 4 12:59:07 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:07 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 105.908414][T10109] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:07 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xf}}}}, 0x108) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000340)={0x0, {{0xa, 0x4e24, 0x9, @local, 0x80}}, {{0xa, 0x4e23, 0x7f, @remote, 0x3}}}, 0x108) close(r1) sendmsg$nl_netfilter(r0, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)={0x88, 0x10, 0x1, 0x101, 0x70bd25, 0x25dfdbfb, {0x3, 0x0, 0x1}, [@generic="b13d3746ffb9f9f78ef771fa46f52c67fe685415f13d418f31aa5dc8edef04ee158e3233ddece7b1dcc898400ee950979a9548713e4cd719d0c7b1591fc348badeaa07c0ff4fd19b431fbf51c1be9064a75ddf85959dbb3dd22c89bed7be13380a7a46362a962abb8b5ce9ca06c80a551b"]}, 0x88}, 0x1, 0x0, 0x0, 0x40}, 0x4008014) 12:59:07 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0xfffff) 12:59:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 105.935991][T10131] FAULT_INJECTION: forcing a failure. [ 105.935991][T10131] name failslab, interval 1, probability 0, space 0, times 0 [ 105.941264][T10131] CPU: 0 PID: 10131 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 105.944826][T10131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.949295][T10131] Call Trace: [ 105.950469][T10131] dump_stack+0x137/0x19d [ 105.952671][T10131] should_fail+0x23c/0x250 [ 105.954202][T10131] ? __kernfs_new_node+0x6a/0x330 [ 105.955694][T10131] __should_failslab+0x81/0x90 [ 105.957253][T10131] should_failslab+0x5/0x20 [ 105.958391][T10131] kmem_cache_alloc+0x46/0x2f0 [ 105.960182][T10131] __kernfs_new_node+0x6a/0x330 [ 105.962311][T10131] ? __cond_resched+0x11/0x40 [ 105.963892][T10131] ? mutex_lock+0x9/0x30 [ 105.965294][T10131] kernfs_new_node+0x5b/0xd0 [ 105.966861][T10131] __kernfs_create_file+0x45/0x1a0 [ 105.968587][T10131] sysfs_add_file_mode_ns+0x1c1/0x250 [ 105.970177][T10131] internal_create_group+0x2e4/0x850 [ 105.971781][T10131] sysfs_create_group+0x1b/0x20 [ 105.973971][T10131] loop_configure+0xa21/0xcb0 [ 105.975922][T10131] lo_ioctl+0x555/0x11f0 [ 105.977682][T10131] ? path_openat+0x19ab/0x20b0 [ 105.980686][T10131] ? putname+0xa5/0xc0 [ 105.982588][T10131] ? ___cache_free+0x3c/0x300 [ 105.984647][T10131] ? blkdev_common_ioctl+0x9c3/0x1040 [ 105.987232][T10131] ? selinux_file_ioctl+0x8e0/0x970 [ 105.988925][T10131] ? lo_release+0x120/0x120 [ 105.990729][T10131] blkdev_ioctl+0x1d0/0x3c0 [ 105.992191][T10131] block_ioctl+0x6d/0x80 [ 105.993841][T10131] ? blkdev_iopoll+0x70/0x70 [ 105.995218][T10131] __se_sys_ioctl+0xcb/0x140 [ 105.996778][T10131] __x64_sys_ioctl+0x3f/0x50 [ 105.998572][T10131] do_syscall_64+0x4a/0x90 [ 105.999321][T10131] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 106.001653][T10131] RIP: 0033:0x466397 [ 106.002963][T10131] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.007128][T10131] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 106.009044][T10131] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 106.010570][T10131] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 106.011952][T10131] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 106.013728][T10131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 106.015595][T10131] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 106.018138][T10131] loop1: detected capacity change from 0 to 4 [ 106.031445][T10131] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:07 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:07 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 106.047896][T10138] loop2: detected capacity change from 0 to 4096 [ 106.060710][T10138] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 106.065604][T10138] EXT4-fs (loop2): mount failed 12:59:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:08 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:08 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x6, 0x8, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x5, 0x4, 0x2, 0x80000000, 0x401, 0x9, 0x1, 0xff, 0xfffffe00}, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r3, &(0x7f00000002c0)=ANY=[], 0x25000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r5) sched_setattr(r5, &(0x7f0000000180)={0x38, 0x1, 0x8, 0x7fff, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x5, 0x9c3}, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x40, 0x7, 0x3, 0x5, 0xb3, 0xfffffffffffffffb, 0x1, 0x9}, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0xa, &(0x7f0000000080)=0x8, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000000c0)='westwood\x00', 0x9) sendto$inet6(r4, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a}, 0x1c) 12:59:08 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x100000) [ 106.097848][T10161] FAULT_INJECTION: forcing a failure. [ 106.097848][T10161] name failslab, interval 1, probability 0, space 0, times 0 [ 106.102353][T10161] CPU: 1 PID: 10161 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 106.104189][T10161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.107025][T10161] Call Trace: [ 106.108425][T10161] dump_stack+0x137/0x19d [ 106.109346][T10161] should_fail+0x23c/0x250 [ 106.110554][T10161] ? __kernfs_new_node+0x6a/0x330 [ 106.112409][T10161] __should_failslab+0x81/0x90 [ 106.114147][T10161] should_failslab+0x5/0x20 [ 106.114816][T10161] kmem_cache_alloc+0x46/0x2f0 [ 106.115713][T10161] __kernfs_new_node+0x6a/0x330 [ 106.117307][T10161] ? __cond_resched+0x11/0x40 [ 106.118818][T10161] ? mutex_lock+0x9/0x30 [ 106.119788][T10161] kernfs_new_node+0x5b/0xd0 [ 106.120897][T10161] __kernfs_create_file+0x45/0x1a0 [ 106.122359][T10161] sysfs_add_file_mode_ns+0x1c1/0x250 [ 106.123609][T10161] internal_create_group+0x2e4/0x850 [ 106.124572][T10161] sysfs_create_group+0x1b/0x20 [ 106.125669][T10161] loop_configure+0xa21/0xcb0 [ 106.126540][T10161] lo_ioctl+0x555/0x11f0 [ 106.127549][T10161] ? path_openat+0x19ab/0x20b0 [ 106.128525][T10161] ? putname+0xa5/0xc0 [ 106.129608][T10161] ? ___cache_free+0x3c/0x300 [ 106.132752][T10161] ? blkdev_common_ioctl+0x9c3/0x1040 [ 106.135192][T10161] ? selinux_file_ioctl+0x8e0/0x970 [ 106.137427][T10161] ? lo_release+0x120/0x120 [ 106.139610][T10161] blkdev_ioctl+0x1d0/0x3c0 [ 106.141701][T10161] block_ioctl+0x6d/0x80 [ 106.143452][T10161] ? blkdev_iopoll+0x70/0x70 [ 106.145117][T10161] __se_sys_ioctl+0xcb/0x140 [ 106.146510][T10161] __x64_sys_ioctl+0x3f/0x50 [ 106.147709][T10161] do_syscall_64+0x4a/0x90 [ 106.149879][T10161] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 106.151893][T10161] RIP: 0033:0x466397 [ 106.153945][T10161] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.160801][T10161] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 106.164315][T10161] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 106.167474][T10161] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 106.170347][T10161] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 106.172776][T10161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 106.175303][T10161] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 106.183109][T10161] loop5: detected capacity change from 0 to 4 [ 106.209965][T10161] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:08 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x1000000) 12:59:08 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 106.240853][T10172] FAULT_INJECTION: forcing a failure. [ 106.240853][T10172] name failslab, interval 1, probability 0, space 0, times 0 [ 106.245225][T10172] CPU: 1 PID: 10172 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 106.248441][T10172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.253277][T10172] Call Trace: [ 106.254351][T10172] dump_stack+0x137/0x19d [ 106.255426][T10172] should_fail+0x23c/0x250 [ 106.257560][T10172] ? __kernfs_new_node+0x6a/0x330 [ 106.259554][T10172] __should_failslab+0x81/0x90 [ 106.261303][T10172] should_failslab+0x5/0x20 [ 106.262459][T10172] kmem_cache_alloc+0x46/0x2f0 [ 106.264283][T10172] __kernfs_new_node+0x6a/0x330 [ 106.266308][T10172] ? __cond_resched+0x11/0x40 [ 106.267692][T10172] ? mutex_lock+0x9/0x30 [ 106.269224][T10172] kernfs_new_node+0x5b/0xd0 [ 106.270652][T10172] __kernfs_create_file+0x45/0x1a0 [ 106.272107][T10172] sysfs_add_file_mode_ns+0x1c1/0x250 [ 106.274028][T10172] internal_create_group+0x2e4/0x850 [ 106.275482][T10172] sysfs_create_group+0x1b/0x20 [ 106.277527][T10172] loop_configure+0xa21/0xcb0 [ 106.279209][T10172] lo_ioctl+0x555/0x11f0 [ 106.280199][T10172] ? path_openat+0x19ab/0x20b0 [ 106.281792][T10172] ? putname+0xa5/0xc0 [ 106.282915][T10172] ? ___cache_free+0x3c/0x300 [ 106.284676][T10172] ? blkdev_common_ioctl+0x9c3/0x1040 [ 106.286127][T10172] ? selinux_file_ioctl+0x8e0/0x970 [ 106.287911][T10172] ? lo_release+0x120/0x120 [ 106.290275][T10172] blkdev_ioctl+0x1d0/0x3c0 [ 106.291774][T10172] block_ioctl+0x6d/0x80 [ 106.292745][T10180] loop2: detected capacity change from 0 to 4096 [ 106.293287][T10172] ? blkdev_iopoll+0x70/0x70 [ 106.296630][T10172] __se_sys_ioctl+0xcb/0x140 [ 106.298095][T10172] __x64_sys_ioctl+0x3f/0x50 [ 106.301531][T10172] do_syscall_64+0x4a/0x90 [ 106.302848][T10172] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 106.304535][T10172] RIP: 0033:0x466397 [ 106.305837][T10172] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.311897][T10172] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 106.314381][T10172] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 106.317465][T10172] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 106.319463][T10172] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 106.322830][T10172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 106.325460][T10172] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 12:59:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 106.353828][T10172] loop1: detected capacity change from 0 to 4 [ 106.354039][T10196] loop5: detected capacity change from 0 to 4 [ 106.361529][T10172] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 106.369957][T10196] FAULT_INJECTION: forcing a failure. [ 106.369957][T10196] name failslab, interval 1, probability 0, space 0, times 0 [ 106.374343][T10196] CPU: 1 PID: 10196 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 106.377613][T10196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.380420][T10196] Call Trace: [ 106.381319][T10196] dump_stack+0x137/0x19d [ 106.382432][T10196] should_fail+0x23c/0x250 [ 106.383457][T10196] ? kzalloc+0x1d/0x30 [ 106.384502][T10196] __should_failslab+0x81/0x90 [ 106.386349][T10196] should_failslab+0x5/0x20 [ 106.388166][T10196] __kmalloc+0x66/0x340 [ 106.389979][T10196] kzalloc+0x1d/0x30 [ 106.391819][T10196] kobject_get_path+0x7c/0x110 [ 106.393889][T10196] kobject_uevent_env+0x1be/0xc40 [ 106.395436][T10196] kobject_uevent+0x18/0x20 [ 106.396509][T10196] loop_configure+0xb3c/0xcb0 [ 106.397448][T10196] lo_ioctl+0x555/0x11f0 [ 106.398519][T10196] ? path_openat+0x19ab/0x20b0 [ 106.399665][T10196] ? putname+0xa5/0xc0 [ 106.400596][T10196] ? ___cache_free+0x3c/0x300 [ 106.401545][T10196] ? blkdev_common_ioctl+0x9c3/0x1040 12:59:08 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x2000000) 12:59:08 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 106.403524][T10196] ? selinux_file_ioctl+0x8e0/0x970 [ 106.405154][T10196] ? lo_release+0x120/0x120 [ 106.406588][T10196] blkdev_ioctl+0x1d0/0x3c0 [ 106.407266][T10196] block_ioctl+0x6d/0x80 [ 106.408010][T10196] ? blkdev_iopoll+0x70/0x70 [ 106.408789][T10196] __se_sys_ioctl+0xcb/0x140 [ 106.409845][T10196] __x64_sys_ioctl+0x3f/0x50 [ 106.410739][T10196] do_syscall_64+0x4a/0x90 [ 106.411545][T10196] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 106.413085][T10196] RIP: 0033:0x466397 [ 106.413902][T10196] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.418142][T10196] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 106.419391][T10196] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 106.420992][T10196] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 106.422744][T10196] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 106.424440][T10196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 106.426027][T10196] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 106.432429][T10196] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:08 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 106.512962][T10180] Quota error (device loop2): v2_read_file_info: Free block number too big (0 >= 0). [ 106.514984][T10180] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 106.523933][T10180] EXT4-fs (loop2): mount failed [ 106.539255][T10220] FAULT_INJECTION: forcing a failure. [ 106.539255][T10220] name failslab, interval 1, probability 0, space 0, times 0 [ 106.543285][T10220] CPU: 1 PID: 10220 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 106.545183][T10220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.550504][T10220] Call Trace: [ 106.551175][T10220] dump_stack+0x137/0x19d [ 106.552683][T10220] should_fail+0x23c/0x250 [ 106.554887][T10220] ? __kernfs_new_node+0x6a/0x330 [ 106.555907][T10220] __should_failslab+0x81/0x90 [ 106.557129][T10220] should_failslab+0x5/0x20 [ 106.558598][T10220] kmem_cache_alloc+0x46/0x2f0 [ 106.559427][T10220] __kernfs_new_node+0x6a/0x330 [ 106.560355][T10220] ? __cond_resched+0x11/0x40 [ 106.561490][T10220] ? mutex_lock+0x9/0x30 12:59:08 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x18000000) [ 106.562327][T10220] kernfs_new_node+0x5b/0xd0 [ 106.567587][T10220] __kernfs_create_file+0x45/0x1a0 [ 106.569044][T10220] sysfs_add_file_mode_ns+0x1c1/0x250 [ 106.570704][T10220] internal_create_group+0x2e4/0x850 [ 106.571993][T10220] sysfs_create_group+0x1b/0x20 [ 106.574178][T10220] loop_configure+0xa21/0xcb0 [ 106.575708][T10220] lo_ioctl+0x555/0x11f0 [ 106.576687][T10222] loop5: detected capacity change from 0 to 4 [ 106.577239][T10220] ? path_openat+0x19ab/0x20b0 [ 106.579715][T10222] FAULT_INJECTION: forcing a failure. [ 106.579715][T10222] name failslab, interval 1, probability 0, space 0, times 0 [ 106.581283][T10220] ? putname+0xa5/0xc0 [ 106.581302][T10220] ? ___cache_free+0x3c/0x300 [ 106.581321][T10220] ? blkdev_common_ioctl+0x9c3/0x1040 [ 106.581337][T10220] ? selinux_file_ioctl+0x8e0/0x970 [ 106.581351][T10220] ? lo_release+0x120/0x120 [ 106.581365][T10220] blkdev_ioctl+0x1d0/0x3c0 [ 106.581380][T10220] block_ioctl+0x6d/0x80 [ 106.594527][T10220] ? blkdev_iopoll+0x70/0x70 [ 106.595257][T10220] __se_sys_ioctl+0xcb/0x140 [ 106.596063][T10220] __x64_sys_ioctl+0x3f/0x50 [ 106.596946][T10220] do_syscall_64+0x4a/0x90 [ 106.597856][T10220] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 106.598764][T10220] RIP: 0033:0x466397 [ 106.599590][T10220] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.603190][T10220] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 106.604967][T10220] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 106.606240][T10220] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 106.608177][T10220] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 106.609693][T10220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 106.611144][T10220] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 106.612482][T10222] CPU: 0 PID: 10222 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 106.612826][T10220] loop1: detected capacity change from 0 to 4 [ 106.614403][T10222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.614414][T10222] Call Trace: [ 106.614421][T10222] dump_stack+0x137/0x19d [ 106.619520][T10222] should_fail+0x23c/0x250 [ 106.620388][T10222] __should_failslab+0x81/0x90 [ 106.621399][T10222] should_failslab+0x5/0x20 [ 106.622928][T10222] kmem_cache_alloc_node+0x58/0x2b0 [ 106.624213][T10222] ? __alloc_skb+0xed/0x420 [ 106.625480][T10222] __alloc_skb+0xed/0x420 [ 106.626337][T10222] alloc_uevent_skb+0x5b/0x120 [ 106.627375][T10222] kobject_uevent_env+0x863/0xc40 [ 106.628271][T10222] kobject_uevent+0x18/0x20 [ 106.629833][T10222] loop_configure+0xb3c/0xcb0 [ 106.630745][T10222] lo_ioctl+0x555/0x11f0 [ 106.631531][T10222] ? path_openat+0x19ab/0x20b0 [ 106.632968][T10222] ? putname+0xa5/0xc0 [ 106.633897][T10222] ? ___cache_free+0x3c/0x300 [ 106.634834][T10222] ? blkdev_common_ioctl+0x9c3/0x1040 [ 106.635853][T10222] ? selinux_file_ioctl+0x8e0/0x970 [ 106.636981][T10222] ? lo_release+0x120/0x120 [ 106.638184][T10222] blkdev_ioctl+0x1d0/0x3c0 [ 106.640186][T10222] block_ioctl+0x6d/0x80 [ 106.640988][T10222] ? blkdev_iopoll+0x70/0x70 [ 106.643709][T10222] __se_sys_ioctl+0xcb/0x140 [ 106.644796][T10222] __x64_sys_ioctl+0x3f/0x50 [ 106.645615][T10222] do_syscall_64+0x4a/0x90 [ 106.646376][T10222] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 106.647867][T10222] RIP: 0033:0x466397 [ 106.648501][T10222] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.652698][T10222] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 106.654284][T10222] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 106.655924][T10222] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 106.657470][T10222] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 106.659179][T10222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 106.660998][T10222] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 12:59:08 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 106.708872][T10220] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 106.715875][T10222] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 106.771172][T10239] loop2: detected capacity change from 0 to 4096 [ 106.807366][T10239] Quota error (device loop2): v2_read_file_info: Free block number too big (0 >= 0). [ 106.809905][T10239] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 106.813080][T10239] EXT4-fs (loop2): mount failed 12:59:09 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000240)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x83\xe8\xb6\xc3N\x16&\xab\xf9{\xaf~\x90;;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\x96\x84\xf2\xaf&\x8a\xe4\xec\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x891\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q\xa2\x8c\x84\xaeo\rc\\\x04G\x1fA\xd6vW\xf7\x99\x05\x80\x881\xf8\xf8\x8f]\xe6\x06\x00\x00\x00\x00\x00\x00\x00\x15\x14\xa5\xdf\xecC?t\x9f\xbf\x9d\x03~:r\xf3_\xd1\xd7\x9fr\t\xd6\xa2K\x12\xda\xaa\x8a\x14\x99\xfb\xe6\x11v\vz\xa7\x88\xd3\xd5m\xdd\fS\xbb\x9f\xdfui\xea\x87&\x89\xb1\xec\xe8;\x0fI/\xf8\xb1]j\xeeI\x80\xb3\xc4\xd4\x8a\x9c\xd9', 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write(r1, &(0x7f0000000100)="002f89bb50415f7b453788a8c6d1d1c48a9796a1c9d78c61a3aa34573eabc06a29d00b467e8571efad721204c6480e1c3ddb9b559460ee43d6a08ae93959ec094de07532922a1d6d5d4efce8bffda980c845ea7e992a4e332cd8168fa8e72f2d98ca29309331d52bcd4ff87d469d704deffeda432fed89b425620b355685a00ac2e937328f967126bed3197e777b1a7847f13f1f7a8b753e2d8fd6c47011b8458a170827d56c19", 0xa7) finit_module(r0, 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x40c9}, {r2, 0x200}, {r1, 0xa000}, {r0, 0x1109}, {r1, 0x10}, {r1, 0x8000}], 0x6, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0)={[0x400]}, 0x8) 12:59:09 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0xeffdffff) 12:59:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:09 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:09 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:09 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 107.188613][T10263] loop2: detected capacity change from 0 to 4096 [ 107.201876][T10263] Quota error (device loop2): v2_read_file_info: Free block number too big (0 >= 0). [ 107.203918][T10274] loop5: detected capacity change from 0 to 4 [ 107.205298][T10274] FAULT_INJECTION: forcing a failure. [ 107.205298][T10274] name failslab, interval 1, probability 0, space 0, times 0 [ 107.207806][T10263] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 107.208664][T10274] CPU: 1 PID: 10274 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 107.212862][T10274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.214626][T10274] Call Trace: [ 107.215234][T10274] dump_stack+0x137/0x19d [ 107.216548][T10274] should_fail+0x23c/0x250 [ 107.217385][T10274] __should_failslab+0x81/0x90 [ 107.218787][T10274] should_failslab+0x5/0x20 [ 107.219764][T10274] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 107.220950][T10274] ? __kmalloc_node_track_caller+0x30/0x40 [ 107.221859][T10274] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 107.223388][T10274] __kmalloc_node_track_caller+0x30/0x40 [ 107.224373][T10274] ? alloc_uevent_skb+0x5b/0x120 [ 107.225311][T10274] __alloc_skb+0x187/0x420 [ 107.226203][T10274] alloc_uevent_skb+0x5b/0x120 [ 107.227106][T10274] kobject_uevent_env+0x863/0xc40 [ 107.228013][T10274] kobject_uevent+0x18/0x20 [ 107.228344][T10263] EXT4-fs (loop2): mount failed [ 107.228970][T10274] loop_configure+0xb3c/0xcb0 [ 107.230706][T10274] lo_ioctl+0x555/0x11f0 [ 107.231519][T10274] ? path_openat+0x19ab/0x20b0 [ 107.232437][T10274] ? putname+0xa5/0xc0 [ 107.233001][T10274] ? ___cache_free+0x3c/0x300 [ 107.233729][T10274] ? blkdev_common_ioctl+0x9c3/0x1040 [ 107.234503][T10274] ? selinux_file_ioctl+0x8e0/0x970 [ 107.235252][T10274] ? lo_release+0x120/0x120 [ 107.236048][T10274] blkdev_ioctl+0x1d0/0x3c0 [ 107.237107][T10274] block_ioctl+0x6d/0x80 [ 107.237818][T10274] ? blkdev_iopoll+0x70/0x70 12:59:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x85, &(0x7f0000000140)="08ac20080dd966953b67480f3a62007c4fab98a907010100d6eca02cdc108ce69ae431c026d5190eb8a104ce5f19cd2ed75fcd792d92ad8696ca0688b72e34c4504ebda2000000000000003305603895940fd837a00b5901f884646f6f8e7b11f24ca0a35332e95bd3da36a478f002ddd33f262fdc47c26faa82a1a3b9a1e7579920b161c3"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 12:59:09 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0xefffffff) [ 107.238614][T10274] __se_sys_ioctl+0xcb/0x140 [ 107.239283][T10274] __x64_sys_ioctl+0x3f/0x50 [ 107.240085][T10274] do_syscall_64+0x4a/0x90 [ 107.240791][T10274] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 107.241664][T10274] RIP: 0033:0x466397 [ 107.242420][T10274] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.245928][T10274] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 107.247594][T10274] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 107.248876][T10274] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 107.250243][T10274] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 107.251784][T10274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 107.253783][T10274] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 107.264154][T10277] loop1: detected capacity change from 0 to 4 [ 107.273859][T10277] FAULT_INJECTION: forcing a failure. [ 107.273859][T10277] name failslab, interval 1, probability 0, space 0, times 0 [ 107.276937][T10277] CPU: 1 PID: 10277 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 107.278764][T10277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.281892][T10277] Call Trace: [ 107.282556][T10277] dump_stack+0x137/0x19d [ 107.283300][T10277] should_fail+0x23c/0x250 [ 107.284273][T10277] ? kzalloc+0x1d/0x30 [ 107.285056][T10277] __should_failslab+0x81/0x90 [ 107.286023][T10277] should_failslab+0x5/0x20 [ 107.287310][T10277] __kmalloc+0x66/0x340 12:59:09 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0xffff0f00) 12:59:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:09 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 107.287979][T10277] kzalloc+0x1d/0x30 [ 107.289164][T10277] kobject_get_path+0x7c/0x110 [ 107.290559][T10277] kobject_uevent_env+0x1be/0xc40 [ 107.291707][T10277] kobject_uevent+0x18/0x20 [ 107.292540][T10277] loop_configure+0xb3c/0xcb0 [ 107.293770][T10277] lo_ioctl+0x555/0x11f0 [ 107.294451][T10277] ? path_openat+0x19ab/0x20b0 [ 107.296169][T10277] ? putname+0xa5/0xc0 [ 107.297124][T10277] ? ___cache_free+0x3c/0x300 [ 107.298340][T10277] ? blkdev_common_ioctl+0x9c3/0x1040 [ 107.300162][T10277] ? selinux_file_ioctl+0x8e0/0x970 [ 107.301164][T10277] ? lo_release+0x120/0x120 [ 107.301864][T10277] blkdev_ioctl+0x1d0/0x3c0 [ 107.302932][T10277] block_ioctl+0x6d/0x80 [ 107.304085][T10277] ? blkdev_iopoll+0x70/0x70 [ 107.305375][T10277] __se_sys_ioctl+0xcb/0x140 [ 107.306924][T10277] __x64_sys_ioctl+0x3f/0x50 [ 107.307859][T10277] do_syscall_64+0x4a/0x90 [ 107.309034][T10277] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 107.310404][T10277] RIP: 0033:0x466397 [ 107.311101][T10277] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.314217][T10277] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 107.315642][T10277] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 107.317099][T10277] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 107.318727][T10277] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 107.320541][T10277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 107.322180][T10277] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 107.327368][T10274] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 107.334939][T10277] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:09 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:09 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@rand_addr=0x64010101, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x98254c0ad41edd03}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x3c}, 0x0, @in6=@empty}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 12:59:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:09 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0xfffffdef) [ 107.389225][T10308] loop2: detected capacity change from 0 to 4096 [ 107.402790][T10308] Quota error (device loop2): v2_read_file_info: Free block number too big (0 >= 0). [ 107.405914][T10308] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 107.419845][T10308] EXT4-fs (loop2): mount failed [ 107.422156][T10322] loop1: detected capacity change from 0 to 4 [ 107.424646][T10322] FAULT_INJECTION: forcing a failure. [ 107.424646][T10322] name failslab, interval 1, probability 0, space 0, times 0 [ 107.429043][T10322] CPU: 1 PID: 10322 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 107.433157][T10322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.437672][T10322] Call Trace: [ 107.439303][T10322] dump_stack+0x137/0x19d [ 107.440794][T10322] should_fail+0x23c/0x250 [ 107.442109][T10322] __should_failslab+0x81/0x90 [ 107.444930][T10322] should_failslab+0x5/0x20 [ 107.446636][T10322] kmem_cache_alloc_node+0x58/0x2b0 [ 107.448313][T10322] ? __alloc_skb+0xed/0x420 [ 107.450258][T10322] __alloc_skb+0xed/0x420 [ 107.451779][T10322] alloc_uevent_skb+0x5b/0x120 [ 107.453196][T10322] kobject_uevent_env+0x863/0xc40 [ 107.454671][T10322] kobject_uevent+0x18/0x20 [ 107.455995][T10322] loop_configure+0xb3c/0xcb0 [ 107.457648][T10322] lo_ioctl+0x555/0x11f0 [ 107.458859][T10322] ? path_openat+0x19ab/0x20b0 [ 107.460522][T10322] ? putname+0xa5/0xc0 [ 107.461694][T10322] ? ___cache_free+0x3c/0x300 [ 107.462599][T10322] ? blkdev_common_ioctl+0x9c3/0x1040 [ 107.465191][T10322] ? selinux_file_ioctl+0x8e0/0x970 [ 107.467251][T10322] ? lo_release+0x120/0x120 [ 107.468738][T10322] blkdev_ioctl+0x1d0/0x3c0 [ 107.471190][T10322] block_ioctl+0x6d/0x80 [ 107.472501][T10322] ? blkdev_iopoll+0x70/0x70 [ 107.474687][T10322] __se_sys_ioctl+0xcb/0x140 [ 107.475993][T10322] __x64_sys_ioctl+0x3f/0x50 [ 107.477396][T10322] do_syscall_64+0x4a/0x90 [ 107.478859][T10322] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 107.481627][T10322] RIP: 0033:0x466397 12:59:09 executing program 4: r0 = syz_io_uring_complete(0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x2, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xfff}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x80}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}]}, 0x5c}}, 0x4010) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x28000000}}]}) [ 107.482528][T10322] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.490115][T10322] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 107.494310][T10322] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 107.497348][T10322] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 107.499267][T10322] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 107.500768][T10322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 107.503536][T10322] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 107.509177][T10322] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:09 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 107.584424][T10321] loop5: detected capacity change from 0 to 4 [ 107.586163][T10321] FAULT_INJECTION: forcing a failure. [ 107.586163][T10321] name failslab, interval 1, probability 0, space 0, times 0 [ 107.588954][T10321] CPU: 1 PID: 10321 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 107.590804][T10321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.593466][T10321] Call Trace: [ 107.594359][T10321] dump_stack+0x137/0x19d [ 107.595745][T10321] should_fail+0x23c/0x250 [ 107.596644][T10321] ? skb_clone+0x12c/0x1f0 [ 107.597452][T10321] __should_failslab+0x81/0x90 [ 107.598402][T10321] should_failslab+0x5/0x20 [ 107.599179][T10321] kmem_cache_alloc+0x46/0x2f0 [ 107.600283][T10321] skb_clone+0x12c/0x1f0 [ 107.601010][T10321] netlink_broadcast_filtered+0x50d/0xb90 [ 107.602285][T10321] ? skb_put+0xb9/0xf0 [ 107.603434][T10321] netlink_broadcast+0x35/0x50 [ 107.604227][T10321] kobject_uevent_env+0x8c9/0xc40 [ 107.605182][T10321] kobject_uevent+0x18/0x20 [ 107.606127][T10321] loop_configure+0xb3c/0xcb0 [ 107.607171][T10321] lo_ioctl+0x555/0x11f0 [ 107.608037][T10321] ? path_openat+0x19ab/0x20b0 [ 107.609229][T10321] ? putname+0xa5/0xc0 [ 107.609968][T10321] ? ___cache_free+0x3c/0x300 [ 107.610957][T10321] ? blkdev_common_ioctl+0x9c3/0x1040 [ 107.611746][T10321] ? selinux_file_ioctl+0x8e0/0x970 [ 107.612919][T10321] ? lo_release+0x120/0x120 [ 107.613677][T10321] blkdev_ioctl+0x1d0/0x3c0 [ 107.614635][T10321] block_ioctl+0x6d/0x80 [ 107.615779][T10321] ? blkdev_iopoll+0x70/0x70 [ 107.616635][T10321] __se_sys_ioctl+0xcb/0x140 [ 107.617566][T10321] __x64_sys_ioctl+0x3f/0x50 [ 107.618501][T10321] do_syscall_64+0x4a/0x90 [ 107.619138][T10321] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 107.620903][T10321] RIP: 0033:0x466397 [ 107.621907][T10321] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.626240][T10321] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 107.627723][T10344] loop1: detected capacity change from 0 to 4 [ 107.628229][T10321] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 107.628244][T10321] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 107.628255][T10321] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 12:59:09 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:09 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0xffffffef) [ 107.633656][T10321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 107.634978][T10321] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 107.643585][T10344] FAULT_INJECTION: forcing a failure. [ 107.643585][T10344] name failslab, interval 1, probability 0, space 0, times 0 [ 107.647034][T10344] CPU: 0 PID: 10344 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 107.649158][T10344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.651490][T10344] Call Trace: [ 107.652364][T10344] dump_stack+0x137/0x19d [ 107.653467][T10344] should_fail+0x23c/0x250 [ 107.654324][T10344] __should_failslab+0x81/0x90 [ 107.655748][T10344] should_failslab+0x5/0x20 [ 107.658281][T10344] kmem_cache_alloc_node+0x58/0x2b0 [ 107.659890][T10344] ? __alloc_skb+0xed/0x420 [ 107.660790][T10344] __alloc_skb+0xed/0x420 [ 107.661659][T10344] alloc_uevent_skb+0x5b/0x120 [ 107.662430][T10344] kobject_uevent_env+0x863/0xc40 [ 107.663220][T10344] kobject_uevent+0x18/0x20 [ 107.664311][T10344] loop_configure+0xb3c/0xcb0 [ 107.665238][T10344] lo_ioctl+0x555/0x11f0 [ 107.666195][T10344] ? path_openat+0x19ab/0x20b0 [ 107.667048][T10344] ? putname+0xa5/0xc0 [ 107.667742][T10344] ? ___cache_free+0x3c/0x300 [ 107.668541][T10344] ? blkdev_common_ioctl+0x9c3/0x1040 [ 107.669607][T10344] ? selinux_file_ioctl+0x8e0/0x970 [ 107.670479][T10344] ? lo_release+0x120/0x120 [ 107.671652][T10344] blkdev_ioctl+0x1d0/0x3c0 [ 107.673039][T10344] block_ioctl+0x6d/0x80 [ 107.674079][T10344] ? blkdev_iopoll+0x70/0x70 [ 107.674889][T10344] __se_sys_ioctl+0xcb/0x140 [ 107.675950][T10344] __x64_sys_ioctl+0x3f/0x50 [ 107.676775][T10344] do_syscall_64+0x4a/0x90 [ 107.677842][T10344] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 107.679214][T10344] RIP: 0033:0x466397 12:59:09 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0xffffffff) 12:59:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:09 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 107.680145][T10344] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.684736][T10344] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 107.687200][T10344] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 107.688698][T10344] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 107.690131][T10344] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 107.691516][T10344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 107.693010][T10344] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 107.700682][T10321] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 107.705540][T10343] loop4: detected capacity change from 0 to 4 [ 107.712067][T10344] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 107.717653][T10343] EXT4-fs (loop4): Invalid want_extra_isize 671088640 12:59:09 executing program 5 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:09 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x100000e, 0x10, r0, 0x8000000) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000600)=@IORING_OP_WRITEV={0x2, 0x2, 0x4000, @fd=r3, 0x3f, &(0x7f00000005c0)=[{&(0x7f00000004c0)="642302d8abd8a563ff099de3589340174d1dd4944c759f0a572cac38cdc684fbe6f308e69cd72ec44fe107a250242514cbe45f98a98be67a5f00adf3cf9c27466b296eab1a2ab59ee1ac756ce6590396f15d4072fb1efb6a7e9c0f2e097f7a5a10f9e6c4bfd6c646e1f222273626a737d4a38b2b638a42965fcb7b5b27bbe57fa9b2898b5ae69d8d0066288e344a2b364f3e8340f517763186a88fd4748895", 0x9f}, {&(0x7f0000000580)="246b88278e98623cf65415ac217818ca3c69157d195e34b6bb7ce41d020acdfb5a76cb2f73f82b297b2ee7b3a8ad21d7c50c4ceb77066c6ad55aa377f586a1", 0x3f}], 0x2, 0x2, 0x0, {0x3}}, 0x4000000) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000180)="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", 0xfb}, {&(0x7f0000000280)="6ab4a224856d4631d2d3ea76ad358480489672cb2610d8b62bb8afa4aef2529f6eaaad1976487976a2cfd292b07c09a26da464fadd424fef4ac64058fc49b8ebc211869b0a79a42dbba6557dcd4184165a25474349e4eb19afb16e41832e39472192f358fc1dda30d2bc92fd20c35af51651b2b6312980fb3cae336e767ebaca84b5ad1064fce365a2ee82e49d94463cf1b582d341b405714309e7e04eb359bc3f5fa2c6a6530b8827f0", 0xaa}, {&(0x7f0000000340)="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", 0xfd}], 0x3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x82103, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000140)={'veth1_to_hsr\x00'}) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 107.747210][T10345] loop2: detected capacity change from 0 to 4096 [ 107.784826][T10374] loop1: detected capacity change from 0 to 4 [ 107.786695][T10374] FAULT_INJECTION: forcing a failure. [ 107.786695][T10374] name failslab, interval 1, probability 0, space 0, times 0 [ 107.789434][T10374] CPU: 1 PID: 10374 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 107.790763][T10374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.792392][T10374] Call Trace: [ 107.792898][T10374] dump_stack+0x137/0x19d [ 107.793716][T10374] should_fail+0x23c/0x250 [ 107.794665][T10374] ? skb_clone+0x12c/0x1f0 [ 107.795853][T10374] __should_failslab+0x81/0x90 [ 107.796976][T10374] should_failslab+0x5/0x20 [ 107.797845][T10374] kmem_cache_alloc+0x46/0x2f0 [ 107.798727][T10374] skb_clone+0x12c/0x1f0 [ 107.799691][T10374] netlink_broadcast_filtered+0x50d/0xb90 [ 107.800861][T10374] ? skb_put+0xb9/0xf0 [ 107.801568][T10374] netlink_broadcast+0x35/0x50 [ 107.803134][T10374] kobject_uevent_env+0x8c9/0xc40 [ 107.804382][T10374] kobject_uevent+0x18/0x20 [ 107.805849][T10374] loop_configure+0xb3c/0xcb0 [ 107.806654][T10374] lo_ioctl+0x555/0x11f0 [ 107.807457][T10374] ? path_openat+0x19ab/0x20b0 [ 107.808528][T10374] ? putname+0xa5/0xc0 [ 107.809420][T10374] ? ___cache_free+0x3c/0x300 [ 107.810614][T10374] ? blkdev_common_ioctl+0x9c3/0x1040 [ 107.811639][T10384] loop5: detected capacity change from 0 to 4 [ 107.812612][T10374] ? selinux_file_ioctl+0x8e0/0x970 [ 107.813655][T10374] ? lo_release+0x120/0x120 [ 107.814794][T10374] blkdev_ioctl+0x1d0/0x3c0 [ 107.815744][T10374] block_ioctl+0x6d/0x80 [ 107.816680][T10374] ? blkdev_iopoll+0x70/0x70 [ 107.817447][T10374] __se_sys_ioctl+0xcb/0x140 [ 107.818465][T10374] __x64_sys_ioctl+0x3f/0x50 [ 107.819667][T10374] do_syscall_64+0x4a/0x90 [ 107.821209][T10374] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 107.822352][T10374] RIP: 0033:0x466397 [ 107.822963][T10374] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.826645][T10374] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 107.828145][T10374] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 107.829338][T10374] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 107.831157][T10374] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 107.832748][T10374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 12:59:09 executing program 4: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000000c0)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000100)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000140)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000180)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000001c0)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000200)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000240)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000280)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000002c0)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000300)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000340)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000380)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000003c0)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000400)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000440)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000480)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000004c0)) 12:59:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x4c, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) [ 107.834319][T10374] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 107.837243][T10384] FAULT_INJECTION: forcing a failure. [ 107.837243][T10384] name failslab, interval 1, probability 0, space 0, times 0 [ 107.840249][T10384] CPU: 0 PID: 10384 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 107.843083][T10384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.844654][T10384] Call Trace: [ 107.845159][T10384] dump_stack+0x137/0x19d [ 107.845998][T10384] should_fail+0x23c/0x250 [ 107.846810][T10384] __should_failslab+0x81/0x90 [ 107.847656][T10384] ? call_usermodehelper_setup+0x81/0x160 [ 107.849064][T10384] should_failslab+0x5/0x20 [ 107.850316][T10384] kmem_cache_alloc_trace+0x49/0x310 [ 107.851605][T10384] ? add_uevent_var+0x16e/0x1c0 [ 107.852568][T10384] ? __kfree_skb+0xfe/0x150 [ 107.853366][T10384] call_usermodehelper_setup+0x81/0x160 [ 107.854309][T10384] ? add_uevent_var+0x1c0/0x1c0 [ 107.855357][T10384] kobject_uevent_env+0xb29/0xc40 [ 107.856915][T10384] kobject_uevent+0x18/0x20 [ 107.857953][T10384] loop_configure+0xb3c/0xcb0 [ 107.858749][T10384] lo_ioctl+0x555/0x11f0 [ 107.860009][T10384] ? path_openat+0x19ab/0x20b0 [ 107.861318][T10384] ? putname+0xa5/0xc0 [ 107.862208][T10384] ? ___cache_free+0x3c/0x300 [ 107.863060][T10384] ? blkdev_common_ioctl+0x9c3/0x1040 [ 107.863899][T10384] ? selinux_file_ioctl+0x8e0/0x970 [ 107.864928][T10384] ? lo_release+0x120/0x120 [ 107.866091][T10384] blkdev_ioctl+0x1d0/0x3c0 [ 107.867308][T10384] block_ioctl+0x6d/0x80 [ 107.868121][T10384] ? blkdev_iopoll+0x70/0x70 [ 107.869307][T10384] __se_sys_ioctl+0xcb/0x140 [ 107.870380][T10384] __x64_sys_ioctl+0x3f/0x50 [ 107.871168][T10384] do_syscall_64+0x4a/0x90 [ 107.872443][T10384] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 107.873566][T10384] RIP: 0033:0x466397 [ 107.874581][T10384] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.878738][T10384] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 107.880105][T10384] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 107.881555][T10384] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:59:09 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = clone3(&(0x7f0000000580)={0x140000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r3, 0xc4089434, &(0x7f00000019c0)={0x0, 0xfffffffffffffffb, 0x0, [0x80000001, 0x7, 0x9, 0x5, 0x4], [0x20, 0x100, 0x9, 0x0, 0x5, 0x5, 0x8, 0x2, 0x80000001, 0x80000000, 0x8, 0xfffffffffffffffe, 0x11b, 0x1, 0x4, 0x2, 0x3, 0x2, 0x6, 0xb800000000000, 0x9, 0x2, 0x3, 0x0, 0x1f, 0xe3b, 0x1ff, 0x6, 0x61d, 0x3, 0xfffffffffffff5a2, 0x100, 0x100, 0x10001, 0x8b8, 0x6, 0x9, 0xbd, 0x80000000, 0x8, 0x3, 0x0, 0x2, 0x47, 0x1, 0x846c, 0x1f, 0x29254ff9, 0x553d, 0x6, 0x800, 0x3, 0xfffffffffffff801, 0xc072, 0xbdf, 0x2, 0x22a8c0e6, 0x9, 0x7, 0x4, 0x9, 0xe59, 0x7, 0x3, 0xfa6, 0x7ff, 0x1, 0xfffffffffffffff9, 0x5, 0xaea, 0x2, 0x5, 0xfffffffffffffffb, 0x4, 0x5, 0x401, 0x3f, 0x6, 0x5, 0x0, 0x100, 0x7fff, 0x8f, 0x3, 0xffffffffffffffff, 0x2, 0x8, 0xffffffffffff72ad, 0x4, 0xfff, 0x2, 0x4, 0x4, 0x80000000, 0x5, 0x9, 0x80000001, 0x2ada, 0x9627, 0x80000000, 0x400, 0xfffffffffffffff8, 0x9, 0xfffffffffffffe00, 0x1, 0x6, 0x8001, 0x1, 0xe227, 0x8, 0x988, 0x4058, 0xff, 0x40, 0x63ef, 0x1, 0xd, 0xffffffffffff9c4e, 0x1, 0x3, 0xc229]}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000001fc0)={r4, 0x9, 0x4}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000001940)={0x80080000, &(0x7f00000017c0), &(0x7f0000001800), &(0x7f0000001840), {0x2f}, &(0x7f0000001880)=""/13, 0xd, &(0x7f00000018c0)=""/61, &(0x7f0000001900)=[r2, r2, 0xffffffffffffffff], 0x3, {r5}}, 0x58) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8941, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) syz_open_dev$loop(&(0x7f0000000080), 0x5917a4ad, 0x400) r6 = openat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r6, &(0x7f0000001700)=[{&(0x7f0000000140)=""/232, 0xe8}, {&(0x7f0000000240)=""/242, 0xf2}, {&(0x7f0000000340)=""/59, 0xff2a}, {&(0x7f0000000380)=""/163, 0xa3}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000480)=""/12, 0xc}, {&(0x7f00000004c0)=""/171, 0xab}, {&(0x7f0000001600)=""/136, 0x88}, {&(0x7f00000016c0)=""/15, 0xf}], 0x9, 0x203, 0x21) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x2) 12:59:09 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 107.884153][T10384] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 107.886872][T10384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 107.890071][T10384] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 107.899167][T10384] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 107.907069][T10374] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:09 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r2, &(0x7f0000000500)=[{&(0x7f0000000080)=""/28}, {&(0x7f00000000c0)=""/116}, {&(0x7f0000000140)=""/129}, {&(0x7f0000000200)=""/211}, {&(0x7f0000000300)=""/191}, {&(0x7f00000003c0)=""/193}, {&(0x7f00000004c0)}], 0x1, 0xffffffff, 0xfffffffe) r3 = accept4$unix(r0, &(0x7f0000000580)=@abs, &(0x7f00000004c0)=0x6e, 0x0) sendmmsg(r3, &(0x7f00000097c0)=[{{&(0x7f0000000600)=@un=@abs={0x0, 0x0, 0x4e21}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000680)="d0f49b7d98ce525f81", 0x9}, {&(0x7f00000006c0)="3f5c0692de087724666585844e4e07075c35855902e4c2f03ad77ebf9425ef6acfd3321a357cd3ca1855a41b4c8b19ab7a2c1df2bae7c67dd6950d009364980ae03780f466ff7de5ca9eb0bf21c5c18f52711ae322ec90201184c737df571c4d212266c8cefd7d31292ce7ba8d2485698ec7d19573091b52e71594a27c4afeb433ccb46f53bc1500904ab27668a2620264f75cd75eb558b248989eb45d2355027980d08fd64d661866e2333cc30d5e9f393549e4ebea0ff90ec2ab0c533627ef737504af50cbe58a58ee4be66a5827f24d100a01f81622313e47502a4a0d54901d60ceae6e3a409191b2db5f", 0xec}, {&(0x7f00000007c0)="94e9366bd0b91308fd872accf51e0cb9262470caaef68758134482807b9b9cc5f1d68d67fe4df10fa27e09fe08fe61c615dd989e571d8e42e2f3e36ac6eeef4269d109d4fc0c994c59b298174ea421ad061b0c434b26fe2a4fb76c64d27de2a48bc99440d49734a627bc91172ec29266548475e359005d2da608335caa68ad9e168fafd3ec785c701712c6a9a1ccb48bb630c03f6bb0b5a3ba71c1f958d65719b1459c36960075f98c7b0b882fdcc92111049da317618036614fbba0ad6b5ed0c390194d6f5df6a44a3042ff411dd26953ac2fd1fd453293dcea90cc87e480f4aa8ff39fb2bdaaac7ae29de7eeb48a83053db5", 0xf3}], 0x3, &(0x7f0000000900)=[{0x1010, 0x107, 0x401, "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"}, {0xc8, 0x111, 0x10001, "b74681236b8f273425f108f5315517903a68265ffac3e7550c6d418d6c0642cd7e50267cc323ee23d91341100e343433e6d473c8632c86853978e2f08af10f22d45607304266d8a2db85f8270de9102601bca79ab782fc803c251393a3c2448b02aea1fa0ddb9046a9073664ac26da5d4a62ea74efae79a9ed19cb04c864d88cccbaa36b540b022d316ccb55e0e2e22bdda20a112bbde0b26930def9b5ee4801f873f390f4f6afedf05e5bbb804398534856cd"}], 0x10d8}}, {{&(0x7f0000001a00)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001a80)="7c2bd100ec5922f53b06d9bf6d4b070d04605bf0c9ae6690f65df67bad8a42dd302e26915bc6a2e6c4a850c8e5c20a6ad225c6c62f28b81d00b4cc4f421015d11d9193bcbe1402b44ddd8ce6b23037103c201e042b28e25d1b53c26998360d6914713c4a34bb9f93c90153aa9a76032138848fb85aa4a736b1be1af96d85c090f8c846cd5092c25843aa3758492b4c1ade8e222c1d1871318520c38e841edd4d67660a826ea356283ab326f2b88ade8f16bce7e875e0eefadf5d364e37d51b4c027e4c766c5ebad21dd0080821a36f5248ace06e11885ab074771be6bafedb3e1a71119cbe2ba3241d8d7ec0077165e8", 0xf0}, {&(0x7f0000001b80)="968bbbb31d81ed5b8cdaa65113423814b18658af70952387afa3522a1ee87129c8328c921aab6e5862216510cac58e92611599711778a61c418f1284e2eed7c414de9610efa6e9acd4fed75874c3fd4e3b56ec65e8ad98dab6ccad7442c733625086d037d89bc93f068544b0afe0ab053ec6579717c5ed7e0c5fe9fabee162750e9cb2b3639ae13a086b89e5d55fff37a3bf833b7971a2db4c83593069f96e76895699e32ef8eff0", 0xa8}], 0x2, &(0x7f0000001fc0)=[{0xa8, 0x0, 0x5, "65aa12cc83b573f4dea1cf30e269673d7d462068802591205c940d0d653903dc1eb970785e460a4f7fe852bf3ecf8a41585748ebf9ac947f741d03e79e53ee32534ffd140dc8e8ec651b2db83675ad9fa55ab29254ab34a973ee064991999744632bf491f187cc2b708d9bff2576062819833c53b36cb602aab52ccc3387989448dcda24b70248f2f6a3309d73415752cae2d6fa3a4500cd"}, {0x18, 0x113, 0x80, "907f1bf0c80c54"}, {0xb0, 0x117, 0xff, "f06d99344ea9a8c673de7489ac518c52b40f3c9cceed2de88d74bb682c97a1c72aed08f3d0d43f99780beba91fca76f3b8fa26c566cb78a03b2d3df11d5c982a4dfa8c2a349e584d300c84d5a364b91a2715ec9a00cc32e6c3eb2813ab02901e87661aec03ec81fd303ed0f0bbde8346caa4ec4c67b20c6fb59a38b2defd1ed60218c6b5a3520128cdec8faf911645c7730d964a20000f84735317dd81"}, {0x1010, 0x10a, 0xfffffffa, "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"}], 0x1180}}, {{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000001c80)="ead1d2264bd8324dff6534ecf45f5f7ef60a13c6d0a79d45bc4fdb08306ed3a2527bd3640953066497c0798c921c1d2b8a7ce772be3f24570017db1b4abec2a724ab7192b1cc66bc1a2421ec8368b42a3375e3984275539cd31d017b777e4741f6eb410d8f887603c0ce205a5bfe0ca75c76e6a6ef024f3125d21209573bd1d20521045513a1e887a3e8c09cfea4723622f64cfc855295a7693634f9efa2dc5b960b4966e95c6cae2914a3f8e3bf5eaa14cbe54baabf9b68416c8f31ea9ee62ff0c6a892953bafde3f0a8a3ccfa92649b76c54f66ace83ba", 0xd8}, {&(0x7f0000001d80)="3aa0bab360a4e21e08adf62ea63199afef28bf13993f97a51a3f091526704b25cf301914dfd7d3c668d914adc52c4cb655a2e009e9b717e3d297ed733314e387ac474f568266e5829cabec7457f127b8a2f4852996564ed1c539c9ec57c962bc227bd8804c230fc81588e8925e5333ca1800de57ce22cabcec789b36a19c3d6af2bd5eda6a2f583d75956f767a8f1084660116b3a0dd7d4c0e67187f13fe5371dfe23a3a482db4b0589b570ba10af0de1a1a48ccafe6c41d7e11cd5cd1d9719e67532a5b67c74c9144399d011d6b7207c8bf16142d1ae0281dab0193fb8db3ec0576ce8fae496272d491d8684ce7c5830117127d8f", 0xf5}, {&(0x7f0000001e80)="321da0cd404864406f3cc34653c2e86b17b021420017e8a54f0dbe1fa9444c146e59c41a26d2d8504e1d989e0b489b4b56655b9fe529f74356afc7d580c212b3c976331193a81a9461d51d2b1637549421da7e48d8", 0x55}], 0x3, &(0x7f0000003140)=[{0x50, 0x119, 0x7fffffff, "1da09e308265ff21a85ac82ff0211333928e49095e4594815090fc4eea694163c9242413c74ac5b6419ff4f007c5abe93506d0295f511dddd17442"}], 0x50}}, {{&(0x7f00000031c0)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x3, "6e97c0ae0cb8e50c28d8ddf0f15a5757ce4b778976f6fb5e21d008558fddaae4d4b98d39d43a6cee7e4607580b195ceeb7a6210554caae0d47038276ec242f", 0x2e}, 0x80, &(0x7f0000003600)=[{&(0x7f0000003240)="83b124f168d30627712909003e14aefa69490ee4f06945c9ac374ce294f2ea19b5b58eb3fdcbc673443b75d1340e7c43b3d72ee6f51501c4e152b8282df595f6c5476ba549042612519e3257640bfc66e2838c4afff05e39682c0b40c5c9bf61783841ef28a538276cb64f8d584279996140ffe36ffa363aa3deb41939785a735923566427ff16079016db79b6a754af6e5883c787f539defe198d7d71aea89f44b6f6dec9fa9189a65a820d0d39ff6b0f54ed761b1e4ec546798f9a5cdc7d4c89d48e29af562a1f024083fe0c072fac12bb1744cf6a811926b360ee1c7faa7284e71a2079", 0xe5}, {&(0x7f0000001f40)="c9e5bed3ef95faa8", 0x8}, {&(0x7f0000003340)="6a55d0253404a83b8ef0813ecba3a0d488a4b9e381147ffc14e9230997cb48cea3033630d701e3c77154697016c2b6db531e8d6a63341f3e14a1ab06183395ddab5eff5fc201f7277b47039d2a8c15490378cd7e4daca6d5b93f40732516619c9dc2e9d267", 0x65}, {&(0x7f00000033c0)="a29327515029cbeea3fa21335f5151d15b4d83e868a5c54cb049edc05ff944079eabf1e085e1fc8b5648cb991c639b210ac8004dda366bd71fdb5b11aab0abaa3c4fd3d26ae6c2eda4a2063e11f4033e9d887182ffc22b31a6e94a35ae29458a05730d5ba7c5d884de972f52e0548f82ede0f05dcddc86227993f1baf34326534a49d2be704c07ab1e097b54b720f7dcbf40395d7be7c605283cabf963d233fe72a8c44e00c4e66abbcbc44d3c077c883f8befe80390b8c7431f6467ef3af98b25ecc714fbf2239f9dee7bc0a6cdfc41e9415dbefff46d9ab00cacc73f9d", 0xde}, {&(0x7f00000034c0)="5ba80312318f8395528005b48cb0056f7fc9798a4ebc1dabda58d70c6ca675b0f62825f6d63b520571c811439064b61cb64222bb9a37b0de0c40eadf969e33664e379c9e1d34784a7c0f61049b6f153bac2734935c10e3816c4a8f7a6e1cc44f005df61321a1102023016e6248e3020e484c3ab5ed730dec94003fa63d0043036648d2fb38041b594c2171a16579d3e348eda6bce8c5bcf3d8ce69f5be08a9bc663a64b7f132ea4a78aaf94a091fa009f19d812cc9cfcf3314435a52", 0xbc}, {&(0x7f0000003580)="4d6de8d8a131dda4ce22ce359fbd55410caca7305e55b25d86d91a8a94b69717e41b083c71d81ee277994a84692fbdf7982d1c7427b60a676f086f94e65a2eeb5d69ebd042e60e8d14f43db490245c74fd525650389b96f9d96677b5095cc73ef5f1be941c2a2344c164bdd9eb8b68bb5fd4ffc0", 0x74}], 0x6, &(0x7f0000004040)=[{0x1010, 0x6, 0x7ff, "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"}, {0x58, 0x1, 0x8000, "074401ce2eee8bf350b59df3274724f6d3d3e3c3167ae6ffa44aed0cc3b481b3fa69367b9531d7de7fb6dc33f3047d1bece9ca8b83de2d135338f4c0ce1bae54dc"}, {0xe8, 0x108, 0xfff, "5a33a189dde27494b19cbbdac170a2eafcb20b12c0209e43509729d4ee6659caef74ada214310d8b2f7160f6b6787d3c17fd100c7eb0e818ec27769f6816c244d29fb2d1c4b696ace1cce6c14a2f2ff167242fb11a0845dc28ab9a981503e93ccdee9e8dcf676c1d88527c7ee4bef3480c6cd8575e306a39dc4b14ac622bdf8c82b1b900429fc85f08648bd049829ae8829ddf73843d582b02534a16fc3aeb0fac4b8b1b4a4487e1c3a044e3c958ab7dd3d5da5a6befe449deecd095c3f51a43307447a03293d6f15575fb707c472bd4c9ffedba"}, {0xf0, 0x119, 0x53a, "6d32fe26e5f72c46bfb3b8f3c79c7957d91ffd58b441927ba1fd81dec8374f26eeef3f6317f36a758a2a777406e613a1ea09e0a1d2f48fdcb3f132ecfe2d4c4fe6dd5520553d62518918994e33fdba568a67a1b14be06cce1765051d12889d0d0b7a713b12c2929b5543c0efee437e89c2b3f661de26ad385b57370e8b0f30466298fb43dafe57eaa8a5516aa41731106e82339e98a2b6e7358303fcbeb87e8f6c7662f47f5fb4f78547ea69f8a0f77b017ab342c2614267b6f2782dc85cb74b31736df52aedba8d86d1a4bc50d84fdbd1ff1d7fe7795f4ba18389"}], 0x1240}}, {{&(0x7f0000003680)=@qipcrtr={0x2a, 0x3, 0x4000}, 0x80, &(0x7f0000003800)=[{&(0x7f0000003700)="4b5aa4621715bab101d0a5eb7c8a80998394097516f488d34d289fc8ae2f0f9df8cd2cdad9a8900768eb4f17f1b195ab6568652a2fe9ca471f8eedfad9ed1919", 0x40}, {&(0x7f0000003740)="bd9b67f633413145e1f569dbdf15672d2e3798bddcc364e86e76dc583c20f8c1e1cd02e0478c9beb6e393009ce75822701387277506b3ccfbe9ae16b9dfadde1a34c62e7be23666c9f68e6f3c8e56ac39db22a4c90d9d673d849f43519a8b1760ce25275591ce11d4fee137d93b7c36f06a6bd119664ab23d127482c3a7c79fbcf7b9f78f513dd984cdc6d25b0002c3c72972dd23e69d86e420f4e783ca75cbac3dc7ae38d75", 0xa6}], 0x2}}, {{0x0, 0x0, &(0x7f0000003b40)=[{&(0x7f0000003840)="a7a58ca63e7a5fcf85eb0502b1c720674757c596a7897a6931d23ed292d88a3e6b2ae72614d116fd51c930ad50085bc91b1e7c8b13f6680d10a653a11bf9450cd8e3ddd92665c3db4befcd12b735945f0410e539000943363703d7cbe7a982dd0fe029d631e30828c717229b57f1d95727403bf72d2452fa3877b2d1b56246f5383c759d4f0001062c84c7312eede8fc9512fb7eda576fd005adce4b5f97634a66322d07923ba24ad616d0e229925e67cecc7d6487bc0bed62cd654f8c3b262117d5fec5f2c0a795ae59436fd806adccc7b47dc5910d5fc2e24418f1e98d4d4a4c041708daf6", 0xe6}, {&(0x7f0000005280)="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", 0x1000}, {&(0x7f0000003940)="c275c8b7c63ee38f9e0574abc3faaf1825c229713e5f077f6cd144e11773123ca16c3320a88f0094c4e5d391d65db85c79ce8899305f907d6887eeae4f7ce8f8f70405bfadbc6485c41bd1aa3e98cf3f", 0x50}, {&(0x7f00000039c0)="baae26e4a0345abc7e3ba687c6750e82111c1b9a3c6fbf3e64dba943b477fe865c25328ff777bbfea2f9c9224da1634ac7c333362dc628e5ec812922f0b2489e266b9341f802db8b1b394c549d7c4884283bbe16d57a5f145c", 0x59}, {&(0x7f0000003a40)="6c5a91f2e7f52d49f7259a196299fa85ed4b582a5fcf419a6f17c3fa4a46ddb7bb39f311a35a0befe39319aa98a715f5024cc7e2877eb6f1268ec3a247f56fe618563f481660f09b170dbcedca6b8e90c47cf319c1d147e1bd973123827769358b362a8345173990f1c9970b45e31d87b5ecf1801ec1c9fb96a61c9a0725032761c864fba03033038c", 0x89}, {&(0x7f0000003b00)="088e56149acd0b43e5b4bd7450e462b33ae45b2dab5bacfa6a30b34b", 0x1c}], 0x6, &(0x7f0000003bc0)=[{0x88, 0x1, 0x1f, "1c6ee8b39938455c651c2888ae6c03ff0a7a3017d3a1ec16cfe96cac4b42a01d105bb29a8cc9bc604635852407eab304a969f8621a864a9f397264879ccf31870d2c12a06740c50276b9a5f3a559e2e34b7d4718ad645ea7592b93b2b0ea106c0f8b9ad1a4cded3543dac82e5ee9b665f38be8e917"}, {0x88, 0x110, 0x2, "0f0e472936080b208feafeae9f8688e8b7b60ae2c514a83a30c1a30441318f22a6de2a9cac0a3c8988f8fa59f8a3d084ec8c6853809253e11074773ab8bc6e5f097f6298790c8d4c7b7d5a922dcca4e9ad81df883d2867b279dd93675787dbaa6a23cf799fb41392b6971965f9999be40dcd5cb71802"}, {0x58, 0x10d, 0xffffffff, "e9dd265c00c9f9ec8d60730e159c27f488402c95b1ab579807895ba856fc0393cf6004a8a9fea47249b8f4457ba1319a79e3a148db46a4593e398ae3b5a618896e85c9"}, {0x28, 0x104, 0x7fff, "274187ce1fa2e74dc9ebc82804c2757d1fba3d867c"}, {0x88, 0x8, 0x1, "9e961082e53d13f6221dec93b9b3ced59825426094a23a6615b1b8071023b5514157752c674633c8c247fe8d316af621819cc49d1b34f72926bc6c9e03c4b50fa3370f754352835873111e5ba42c4ecbd93098ccad6b4c5c177a4eec127b4212b4a2417dc92274b44a5bdad310a22a841dd698"}, {0x78, 0x114, 0xe8, "691fa2237a130c7fbb6ae3c5cb648ddb9b7a1320bae21aa4687cfa39050d81e86b401e50aed97ee092d0de97be9ba5da33bab4d2b8616b85fcd98aff90d3767d0c3600133f4054fbdafa3916817edc97dc2d37734fb4eb34f41469f2f03b20c298562d86b829"}, {0x78, 0x1, 0x3f, "ff4c69f174779408c180f850d11027699fdd8cc87d755daff22efc1721d3622ffedd45070945fdaa27c7568b1bce5420385eb5c51c3f0a979cbee41ab18bf51744cd2ed25aec8caba6927cd549175b8028f5f031cde4e13a92cbf838d46983fdd87be93e72"}], 0x308}}, {{0x0, 0x0, &(0x7f0000003fc0)=[{&(0x7f0000003f00)="438d4349eb4913f268ed156ad32688961648844e32438d3f2c69a9fd9c0211e5b5d5b7d3bf4e983c9676043f908fa96f1fde96a3f3a89b1dd40cb04f3f57702e1ee41f2f7c8a8897f59bd612c885799b9e868d75b7bb9bab41074a857b7d607646d8cd42e633916620b8f260a643adcf09722b919fed972ca539ed97be0806723997df40c75de26370d850f49d27addccd627cc2614f1a13189cd3099689b59bc33c8ad2b2bc9853f2", 0xa9}], 0x1, &(0x7f0000006280)=[{0x38, 0x88, 0x66, "44bcc3f1ffe08da8dfb869afa8d3581b7f92edfba4c2b135db552827733a1786d1835e8a00ac"}, {0x110, 0x104, 0x3f, "5fae0228c54dba5bc6a1682385c71a4cdcbafedaf6523fd14708190d5a60275168d48afb6cbd5d1262dc6e2da9a795a3532a1b8b2e99bacb9ac6a6a76ff4865f316b449b8f4250acf7386f83ecb3718d9f2afbfd2dad34d5ed39db021edf70576423605db3145a6cb0f85f1556360341f8ed8c16728b17e1984218f93864cdb6bb95e056517119715deb197fc5c638d026da2cebc6df5b70dc4b33c268ab3824f4587b84d36a0014325954e818c47d1441cceed62dba5db6cebde1b2fef391f92ea4e82d4851409e7044868575fabe7749f5588f9d28c6d561b1bb394d527a4097bd2a15620b84769597e61c230c06b386016596b2ed569eed7e"}, {0x28, 0x105, 0x5, "30d4f58cef362d28cdff2d6e8f676f822016"}, {0xa0, 0x88, 0xea, "ad2dd60d7313337707f653626a6c4f12fc5252f8d92b668315cde26ec4d4adebc6d970484a45c1b10a73d6424e72ebdc11d618648c6807786165731d81566fd9bdc7f566819d58ea1156ec5c5122c473fc6507f7a19eb69b417208bf2318abcb1315ac89d39c2fcb85a53964cd77b35897f23b0646d0441d3ab1bc5b3c3d0fb669d55ae6bdf213cff3cfe0"}, {0x1010, 0x108, 0x0, "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"}, {0x1010, 0x115, 0x6, "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"}, {0x90, 0x107, 0x5, "8ca16945834d680407b5ad7e52d6e4fff92688f466f2e568406f782032096b39ffa2c497b5c58da4134d196701cbc3aeab6583e05f196b9d69123363f7f5ff5cb9dd30a05d27815d67d0531dba88f6a36010e95022c2d57c56d8147d0f40e0eb2395dd59c8cd10751a6a8a760edab1effc6075bb533be709523c6905bff1f4"}, {0xb0, 0x0, 0x5, "f77bafb5e3d426bbf0e6cc12347662f7424505623a8f052814cf140615d2b19ae05a153d5211aed6074f82966f0feafa45a1cfea45daed7aeafa4238cae19d5371415a7838f4a76ee38e11d6a54480a0cbf0d13df6d5b2f72d3c4132a8ad35917b950ec2a4b4037090d10c936345e5f226586611c47f7c539f190a0b685164d57decd6a08c2d15f3eb02c63528a9473e875075c7d0ebcb8b094b90c831"}], 0x2370}}, {{0x0, 0x0, &(0x7f0000008a00)=[{&(0x7f0000008600)="bbd3abd07886ea45cf4ab7b06a9442df8b2ab80412da0dfa009a0a4961593d7e69bdaeaf2b89c69978c5780de97da9a52a9e16e1d78645707f495cec75a1363fccaa79830cfb74ded4a1926a8a20318e9faa760075cfb4c81b984b3a150e53ff29a90eb615b4eb59892d2b7a26a1571d7bf4b2ecf4018cd352f174ddf5e1d9fea5ac56058648ae0bd2f11df6fb3019", 0x8f}, {&(0x7f00000086c0)="ee6c0ff5edaeb17e25b6b1db33d08931c757915c5415a581e605bbf1ba29f542c6b93528dca647ff418f69452689bda2d6b46246076903508f6de7c2938484684d37fc9bd26a0648259b5dd136658449df79d45376bd91f15b3945466c", 0x5d}, {&(0x7f0000008740)="f580f37cc76d8b1270ad4664d9ad69db66221b4b01ab25c34344efd38ee5e5d690094c489a8c909e06a28f912e98b3002d8691a2131f44fec24389982cd13aa33d3a5195ce49e6e1c97fc397fcfc7b0f9d0f08607aac6265b29c5ceec2684837e37825d09229", 0x66}, {&(0x7f00000087c0)="a5b8a388335962582166f8af14e28635b54c49714bf52906c893455548800a8b934b7abe12a6719713fcde52ae96276dcbb5095fe83e8597799a63a177d8e367376185a627ce", 0x46}, {&(0x7f0000008840)="cd85b041ea998777f21ae1f3c27db24e81930f508f845684fd36a0700cc96981a91bf4efdbbd6139d2ae4a89c34da8fec8315b0d7fd5022a4e42d7d0d69516233f4b1d68da15321fe0fea120aa5f375964cf95af87738eafab87a0e4fecd0e6463818d9e12d0931178373516a33f8e5e4f588d3454d2f8d4c085e2508999da00991e552ef0d684f8c8e8f83f5d327c8025abad1f87966397c0756ecd5e68b93026535b047190280807140cc3cd67da291953f042de4bb4b0baa17d7d3bf3085bff0f1661735c13b13afa83135e12666afc74f2b0aeecd0960e89c7db08a3d832525adece0df9187410f4", 0xea}, {&(0x7f0000008940)="bc536f99414ed1f8f214e36deb482b93b709a3750f4276196a4df258921346d245ecc2ba824dcbd935d39c86461a0a9dd133c7026cec987dbbfe7c2554541c64bfb55e8235ef47e0509a571babacef351a532e46773c2dff9cccfd5a6736122ec40226192cfacfe7ffcce4fb14cf2a5272b6c9b6b9e53b306e7949a065b09627c486448d4028d49d5460fc569fc0f3b97af4f0a557c19084e43fdf97530967b9d6d1d69c6b895b761571e1cafe4d7c89", 0xb0}], 0x6, &(0x7f0000008a80)=[{0x58, 0x105, 0x0, "3353e8acacedc0e716e23d6f6ce1c2769e348af6741bff15052290a48448866353ccfc54a4999ca6007afea342699336138b98f80d0f9337ae7030592f3a5b017f45dd29c720a4c5"}, {0x60, 0x109, 0x2, "cb5bcf13eeb137ab8f71d22f54906376302e740738e6d960100695e0c66da92a6653bb699630520fea20e6f8910f33a39ac70d58b56da3094e49f7e466fa8efbd3b23cd4e4856f4e1b4f607a94eb"}, {0x78, 0x104, 0x9, "d32d82018f05fe7bafd0abca6de4686e77bffedd0892a705c0375cc50975bf86f2768041d6bd5f9046305f812f0391ff8d32aba12884406178bd2100654066860e8d226f24dffcd0fa1121b9d46371a93552e06c1ff8dbc0960f216a4bf0b29f927a2f7d113915"}, {0xb8, 0x0, 0x0, "a2f766b62d93da4e024f53e8fef65029679910fc2ecd9672f9c88c7d8472c68b3aa8f068900cbea3ba2e1acd1208f0cf9e08b9693876037d23251655d8df81f119cfbf03d277e5afc056ccfceb5b491350ad90846bd22f3d8a69ac42ed114b0019f3247f0f9562c7ae19451c22a6f9aaaed49ab30cd6ec21ec26c267bc7d5e3e16cd17b6e16b6cf48aa6dc778431883ba9a627a27e7008fdd45f087f5e592cc09647614aea3d6a"}, {0xf8, 0x102, 0xfffffff9, "a663dacdc3a4485e8730bd0318cad45e3a7d15eec9654fc910532c56a9dd57915e9f9390bf345d2e65dc328468f5588152a4fff6133d1c88bc623d8d3067af96726a92894cc807a57b5e2be832e0e01339fe9c86448c560f292718a64a556896b1e0aa1d38311093d43728de8ea432ce52e7ce046902fb543ea2ef663dc4d9b7312c14e2e05a0cf93ffd9cbae51e0ae63b0c52e422f13e0a3cf893474c62b3906ef48dc9ec00aed65cee8d90e09199b3015c81c076c9da316a26419053b4944f07af1808a2725ae6c8b64c7cd53405af53e090369d0dc5b1d599e0988a6b30b2c565823d3a7fe2"}, {0x20, 0x103, 0x4, "9ed2ace51036bb3868"}, {0x110, 0x108, 0xfffffffa, "d3e929e856055df1f696281b4afda1da1b59b601907e07fafd31cfec3650c82b9e49d4395e6f7cb7237242072b328223a723723fccb060076a845e7fce53d0a1ddab00f12adafc8c0d6f423d772ac9e512d27c640251a16974b69e73ca44cce6c6bc5aa128b54a51ec7dedd61258673e399650f95b46b600fec911cb22e2df2622d75ec5e7d74146a9e4d193f2c324034ba6fcacde8f17ea633044fc7ec49e135c7c11c2e6ec49efee5a19469b876717ee5002be5ae5deb9472baab02f2918326f9167aeef99071c8e5d84b898bcd7ac5ca175b3dabe3d4b733cbe198b5694b3c132db07ad786189a33bf0b598dd67ecfbd6af38cae3500854"}, {0x78, 0x3a, 0x5, "0800ab8400211405a8ed2f450bfdfe079fca30dc2820eac3c7411b1dbd0edd4611cb4885cea1bcbcb645264cbd8ff7b860ca99e5869c3b7ff7072bf29d26dc219eb1e6a96a0cbd239a73f31b2e35d802a5f515a61844ed6e2e705aac22066a6c3ed2f01b89"}], 0x488}}, {{&(0x7f0000008f40)=@nl=@kern={0x10, 0x0, 0x0, 0x200000}, 0x80, &(0x7f0000009200)=[{&(0x7f0000008fc0)="dc8c6aa3189c9c67fb2d2cdfafab587f1bb6ca18f51d42ab93c1037508a8f640563c257b0fec0af0225ad7c7c2f7cb7769429904092a6a6ca538da8d379e58850bf9f1b9c0982781243ae6387482ec157d917e34921a2ec4d0099d55d7ccf6458eb1cc7a9d31b856e1725095a45b565978cb6c707885f1cb6ed49af5c4", 0x7d}, {&(0x7f0000009040)="aae44261c9689bd1329ec65ac4e1a207677d3f35e7cbc5a2e50a3fb6cc90f957075b9c08c3875f8eb6e69287d2330c4f1d106c5e", 0x34}, {&(0x7f0000009080)="7916b5fe56994876c390ae070bdc3c9ef223ae52b294b0489ad337b833824cb5b33f93820215e9a8a2a2725aa805910cc35c4a208b27ce98ce115fa3ba1f08c7e472ea2b2a00679d0dbe276c51e4ac7b09c92a1d4936829aec8507bfecc6bfbf0fa6c8de8ce61930b7ffea099bbad3c9439dbd9b00011618397ece67ef6121bf875524ac793037ad69", 0x89}, {&(0x7f0000009140)="65ead0e7c40dceed25df241b455b1d5258f7fa2f787b7f809c39724bfde1a0735e5ab5f28d8ab7e1df9c81b0c8d88074f07de8d8b402bf026780078b9b55f6900a84d502038e54c1e3e4b31e567a456ca979b8b89d8f8d83a4130b0c4db796a75768565d2c50d4a346d35aee7d109f1773b52028d44191a4cfd3456fcb69a96601127f296580c3", 0x87}], 0x4, &(0x7f0000009240)=[{0x40, 0x105, 0x100, "ed92a2bbe816695848a8ba1df2c799b2650d5e671ee95326a3936faeae7f3c0967471f92c799c9aa39808d"}, {0x28, 0x10e, 0x1, "32e5938cc8280e9af1a25686ba1401974c33"}, {0xd0, 0x88, 0x7fff, "ae84cb16606af6c7be5447bc5ecbf37402a70c2edf9712545d8f921934782a16e56f099e8474ed95982060b372da4d4c4d88a2f8d2c6c16af594612ba6a75f2f4891f267b3acb9697b9c61854e8d2dea8893c10704fdfc83dd88d8fa0fd987c55e4b7ef5ddeefa9a35ee41a73b69e2f9823c3829506cff2c42a13addd876c6f827ff218ade36ca3a72971b2d36ee297b13c9a07c2fdc1ab4a56d760a479227492b2a9fe796d51adf87044b983a1bb9f2241d712d4abc8a55d793"}, {0x90, 0x112, 0x0, "e6977e8f86e294aca3f11cdaef6175f0afc3ab56f60d3c36229bee19529f16b7da17983e85075f609800869251e6d6c3939b98a565ac8d1550a8394ec54a31206b8a3e26472271067f844604a456276e89bb12fb59cb18a3067f561b439b751d8e8251325d247404045fa22b7d827cc8c5f0c6d24114292ade8f2384ce"}, {0xb8, 0x113, 0x2, "08f4843445497849f151bd47733d45dffe43ea8d2e01a1cc3fd56bec5da59c0f2e1ebb53b8fc0cb469296454e56a1cb24e75298ec11d9e829447a2c4f7277219b55d5813ff6a72fd022a529525ef6424a5e518cec6fcc49178fda3cd979d7d2278c94af9a750b7c5f5de27df9eb58907d9ecfcff9da64274eb73b765040d903138d370955c6191aba7148defe7e6e30fe5804738f034dede8590c63661761fe27ec7c7"}, {0xc0, 0x10e, 0x7fff, "6de024c66066cfd54d4fec1f0a907c78fbb803e34bf537dbb38a6914455c190ebb246c8ce3ae228daa4d111d2ac0aad907210a4e9ee9e2dc6520570e10cf18a7087634fd68123db06810558e19d46d33b67fb099a4251b1b1b4732a48c1f46f1a0a54de23fe2ca148fa95b478505c884013eca375e90d60dcfabd6e8c04aed38b643a649d2382706aa39de17f9ed05cbd02529c375db4ac096545b080dba8b889ebf5dbc885b915ddab1aee3bc11"}, {0xd0, 0x10f, 0x5, "cb9676fa27aa2075783252500f58f2ceaca2e4d9c1148df6314342cff581dade6bc45773e4a8a5486d09af9968bd5b831c8adedfc8617e011045d4aac24cb9d55a0e62aa7bdcceed292a10ef1096ecffaa01557b20a0b00847a7fbddb884844003980b7774e22325bee7a94b39d05327599a22e7a3cb3eadba5e158966d30f977e5910bc7420cee60f2abdf967f189f9933f38f04c96d77807a076ba8fbaf91373fbabed337f81fa480728eae86a6f4d3b87d171cad341b8f8202994e6e3"}, {0xf0, 0x119, 0x7, "2708be2152a12b4c2b5e2e281b1d6f613cbaa348754fbba4ce6f29a5e93b012ff5aeb54d4744c3bfe795e60e91376f2f9192449202d1d4da4e2c6ff557f956a14f2d5cc04104f825fea1016257cc4730a397eda5080c64a737d50739be2c314045a76cd190131f5c73b2661c6a0b1abefecb61c299d32f598546dd7304b7c5a2a6f65da270bf104b4d58b12f42185af165f2740a96604db1f48829351ad52ab7e234a3fa7b5fc6f82c774f717b8272555e92583fa79b62fecf6d2811cf89af4e933ba64e799bb1ee1d0f20471eea3fb165d7f128bbc7b3f479f480519b0a4544"}, {0x70, 0x119, 0x2, "1bb67eb0f87db24cea74df1f4522d7a59b16cde4e2fddc65ad0c420871e43f93368f2fedb8d80231565c0a347d906c836c3ff833c577d870b70c5bb2ff23b423fe4379576eb8afa6485a726360df061a3a722ed72910d4de748375cde66484"}], 0x570}}], 0x9, 0x4008880) 12:59:09 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:09 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 107.980714][T10419] loop2: detected capacity change from 0 to 4096 12:59:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x5, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0x0, 0x15, 0x0, 0x8, 0x0, "02e1000000060e008946e3c600fd8400"}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)) r2 = syz_open_pts(r1, 0x4000000000000002) r3 = dup3(r2, r0, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x208803, 0x0) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="23010b6f00000000000000fd0d"], 0x17) write$P9_RATTACH(r0, &(0x7f00000001c0)={0x14}, 0xffffffde) fcntl$setstatus(r0, 0x4, 0x40800) ioctl$TCXONC(r3, 0x540a, 0x1) 12:59:09 executing program 0: ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000080)) r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000734000/0x3000)=nil, 0x3000, 0x3, 0x100010, r0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f00000001c0)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, r1, &(0x7f00000000c0)=0x80, &(0x7f0000000140)=@ethernet={0x0, @broadcast}, 0x0, 0xc00}, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 108.007298][T10419] Quota error (device loop2): v2_read_file_info: Free block number too big (0 >= 0). [ 108.011109][T10419] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 108.016507][T10419] EXT4-fs (loop2): mount failed [ 108.022225][T10429] loop5: detected capacity change from 0 to 4 [ 108.025917][T10429] FAULT_INJECTION: forcing a failure. [ 108.025917][T10429] name failslab, interval 1, probability 0, space 0, times 0 [ 108.030693][T10429] CPU: 0 PID: 10429 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 108.034465][T10429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.037625][T10429] Call Trace: [ 108.038812][T10429] dump_stack+0x137/0x19d [ 108.040191][T10429] should_fail+0x23c/0x250 [ 108.041542][T10429] __should_failslab+0x81/0x90 [ 108.043049][T10429] ? call_usermodehelper_setup+0x81/0x160 [ 108.045543][T10429] should_failslab+0x5/0x20 [ 108.047305][T10429] kmem_cache_alloc_trace+0x49/0x310 [ 108.049428][T10429] ? add_uevent_var+0x16e/0x1c0 [ 108.051107][T10429] ? __kfree_skb+0xfe/0x150 [ 108.052075][T10429] call_usermodehelper_setup+0x81/0x160 [ 108.054124][T10429] ? add_uevent_var+0x1c0/0x1c0 [ 108.055345][T10429] kobject_uevent_env+0xb29/0xc40 [ 108.057246][T10429] kobject_uevent+0x18/0x20 [ 108.059266][T10429] loop_configure+0xb3c/0xcb0 [ 108.060973][T10429] lo_ioctl+0x555/0x11f0 [ 108.062266][T10429] ? path_openat+0x19ab/0x20b0 [ 108.063459][T10429] ? putname+0xa5/0xc0 [ 108.064769][T10429] ? ___cache_free+0x3c/0x300 [ 108.066156][T10429] ? blkdev_common_ioctl+0x9c3/0x1040 [ 108.067753][T10429] ? selinux_file_ioctl+0x8e0/0x970 [ 108.069509][T10429] ? lo_release+0x120/0x120 [ 108.071110][T10429] blkdev_ioctl+0x1d0/0x3c0 [ 108.073192][T10429] block_ioctl+0x6d/0x80 [ 108.075168][T10429] ? blkdev_iopoll+0x70/0x70 [ 108.077041][T10429] __se_sys_ioctl+0xcb/0x140 [ 108.079586][T10429] __x64_sys_ioctl+0x3f/0x50 [ 108.081482][T10429] do_syscall_64+0x4a/0x90 [ 108.082917][T10429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 108.084627][T10429] RIP: 0033:0x466397 [ 108.085953][T10429] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 108.095745][T10429] RSP: 002b:00007f0cfa4b5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 108.098481][T10429] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 108.101162][T10429] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 108.103447][T10429] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 108.106130][T10429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 108.109420][T10429] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 12:59:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000080)={{0x5e, 0xf12}, {0x7, 0xfff}, 0xa47a}) pause() r1 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x14, r2, 0x3000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r1, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 108.130134][T10434] loop1: detected capacity change from 0 to 4 [ 108.132710][T10434] FAULT_INJECTION: forcing a failure. [ 108.132710][T10434] name failslab, interval 1, probability 0, space 0, times 0 [ 108.137861][T10434] CPU: 1 PID: 10434 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 108.141731][T10434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.144266][T10434] Call Trace: [ 108.145366][T10434] dump_stack+0x137/0x19d [ 108.146636][T10434] should_fail+0x23c/0x250 [ 108.148287][T10434] __should_failslab+0x81/0x90 [ 108.150036][T10434] ? call_usermodehelper_setup+0x81/0x160 [ 108.151747][T10434] should_failslab+0x5/0x20 [ 108.153614][T10434] kmem_cache_alloc_trace+0x49/0x310 [ 108.155563][T10434] ? add_uevent_var+0x16e/0x1c0 [ 108.157315][T10434] ? __kfree_skb+0xfe/0x150 [ 108.158836][T10434] call_usermodehelper_setup+0x81/0x160 [ 108.161309][T10434] ? add_uevent_var+0x1c0/0x1c0 [ 108.163969][T10434] kobject_uevent_env+0xb29/0xc40 [ 108.166573][T10434] kobject_uevent+0x18/0x20 [ 108.168136][T10434] loop_configure+0xb3c/0xcb0 [ 108.169484][T10434] lo_ioctl+0x555/0x11f0 [ 108.171117][T10434] ? path_openat+0x19ab/0x20b0 [ 108.172753][T10434] ? putname+0xa5/0xc0 [ 108.173686][T10434] ? ___cache_free+0x3c/0x300 [ 108.175613][T10434] ? blkdev_common_ioctl+0x9c3/0x1040 [ 108.177681][T10434] ? selinux_file_ioctl+0x8e0/0x970 [ 108.179733][T10434] ? lo_release+0x120/0x120 [ 108.182083][T10434] blkdev_ioctl+0x1d0/0x3c0 [ 108.183777][T10434] block_ioctl+0x6d/0x80 [ 108.185607][T10434] ? blkdev_iopoll+0x70/0x70 [ 108.187041][T10434] __se_sys_ioctl+0xcb/0x140 [ 108.188340][T10434] __x64_sys_ioctl+0x3f/0x50 [ 108.189496][T10434] do_syscall_64+0x4a/0x90 [ 108.191087][T10434] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 108.193264][T10434] RIP: 0033:0x466397 [ 108.194615][T10434] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 108.201830][T10434] RSP: 002b:00007f6ea9873f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 108.204634][T10434] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 108.208010][T10434] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 108.211588][T10434] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 108.213945][T10434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 108.215707][T10434] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 12:59:10 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f00000001c0), 0x800) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0xd, 0x80, 0x3, 0x0, 0x81, 0x1, 0x0, 0x1f1800, 0x5000a, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x7, 0x3f}, 0x4600, 0x9, 0x6, 0x5, 0x1, 0x8000, 0x0, 0x0, 0xc0000000, 0x0, 0x20}, 0xffffffffffffffff, 0x9, r4, 0xa) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$addseals(r2, 0x409, 0x8) fallocate(r2, 0x0, 0x0, 0x81) close(r0) 12:59:10 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:10 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 108.247892][T10429] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 108.247973][T10434] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:10 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:10 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 108.306050][T10463] loop2: detected capacity change from 0 to 4096 [ 108.323744][T10463] Quota error (device loop2): v2_read_file_info: Free block number too big (0 >= 0). [ 108.327442][T10463] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 108.333015][T10463] EXT4-fs (loop2): mount failed [ 108.334488][T10470] loop5: detected capacity change from 0 to 4 [ 108.337799][T10470] FAULT_INJECTION: forcing a failure. [ 108.337799][T10470] name failslab, interval 1, probability 0, space 0, times 0 [ 108.340703][T10456] loop1: detected capacity change from 0 to 4 [ 108.342520][T10470] CPU: 1 PID: 10470 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 108.343970][T10456] FAULT_INJECTION: forcing a failure. [ 108.343970][T10456] name failslab, interval 1, probability 0, space 0, times 0 [ 108.346711][T10470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.352905][T10470] Call Trace: [ 108.354098][T10470] dump_stack+0x137/0x19d [ 108.355037][T10470] should_fail+0x23c/0x250 [ 108.356338][T10470] ? getname_flags+0x84/0x3d0 [ 108.357357][T10470] __should_failslab+0x81/0x90 [ 108.359498][T10470] should_failslab+0x5/0x20 [ 108.360652][T10470] kmem_cache_alloc+0x46/0x2f0 [ 108.362674][T10470] ? set_next_entity+0x1b2/0x350 [ 108.364292][T10470] ? __list_del_entry_valid+0x54/0xc0 [ 108.366243][T10470] getname_flags+0x84/0x3d0 [ 108.367514][T10470] do_mkdirat+0x3b/0x200 [ 108.369163][T10470] __x64_sys_mkdir+0x32/0x40 [ 108.371426][T10470] do_syscall_64+0x4a/0x90 [ 108.372595][T10470] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 108.375109][T10470] RIP: 0033:0x4656e7 [ 108.376107][T10470] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 108.383212][T10470] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 108.386835][T10470] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 108.389641][T10470] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 108.392071][T10470] RBP: 00007f0cfa4b6040 R08: 0000000000000000 R09: ffffffffffffffff [ 108.395301][T10470] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 108.397550][T10470] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 108.399961][T10456] CPU: 0 PID: 10456 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 108.402483][T10456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 12:59:10 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:10 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:10 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 108.406181][T10456] Call Trace: [ 108.407002][T10456] dump_stack+0x137/0x19d [ 108.408570][T10456] should_fail+0x23c/0x250 [ 108.409301][T10456] ? getname_flags+0x84/0x3d0 [ 108.410106][T10456] __should_failslab+0x81/0x90 [ 108.411466][T10456] should_failslab+0x5/0x20 [ 108.412355][T10456] kmem_cache_alloc+0x46/0x2f0 [ 108.413659][T10456] getname_flags+0x84/0x3d0 [ 108.414535][T10456] do_mkdirat+0x3b/0x200 [ 108.415370][T10456] __x64_sys_mkdir+0x32/0x40 [ 108.416138][T10456] do_syscall_64+0x4a/0x90 [ 108.416962][T10456] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 108.418494][T10456] RIP: 0033:0x4656e7 [ 108.419326][T10456] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 108.423622][T10456] RSP: 002b:00007f6ea9873fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 108.425681][T10456] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 108.427204][T10456] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 108.428963][T10456] RBP: 00007f6ea9874040 R08: 0000000000000000 R09: ffffffffffffffff [ 108.430185][T10456] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 108.431593][T10456] R13: 0000000020000100 R14: 00007f6ea9874000 R15: 00000000200000c0 12:59:10 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 108.513957][T10498] loop1: detected capacity change from 0 to 4 [ 108.515951][T10498] FAULT_INJECTION: forcing a failure. [ 108.515951][T10498] name failslab, interval 1, probability 0, space 0, times 0 [ 108.519404][T10498] CPU: 1 PID: 10498 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 108.520811][T10498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.523788][T10498] Call Trace: [ 108.524444][T10498] dump_stack+0x137/0x19d [ 108.525384][T10498] should_fail+0x23c/0x250 [ 108.526188][T10498] ? getname_flags+0x84/0x3d0 [ 108.527083][T10498] __should_failslab+0x81/0x90 [ 108.528548][T10498] should_failslab+0x5/0x20 [ 108.529721][T10498] kmem_cache_alloc+0x46/0x2f0 [ 108.530620][T10498] getname_flags+0x84/0x3d0 [ 108.531557][T10498] do_mkdirat+0x3b/0x200 [ 108.532305][T10498] __x64_sys_mkdir+0x32/0x40 [ 108.533246][T10498] do_syscall_64+0x4a/0x90 [ 108.534013][T10498] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 108.536273][T10498] RIP: 0033:0x4656e7 [ 108.537219][T10498] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 108.540997][T10498] RSP: 002b:00007f6ea9873fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 108.542217][T10498] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 108.544040][T10498] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 108.545371][T10498] RBP: 00007f6ea9874040 R08: 0000000000000000 R09: ffffffffffffffff [ 108.546974][T10498] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 108.548167][T10498] R13: 0000000020000100 R14: 00007f6ea9874000 R15: 00000000200000c0 [ 108.549952][T10494] loop5: detected capacity change from 0 to 4 [ 108.551240][T10494] FAULT_INJECTION: forcing a failure. [ 108.551240][T10494] name failslab, interval 1, probability 0, space 0, times 0 [ 108.551761][T10496] loop2: detected capacity change from 0 to 4096 [ 108.554046][T10494] CPU: 1 PID: 10494 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 108.554066][T10494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.559494][T10494] Call Trace: [ 108.560044][T10494] dump_stack+0x137/0x19d [ 108.560967][T10494] should_fail+0x23c/0x250 [ 108.561729][T10494] ? __d_alloc+0x36/0x370 [ 108.562360][T10494] __should_failslab+0x81/0x90 [ 108.563175][T10494] should_failslab+0x5/0x20 [ 108.564017][T10494] kmem_cache_alloc+0x46/0x2f0 [ 108.564977][T10494] __d_alloc+0x36/0x370 [ 108.565775][T10494] ? putname+0xa5/0xc0 [ 108.567453][T10494] d_alloc+0x2a/0x130 [ 108.568289][T10494] __lookup_hash+0x8f/0x180 [ 108.569020][T10494] filename_create+0xdb/0x3c0 [ 108.570109][T10494] do_mkdirat+0x59/0x200 [ 108.571320][T10494] __x64_sys_mkdir+0x32/0x40 [ 108.572457][T10494] do_syscall_64+0x4a/0x90 [ 108.573364][T10494] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 108.576419][T10494] RIP: 0033:0x4656e7 [ 108.577444][T10494] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 108.583252][T10494] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 108.586265][T10494] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 108.589208][T10494] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 108.591397][T10494] RBP: 00007f0cfa4b6040 R08: 0000000000000000 R09: ffffffffffffffff [ 108.594792][T10494] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 108.597338][T10494] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x4010, r0, 0x4000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="0107000000000000deff1f"], 0x1c}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) [ 108.614396][T10496] Quota error (device loop2): v2_read_file_info: Free block number too big (0 >= 0). [ 108.617877][T10496] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 108.642967][T10496] EXT4-fs (loop2): mount failed 12:59:11 executing program 0: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/48, 0x30) accept(r0, &(0x7f0000000100)=@isdn, &(0x7f0000000180)=0x80) 12:59:11 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:11 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:11 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:11 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:11 executing program 4: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_setup(0x187, &(0x7f0000000180), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x10001, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x0}}, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x40010, r0, 0x10000000) syz_io_uring_submit(r2, r5, &(0x7f0000000600)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd=r0, 0x8, 0x0, 0x40, 0x1}, 0x20000000) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x114, &(0x7f0000000180)=0x1, 0x0, 0x4) r6 = syz_io_uring_setup(0x5495, &(0x7f0000000000)={0x0, 0x4016, 0x4, 0x0, 0x20f, 0x0, r0}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) r8 = accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @loopback}, &(0x7f0000000340)=0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_setup(0x2069, &(0x7f0000000540)={0x0, 0xfffffffc, 0x0, 0x2, 0x34b, 0x0, r6}) syz_io_uring_setup(0x7ed2, &(0x7f0000000200)={0x0, 0x88a2, 0x0, 0x0, 0x37c, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_io_uring_submit(r7, r9, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, r8, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@ethernet={0x0, @remote}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/36, 0x24}], 0x1}, 0x0, 0x10001}, 0xffffffff) io_uring_enter(r0, 0x1, 0x1, 0x1, 0x0, 0x0) r10 = syz_io_uring_complete(r1) close(r10) ioctl$sock_inet_SIOCSIFADDR(r10, 0x8916, &(0x7f00000005c0)={'lo\x00', {0x2, 0x0, @multicast2}}) [ 109.215602][T10538] loop5: detected capacity change from 0 to 4 [ 109.219815][T10538] FAULT_INJECTION: forcing a failure. [ 109.219815][T10538] name failslab, interval 1, probability 0, space 0, times 0 [ 109.223646][T10542] loop1: detected capacity change from 0 to 4 [ 109.223948][T10538] CPU: 1 PID: 10538 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 109.231014][T10538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.233701][T10538] Call Trace: [ 109.234662][T10538] dump_stack+0x137/0x19d [ 109.236113][T10538] should_fail+0x23c/0x250 [ 109.236470][T10542] FAULT_INJECTION: forcing a failure. [ 109.236470][T10542] name failslab, interval 1, probability 0, space 0, times 0 [ 109.236989][T10538] ? __d_alloc+0x36/0x370 [ 109.237007][T10538] __should_failslab+0x81/0x90 [ 109.237025][T10538] should_failslab+0x5/0x20 [ 109.237038][T10538] kmem_cache_alloc+0x46/0x2f0 [ 109.237054][T10538] __d_alloc+0x36/0x370 [ 109.246528][T10538] ? putname+0xa5/0xc0 [ 109.248037][T10538] d_alloc+0x2a/0x130 [ 109.249621][T10538] __lookup_hash+0x8f/0x180 [ 109.250913][T10538] filename_create+0xdb/0x3c0 [ 109.252519][T10538] do_mkdirat+0x59/0x200 [ 109.253449][T10538] __x64_sys_mkdir+0x32/0x40 [ 109.255215][T10538] do_syscall_64+0x4a/0x90 [ 109.257176][T10538] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 109.258832][T10538] RIP: 0033:0x4656e7 [ 109.259583][T10538] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:59:11 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r2, 0x4, 0x4000) setsockopt$inet_tcp_int(r2, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r2, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r2, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r2) 12:59:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r1, &(0x7f0000000040), 0x0, 0x4, 0x9) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73668553b300080820000400008000f8", 0x16}, {0x0, 0x0, 0x10000}], 0x8080, &(0x7f0000011200)) 12:59:11 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 109.263414][T10538] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 109.266175][T10538] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 109.267498][T10538] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 109.269714][T10538] RBP: 00007f0cfa4b6040 R08: 0000000000000000 R09: ffffffffffffffff [ 109.271739][T10538] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 109.272913][T10538] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 109.275028][T10542] CPU: 0 PID: 10542 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 109.276884][T10544] loop2: detected capacity change from 0 to 4096 [ 109.277289][T10542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.277300][T10542] Call Trace: [ 109.277306][T10542] dump_stack+0x137/0x19d [ 109.282895][T10542] should_fail+0x23c/0x250 [ 109.283960][T10542] ? __d_alloc+0x36/0x370 [ 109.285209][T10542] __should_failslab+0x81/0x90 [ 109.285960][T10542] should_failslab+0x5/0x20 [ 109.287239][T10542] kmem_cache_alloc+0x46/0x2f0 [ 109.288450][T10542] __d_alloc+0x36/0x370 [ 109.289664][T10542] ? putname+0xa5/0xc0 [ 109.290454][T10542] d_alloc+0x2a/0x130 [ 109.291089][T10542] __lookup_hash+0x8f/0x180 [ 109.291839][T10542] filename_create+0xdb/0x3c0 [ 109.292708][T10542] do_mkdirat+0x59/0x200 [ 109.293509][T10542] __x64_sys_mkdir+0x32/0x40 [ 109.294175][T10542] do_syscall_64+0x4a/0x90 [ 109.295274][T10542] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 109.296850][T10542] RIP: 0033:0x4656e7 [ 109.297612][T10542] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 109.301591][T10542] RSP: 002b:00007f6ea9873fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 109.303205][T10542] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 109.305158][T10542] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 109.306382][T10542] RBP: 00007f6ea9874040 R08: 0000000000000000 R09: ffffffffffffffff [ 109.307915][T10542] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 109.309112][T10542] R13: 0000000020000100 R14: 00007f6ea9874000 R15: 00000000200000c0 12:59:11 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000001500)=[{&(0x7f0000000080)=""/39, 0x27}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000140)=""/222, 0xde}, {&(0x7f0000000240)=""/10, 0xa}, {&(0x7f0000000280)=""/148, 0x94}, {&(0x7f0000000340)=""/141, 0x8d}, {&(0x7f0000001480)=""/65, 0x41}], 0x8, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x2c, 0xffffffff, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000400)=0x80000001, 0x4) 12:59:11 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r2, 0x4, 0x4000) setsockopt$inet_tcp_int(r2, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r2, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r2, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r2) 12:59:11 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 109.342370][T10544] Quota error (device loop2): v2_read_file_info: Free block number too big (0 >= 0). [ 109.344700][T10544] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 109.349982][T10544] EXT4-fs (loop2): mount failed [ 109.392713][T10564] loop4: detected capacity change from 0 to 256 [ 109.397998][T10574] loop5: detected capacity change from 0 to 4 [ 109.399815][T10574] FAULT_INJECTION: forcing a failure. [ 109.399815][T10574] name failslab, interval 1, probability 0, space 0, times 0 [ 109.402192][T10574] CPU: 0 PID: 10574 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 109.404002][T10574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.406618][T10574] Call Trace: [ 109.407447][T10574] dump_stack+0x137/0x19d [ 109.408546][T10574] should_fail+0x23c/0x250 [ 109.409309][T10574] ? security_inode_alloc+0x30/0x180 [ 109.410597][T10574] __should_failslab+0x81/0x90 [ 109.411775][T10574] should_failslab+0x5/0x20 [ 109.413161][T10574] kmem_cache_alloc+0x46/0x2f0 [ 109.414487][T10574] security_inode_alloc+0x30/0x180 [ 109.415493][T10574] inode_init_always+0x20b/0x420 [ 109.416301][T10574] ? set_qf_name+0x230/0x230 [ 109.417064][T10574] new_inode_pseudo+0x73/0x1c0 [ 109.417945][T10574] new_inode+0x21/0x120 [ 109.418541][T10574] __ext4_new_inode+0x126/0x2f70 [ 109.419941][T10574] ? __dquot_initialize+0x131/0x7e0 [ 109.420912][T10574] ext4_mkdir+0x28a/0x760 [ 109.421712][T10574] vfs_mkdir+0x2a4/0x370 [ 109.422535][T10574] do_mkdirat+0x11d/0x200 [ 109.423585][T10574] __x64_sys_mkdir+0x32/0x40 [ 109.424821][T10574] do_syscall_64+0x4a/0x90 [ 109.425818][T10574] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 109.426790][T10574] RIP: 0033:0x4656e7 [ 109.427334][T10574] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 109.430199][T10574] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 109.432450][T10574] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 109.438396][T10574] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 109.446361][T10574] RBP: 00007f0cfa4b6040 R08: 0000000000000000 R09: ffffffffffffffff [ 109.454783][T10574] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 109.463248][T10574] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 109.476258][T10576] loop1: detected capacity change from 0 to 4 12:59:11 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 109.488021][T10576] FAULT_INJECTION: forcing a failure. [ 109.488021][T10576] name failslab, interval 1, probability 0, space 0, times 0 [ 109.501433][T10576] CPU: 0 PID: 10576 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 109.510415][T10576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.521340][T10576] Call Trace: [ 109.524803][T10576] dump_stack+0x137/0x19d [ 109.529331][T10576] should_fail+0x23c/0x250 [ 109.533749][T10576] ? ext4_alloc_inode+0x27/0x300 [ 109.538983][T10576] __should_failslab+0x81/0x90 [ 109.543973][T10576] ? set_qf_name+0x230/0x230 [ 109.548825][T10576] should_failslab+0x5/0x20 [ 109.553526][T10576] kmem_cache_alloc+0x46/0x2f0 [ 109.558734][T10576] ? ebitmap_destroy+0x91/0xa0 [ 109.563512][T10576] ? set_qf_name+0x230/0x230 [ 109.568088][T10576] ext4_alloc_inode+0x27/0x300 [ 109.573014][T10576] ? set_qf_name+0x230/0x230 [ 109.577879][T10576] new_inode_pseudo+0x38/0x1c0 [ 109.583029][T10576] new_inode+0x21/0x120 [ 109.587324][T10576] __ext4_new_inode+0x126/0x2f70 [ 109.592689][T10576] ? __dquot_initialize+0x131/0x7e0 [ 109.598184][T10576] ext4_mkdir+0x28a/0x760 [ 109.602554][T10576] vfs_mkdir+0x2a4/0x370 [ 109.606842][T10576] do_mkdirat+0x11d/0x200 [ 109.611292][T10576] __x64_sys_mkdir+0x32/0x40 [ 109.616021][T10576] do_syscall_64+0x4a/0x90 [ 109.620887][T10576] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 109.627005][T10576] RIP: 0033:0x4656e7 [ 109.631229][T10576] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 109.651431][T10576] RSP: 002b:00007f6ea9873fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 109.660024][T10576] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 109.668246][T10576] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 109.676528][T10576] RBP: 00007f6ea9874040 R08: 0000000000000000 R09: ffffffffffffffff [ 109.684932][T10576] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 109.693105][T10576] R13: 0000000020000100 R14: 00007f6ea9874000 R15: 00000000200000c0 12:59:11 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r2, 0x4, 0x4000) setsockopt$inet_tcp_int(r2, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r2, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r2, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r2) 12:59:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r2, 0x4, 0x4000) setsockopt$inet_tcp_int(r2, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r2, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r2, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r2) 12:59:11 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@routing={0x1d, 0x4, 0x0, 0x5a, 0x0, [@private2, @mcast1]}, 0x28) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001000008000000d24201001283", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000457900aa5f634b37b3eeb32debc4d834010040000c00000001", 0x25, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x1000}], 0x0, &(0x7f0000014d00)) 12:59:11 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, 0x0, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 109.785004][T10593] loop2: detected capacity change from 0 to 4096 [ 109.817916][T10593] Quota error (device loop2): v2_read_file_info: Free block number too big (0 >= 0). 12:59:11 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 109.880977][T10602] loop5: detected capacity change from 0 to 4 [ 109.891807][T10593] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 109.894244][T10614] loop1: detected capacity change from 0 to 4 [ 109.913598][T10602] FAULT_INJECTION: forcing a failure. [ 109.913598][T10602] name failslab, interval 1, probability 0, space 0, times 0 12:59:11 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x280101, 0x78) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000012c0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000002280)=ANY=[@ANYRESHEX, @ANYRES16=r4, @ANYRESDEC, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYRESDEC=r2], 0x1d4}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000001c0)={r2, 0x1, 0x20}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000200)={{}, 0x0, 0xe, @unused=[0x0, 0xfffffffffffeffff, 0xffffffffffff8af2, 0x4], @devid=r2}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000200)={r2, "b4533b4f5f87ddd4537c3d1ad60c478d"}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000001c0)={{}, 0x0, 0x8, @inherit={0x98, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @devid=r2}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000800)={r2, 0x6, 0x40, 0x1}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000240)={r2, 0x6, 0x6, 0x1}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000880)={0x0, 0x4, {0x9, @usage=0x9, 0x0, 0xa7, 0x1f, 0x6, 0x95, 0x437, 0x0, @struct={0x7, 0x1}, 0x1, 0xec, [0xfffffffffffffffc, 0x7, 0x6, 0xfffffffffffffbff, 0x8, 0x5]}, {0x8, @usage=0x3f, r2, 0x9, 0x1e8, 0x1, 0xffffffff, 0x10001, 0xc, @usage=0x10001, 0x4, 0xd5, [0xffff, 0xc3, 0x2, 0x80000000000000, 0x4, 0x1]}, {0x5, @usage=0x80000000, 0x0, 0x4, 0x100, 0x3, 0xffffffffffffff80, 0x0, 0x0, @struct={0x7, 0x2}, 0x9, 0x2, [0x7f, 0x4, 0x888, 0x6, 0xff, 0x9]}, {0x0, 0xffff, 0x4}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 109.926733][T10602] CPU: 0 PID: 10602 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 109.935764][T10602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.946558][T10602] Call Trace: [ 109.950053][T10602] dump_stack+0x137/0x19d [ 109.954831][T10602] should_fail+0x23c/0x250 [ 109.959550][T10602] ? sidtab_sid2str_get+0x9c/0x130 [ 109.964978][T10602] __should_failslab+0x81/0x90 [ 109.969764][T10602] should_failslab+0x5/0x20 [ 109.974566][T10602] __kmalloc_track_caller+0x64/0x340 [ 109.980013][T10602] kmemdup+0x21/0x50 [ 109.983916][T10602] sidtab_sid2str_get+0x9c/0x130 [ 109.988861][T10602] security_sid_to_context_core+0x1cb/0x2d0 [ 109.995250][T10602] security_sid_to_context_force+0x2f/0x40 [ 110.001482][T10602] selinux_inode_init_security+0x49e/0x550 [ 110.007666][T10602] security_inode_init_security+0xd7/0x260 [ 110.014017][T10602] ? ext4_init_security+0x40/0x40 [ 110.019499][T10602] ext4_init_security+0x30/0x40 [ 110.024422][T10602] __ext4_new_inode+0x29a1/0x2f70 [ 110.029794][T10602] ext4_mkdir+0x28a/0x760 [ 110.034445][T10602] vfs_mkdir+0x2a4/0x370 [ 110.038776][T10602] do_mkdirat+0x11d/0x200 [ 110.043191][T10602] __x64_sys_mkdir+0x32/0x40 [ 110.048114][T10602] do_syscall_64+0x4a/0x90 [ 110.052605][T10602] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 110.058689][T10602] RIP: 0033:0x4656e7 [ 110.062772][T10602] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.085946][T10602] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 110.094614][T10602] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 110.102655][T10602] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 110.110781][T10602] RBP: 00007f0cfa4b6040 R08: 0000000000000000 R09: ffffffffffffffff [ 110.119198][T10602] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 110.127212][T10602] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 110.142271][T10614] FAULT_INJECTION: forcing a failure. [ 110.142271][T10614] name failslab, interval 1, probability 0, space 0, times 0 [ 110.155683][T10614] CPU: 0 PID: 10614 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 110.162830][T10593] EXT4-fs (loop2): mount failed [ 110.164615][T10614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.164627][T10614] Call Trace: [ 110.164633][T10614] dump_stack+0x137/0x19d [ 110.178967][T10606] loop4: detected capacity change from 0 to 4096 [ 110.180197][T10614] should_fail+0x23c/0x250 [ 110.199225][T10614] ? security_inode_alloc+0x30/0x180 [ 110.204796][T10614] __should_failslab+0x81/0x90 [ 110.209580][T10614] should_failslab+0x5/0x20 [ 110.214137][T10614] kmem_cache_alloc+0x46/0x2f0 [ 110.218977][T10614] security_inode_alloc+0x30/0x180 [ 110.224420][T10614] inode_init_always+0x20b/0x420 [ 110.229547][T10614] ? set_qf_name+0x230/0x230 [ 110.234167][T10614] new_inode_pseudo+0x73/0x1c0 [ 110.239027][T10614] new_inode+0x21/0x120 [ 110.243370][T10614] __ext4_new_inode+0x126/0x2f70 [ 110.248483][T10614] ? __dquot_initialize+0x131/0x7e0 [ 110.253745][T10614] ext4_mkdir+0x28a/0x760 [ 110.258262][T10614] vfs_mkdir+0x2a4/0x370 [ 110.262591][T10614] do_mkdirat+0x11d/0x200 [ 110.267193][T10614] __x64_sys_mkdir+0x32/0x40 [ 110.271876][T10614] do_syscall_64+0x4a/0x90 [ 110.276300][T10614] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 110.282273][T10614] RIP: 0033:0x4656e7 [ 110.286239][T10614] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.306923][T10614] RSP: 002b:00007f6ea9873fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 110.315324][T10614] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 110.323544][T10614] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 12:59:12 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, 0x0, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 110.331585][T10614] RBP: 00007f6ea9874040 R08: 0000000000000000 R09: ffffffffffffffff [ 110.340364][T10614] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 110.348492][T10614] R13: 0000000020000100 R14: 00007f6ea9874000 R15: 00000000200000c0 [ 110.368780][T10619] device lo entered promiscuous mode 12:59:12 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:12 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 110.371780][T10606] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 110.386663][T10606] EXT4-fs (loop4): get root inode failed [ 110.392434][T10606] EXT4-fs (loop4): mount failed [ 110.400076][T10619] Y­4`Ò˜: renamed from lo 12:59:12 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x70, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x20, 0x1}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x19}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x2c}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x77}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x67}]}, 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x8000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x4000010, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/27, 0x1b}], 0x1, 0x4, 0x0) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 12:59:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x8d}, 0x0) r0 = getpid() getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) setrlimit(0xd, &(0x7f0000000080)={0x2, 0xbe2}) r3 = dup3(r2, r1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) 12:59:12 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, 0x0, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:12 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 110.477159][T10637] loop5: detected capacity change from 0 to 4 [ 110.483777][T10639] loop2: detected capacity change from 0 to 4096 [ 110.493122][T10647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10647 comm=syz-executor.0 [ 110.500272][T10637] FAULT_INJECTION: forcing a failure. [ 110.500272][T10637] name failslab, interval 1, probability 0, space 0, times 0 [ 110.519406][T10637] CPU: 1 PID: 10637 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 110.528349][T10637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.538516][T10637] Call Trace: [ 110.542057][T10637] dump_stack+0x137/0x19d [ 110.546424][T10637] should_fail+0x23c/0x250 [ 110.551013][T10637] ? kcalloc+0x32/0x50 [ 110.555170][T10637] __should_failslab+0x81/0x90 [ 110.560081][T10637] should_failslab+0x5/0x20 [ 110.564704][T10637] __kmalloc+0x66/0x340 [ 110.568945][T10637] ? chksum_update+0x39/0x50 [ 110.568967][T10647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10647 comm=syz-executor.0 [ 110.586440][T10637] kcalloc+0x32/0x50 [ 110.590801][T10637] ext4_find_extent+0x21c/0x7f0 [ 110.595886][T10637] ext4_ext_map_blocks+0xd9/0x1f00 [ 110.601196][T10637] ? __down_read_common+0x16b/0x5a0 [ 110.607039][T10637] ? percpu_counter_add_batch+0x69/0xd0 [ 110.613047][T10637] ? ext4_es_lookup_extent+0x206/0x490 [ 110.618700][T10637] ext4_map_blocks+0x1be/0xef0 [ 110.623673][T10637] ext4_getblk+0xb1/0x3d0 [ 110.628133][T10637] ? __ext4_new_inode+0x2aed/0x2f70 [ 110.633439][T10637] ext4_bread+0x28/0x130 [ 110.637853][T10637] ext4_append+0xd1/0x1c0 [ 110.642267][T10637] ext4_init_new_dir+0x177/0x500 [ 110.647712][T10637] ext4_mkdir+0x329/0x760 [ 110.652211][T10637] vfs_mkdir+0x2a4/0x370 [ 110.656446][T10637] do_mkdirat+0x11d/0x200 [ 110.660902][T10637] __x64_sys_mkdir+0x32/0x40 [ 110.665556][T10637] do_syscall_64+0x4a/0x90 [ 110.670347][T10637] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 110.676620][T10637] RIP: 0033:0x4656e7 [ 110.680625][T10637] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.701787][T10637] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 110.710563][T10637] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 110.718782][T10637] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 12:59:12 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) mmap(&(0x7f000043b000/0x1000)=nil, 0x1000, 0x1800007, 0x12, 0xffffffffffffffff, 0xc74c9000) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000280)="120000001e00e5cfbe4153f4d8195b6638ff007b00000000008000a1", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000000)=""/26, 0x1a}, {&(0x7f0000000200)=""/55, 0x37}], 0x2, 0x4, 0x10000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) sendto(r1, &(0x7f00000002c0)="c7fc753a659f90c48898bdc9ca", 0xd, 0x0, &(0x7f0000000300)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/139, 0x8b}, {&(0x7f0000000080)=""/46, 0x2e}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x3, 0x3, 0x2) [ 110.726845][T10637] RBP: 00007f0cfa4b6040 R08: 0000000000000000 R09: ffffffffffffffff [ 110.735123][T10637] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 110.743274][T10637] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 110.752497][T10645] loop1: detected capacity change from 0 to 4 [ 110.774360][T10645] FAULT_INJECTION: forcing a failure. [ 110.774360][T10645] name failslab, interval 1, probability 0, space 0, times 0 [ 110.780053][T10639] Quota error (device loop2): v2_read_file_info: Free block number too big (0 >= 0). [ 110.787871][T10645] CPU: 1 PID: 10645 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 110.806465][T10645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.808195][T10639] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 110.816611][T10645] Call Trace: [ 110.816620][T10645] dump_stack+0x137/0x19d [ 110.816643][T10645] should_fail+0x23c/0x250 [ 110.832361][T10639] EXT4-fs (loop2): mount failed [ 110.834224][T10645] ? sidtab_sid2str_get+0x9c/0x130 [ 110.834242][T10645] __should_failslab+0x81/0x90 [ 110.858773][T10645] should_failslab+0x5/0x20 [ 110.863351][T10645] __kmalloc_track_caller+0x64/0x340 [ 110.868840][T10645] kmemdup+0x21/0x50 [ 110.872730][T10645] sidtab_sid2str_get+0x9c/0x130 [ 110.877656][T10645] security_sid_to_context_core+0x1cb/0x2d0 [ 110.884007][T10645] security_sid_to_context_force+0x2f/0x40 [ 110.890052][T10645] selinux_inode_init_security+0x49e/0x550 [ 110.895857][T10645] security_inode_init_security+0xd7/0x260 [ 110.901753][T10645] ? ext4_init_security+0x40/0x40 [ 110.906763][T10645] ext4_init_security+0x30/0x40 [ 110.911771][T10645] __ext4_new_inode+0x29a1/0x2f70 [ 110.917283][T10645] ext4_mkdir+0x28a/0x760 [ 110.921607][T10645] vfs_mkdir+0x2a4/0x370 [ 110.925934][T10645] do_mkdirat+0x11d/0x200 [ 110.930440][T10645] __x64_sys_mkdir+0x32/0x40 [ 110.935016][T10645] do_syscall_64+0x4a/0x90 [ 110.939718][T10645] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 110.945628][T10645] RIP: 0033:0x4656e7 [ 110.949564][T10645] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.969344][T10645] RSP: 002b:00007f6ea9873fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 12:59:12 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 110.977858][T10645] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 110.986148][T10645] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 110.994199][T10645] RBP: 00007f6ea9874040 R08: 0000000000000000 R09: ffffffffffffffff [ 111.003647][T10645] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 111.011699][T10645] R13: 0000000020000100 R14: 00007f6ea9874000 R15: 00000000200000c0 12:59:12 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:12 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000140)={@id={0x2, 0x0, @c}, 0x21, 0x0, '\x00', @c}) [ 111.050551][T10637] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 111.073932][T10676] loop2: detected capacity change from 0 to 4096 12:59:13 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:13 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 111.100130][T10676] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 111.133074][T10676] EXT4-fs (loop2): mount failed 12:59:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 111.166887][T10696] loop5: detected capacity change from 0 to 4 [ 111.177229][T10695] loop1: detected capacity change from 0 to 4 [ 111.184925][T10695] FAULT_INJECTION: forcing a failure. [ 111.184925][T10695] name failslab, interval 1, probability 0, space 0, times 0 [ 111.197747][T10695] CPU: 1 PID: 10695 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 111.206640][T10695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.211345][T10696] FAULT_INJECTION: forcing a failure. [ 111.211345][T10696] name failslab, interval 1, probability 0, space 0, times 0 [ 111.216925][T10695] Call Trace: [ 111.216934][T10695] dump_stack+0x137/0x19d [ 111.238011][T10695] should_fail+0x23c/0x250 [ 111.242773][T10695] ? kcalloc+0x32/0x50 [ 111.247067][T10695] __should_failslab+0x81/0x90 [ 111.252890][T10695] should_failslab+0x5/0x20 [ 111.257397][T10695] __kmalloc+0x66/0x340 [ 111.261690][T10695] ? chksum_update+0x39/0x50 [ 111.266567][T10695] kcalloc+0x32/0x50 [ 111.270712][T10695] ext4_find_extent+0x21c/0x7f0 [ 111.275681][T10695] ext4_ext_map_blocks+0xd9/0x1f00 [ 111.281259][T10695] ? __down_read_common+0x16b/0x5a0 [ 111.286443][T10695] ? percpu_counter_add_batch+0x69/0xd0 [ 111.292098][T10695] ? ext4_es_lookup_extent+0x206/0x490 [ 111.297790][T10695] ext4_map_blocks+0x1be/0xef0 [ 111.302725][T10695] ext4_getblk+0xb1/0x3d0 [ 111.307290][T10695] ? __ext4_new_inode+0x2aed/0x2f70 [ 111.312564][T10695] ext4_bread+0x28/0x130 [ 111.316799][T10695] ext4_append+0xd1/0x1c0 [ 111.321320][T10695] ext4_init_new_dir+0x177/0x500 [ 111.326989][T10695] ext4_mkdir+0x329/0x760 [ 111.331385][T10695] vfs_mkdir+0x2a4/0x370 [ 111.335666][T10695] do_mkdirat+0x11d/0x200 [ 111.340012][T10695] __x64_sys_mkdir+0x32/0x40 [ 111.344708][T10695] do_syscall_64+0x4a/0x90 [ 111.349213][T10695] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 111.355182][T10695] RIP: 0033:0x4656e7 [ 111.359211][T10695] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 111.379173][T10695] RSP: 002b:00007f6ea9873fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 111.387660][T10695] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 111.395798][T10695] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 111.403975][T10695] RBP: 00007f6ea9874040 R08: 0000000000000000 R09: ffffffffffffffff 12:59:13 executing program 0: setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0xfb, 0x1d, 0x0, 0x1, "7f8e34464f5be20dd5d73d009adf0913", "a8d4be040bfc55e0"}, 0x1d, 0x1) r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000001c0)={0xc02a, 0x0, &(0x7f0000000180)=[r0]}, 0x1) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 111.412369][T10695] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 111.420419][T10695] R13: 0000000020000100 R14: 00007f6ea9874000 R15: 00000000200000c0 [ 111.428896][T10696] CPU: 0 PID: 10696 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 111.437841][T10696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.447997][T10696] Call Trace: [ 111.451597][T10696] dump_stack+0x137/0x19d [ 111.456009][T10696] should_fail+0x23c/0x250 [ 111.460500][T10696] ? kcalloc+0x32/0x50 [ 111.464674][T10696] __should_failslab+0x81/0x90 [ 111.469964][T10696] should_failslab+0x5/0x20 [ 111.475482][T10696] __kmalloc+0x66/0x340 [ 111.480015][T10696] ? chksum_update+0x39/0x50 [ 111.484851][T10696] kcalloc+0x32/0x50 [ 111.488751][T10696] ext4_find_extent+0x21c/0x7f0 [ 111.493587][T10696] ext4_ext_map_blocks+0xd9/0x1f00 [ 111.498851][T10696] ? __down_read_common+0x16b/0x5a0 [ 111.504030][T10696] ? percpu_counter_add_batch+0x69/0xd0 [ 111.509647][T10696] ? ext4_es_lookup_extent+0x206/0x490 [ 111.515284][T10696] ext4_map_blocks+0x1be/0xef0 [ 111.520491][T10696] ext4_getblk+0xb1/0x3d0 [ 111.524824][T10696] ? __ext4_new_inode+0x2aed/0x2f70 [ 111.530208][T10696] ext4_bread+0x28/0x130 [ 111.534439][T10696] ext4_append+0xd1/0x1c0 [ 111.538960][T10696] ext4_init_new_dir+0x177/0x500 [ 111.543953][T10696] ext4_mkdir+0x329/0x760 [ 111.548300][T10696] vfs_mkdir+0x2a4/0x370 [ 111.552524][T10696] do_mkdirat+0x11d/0x200 [ 111.557501][T10696] __x64_sys_mkdir+0x32/0x40 [ 111.562074][T10696] do_syscall_64+0x4a/0x90 [ 111.566609][T10696] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 111.572573][T10696] RIP: 0033:0x4656e7 [ 111.576496][T10696] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 111.596616][T10696] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 111.605098][T10696] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 12:59:13 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000017c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xc0}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f00000000c0)={0x0, 0x4, 0x3, 0x81, 0x1, [0x1f, 0x7a6, 0x2]}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="28010000170001000000000000000000ac1414bb0000000000000000000000000000000000000000ac1414aa000000000000000000000000ac1414aa000000000000000000000000ac1e000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe800000000000000000000000000000fe80000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x128}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0xf1, 0x0) 12:59:13 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 111.613123][T10696] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 111.621294][T10696] RBP: 00007f0cfa4b6040 R08: 0000000000000000 R09: ffffffffffffffff [ 111.629721][T10696] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 111.637889][T10696] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:13 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(r1, &(0x7f0000001900)='./file0\x00', 0x40000, 0x1c4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x10000, 0x4, &(0x7f0000001500)=[{&(0x7f0000000480)="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", 0x1000, 0x4}, {&(0x7f0000000240)="918ce0df75a057fd6d928df21d02116a6357fe540035914f99445b8645ae339c1041233aabc51c9a2efbce2c83e58938db9ebbfc25564b08d02660edc242014457c72c3b6b352a4446ddf19a362453e87e7e7c88cdd0191e74e6b3b50dc779384de05997563e3b701f7286e03e1cad4899ebaff7a1e5b8bca1c72fefaa10c02d608a41556cb0245fac6e40ae0585a2c6e6596a27e586e7ef9ab94bb55d599b44217075f347d7382236255199592a0240393becb66b6bcd02c1c68e08186a75fb1960de3224eb5385e6f433a236b7e507a560754ca14f48a6b9bbbbf500cd38178e7f3d4078b1378242a484b1df2b9024d341", 0xf2, 0xffffffff}, {&(0x7f0000000340)="1abbf527ecc79d8e34336741fc9cf63a88e42d96bfea84e6b40e20761755a49cc20280b2682772866b071b1afa346b20aaa69404dc1fb7a3810f7b983cb35bd17c0b769910e71d2518061fbefd5051aba1b8fe6323b92d751d364b5dd2c31e7034cdd29871759d06a0a1d3e4f7be96ebeba682e04cd41a935d738d30675b67b55c43ef690c4d14d12edd05601ad599de0bcf5306f0155dfdd8671a501993a772babf0983f7c9bba74c102ed7067247abb85de7a64041c1a3000623bc0fb0ba622a3c0fdcdaec6369ade2cc7974480d75609e02d1ba5c6a02e2b672a2a75acce69461af4729ce2663d6435e6e0f", 0xed, 0x5}, {&(0x7f0000001480)="0c6315d72a057a7c4c0da5c6a9397c1756b9bef2ca9db1f15255929dac1bbf5f01da4f256bd6e57cfad331680395479999225449a4028373544881b1373d374fab6d84de2c93520fc54f92e71e42cf3502f7988811d3e8791c2d40f1a27c9b48b38b536b0c2070ef75804c5f64baecf0f4b0", 0x72, 0xff}], 0x610, &(0x7f0000001580)={[{@huge_within_size}, {@mode={'mode', 0x3d, 0x1}}], [{@permit_directio}, {@smackfsroot={'smackfsroot', 0x3d, '{\\!!&,^-*@#.'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x35, 0x62, 0x38, 0x33, 0x39, 0x63, 0x30], 0x2d, [0x50, 0x63, 0x30, 0x66], 0x2d, [0x65, 0x63, 0x64], 0x2d, [0x65, 0x38, 0x69, 0x30], 0x2d, [0x7, 0x39, 0x55, 0x50, 0x35, 0x62, 0x38, 0x38]}}}, {@smackfshat={'smackfshat', 0x3d, '\x8c\\'}}, {@smackfstransmute}, {@subj_role}]}) preadv(r1, &(0x7f0000000280), 0x0, 0xd8f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) preadv(r1, &(0x7f00000018c0)=[{&(0x7f0000001640)=""/168, 0xa8}, {&(0x7f0000001700)=""/100, 0x64}, {&(0x7f0000001780)=""/204, 0xcc}, {&(0x7f0000001880)=""/52, 0x34}], 0x4, 0x8000000, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000140)={"4237b004493eda7e37897f0e04e8ef17", 0x0, 0x0, {0x8001, 0x418}, {0x100000000, 0x6}, 0xffffffff, [0xc3, 0x40, 0x6, 0xffffffffffffffff, 0x3, 0x6, 0x9, 0x7fff, 0x7fffffff, 0x2, 0xffff, 0x0, 0xfcae, 0x8, 0x4, 0x7]}) 12:59:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xb, 0x803, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x6000) getsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f00000001c0), &(0x7f0000000200)=0x4) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) setsockopt$inet_group_source_req(r1, 0x0, 0x7, 0x0, 0x0) [ 111.683614][T10711] loop2: detected capacity change from 0 to 4096 [ 111.708624][T10695] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 111.719726][T10696] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:13 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:13 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 111.734797][T10711] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 111.765812][T10711] EXT4-fs (loop2): mount failed [ 111.771090][T10729] loop0: detected capacity change from 0 to 264192 [ 111.778211][T10729] tmpfs: Unsupported parameter 'huge' 12:59:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:13 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 111.861694][T10748] loop5: detected capacity change from 0 to 4 [ 111.871455][T10755] loop1: detected capacity change from 0 to 4 [ 111.878356][T10758] loop2: detected capacity change from 0 to 4096 [ 111.883856][T10745] loop0: detected capacity change from 0 to 128 [ 111.913932][T10748] FAULT_INJECTION: forcing a failure. [ 111.913932][T10748] name failslab, interval 1, probability 0, space 0, times 0 [ 111.926603][T10748] CPU: 0 PID: 10748 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 111.935481][T10748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.945955][T10748] Call Trace: [ 111.949229][T10748] dump_stack+0x137/0x19d [ 111.953567][T10748] should_fail+0x23c/0x250 [ 111.954951][T10758] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 111.957981][T10748] ? __es_insert_extent+0x51f/0xe70 [ 111.958007][T10748] __should_failslab+0x81/0x90 [ 111.982362][T10748] should_failslab+0x5/0x20 [ 111.986956][T10748] kmem_cache_alloc+0x46/0x2f0 [ 111.987571][T10755] FAULT_INJECTION: forcing a failure. [ 111.987571][T10755] name failslab, interval 1, probability 0, space 0, times 0 [ 111.991769][T10748] ? iput+0x1c2/0x590 [ 112.008512][T10748] __es_insert_extent+0x51f/0xe70 [ 112.013597][T10748] ? kcalloc+0x32/0x50 [ 112.017848][T10748] ? __kmalloc+0x23d/0x340 [ 112.022349][T10748] ? kcalloc+0x32/0x50 [ 112.026472][T10748] ext4_es_insert_extent+0x1bb/0x19d0 [ 112.031972][T10748] ? ext4_ext_convert_to_initialized+0xf50/0xf50 [ 112.038376][T10748] ext4_ext_map_blocks+0xf79/0x1f00 [ 112.043592][T10748] ? __down_read_common+0x16b/0x5a0 [ 112.048774][T10748] ? percpu_counter_add_batch+0x69/0xd0 [ 112.054373][T10748] ? ext4_es_lookup_extent+0x206/0x490 [ 112.059907][T10748] ext4_map_blocks+0x1be/0xef0 [ 112.064671][T10748] ext4_getblk+0xb1/0x3d0 [ 112.069164][T10748] ? __ext4_new_inode+0x2aed/0x2f70 [ 112.074703][T10748] ext4_bread+0x28/0x130 [ 112.079090][T10748] ext4_append+0xd1/0x1c0 [ 112.083581][T10748] ext4_init_new_dir+0x177/0x500 [ 112.088525][T10748] ext4_mkdir+0x329/0x760 [ 112.092993][T10748] vfs_mkdir+0x2a4/0x370 [ 112.097241][T10748] do_mkdirat+0x11d/0x200 [ 112.101575][T10748] __x64_sys_mkdir+0x32/0x40 [ 112.106278][T10748] do_syscall_64+0x4a/0x90 [ 112.110928][T10748] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 112.116901][T10748] RIP: 0033:0x4656e7 [ 112.120781][T10748] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 112.141088][T10748] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 112.149579][T10748] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 112.158076][T10748] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 112.166372][T10748] RBP: 00007f0cfa4b6040 R08: 0000000000000000 R09: ffffffffffffffff [ 112.174664][T10748] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 112.182967][T10748] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 112.191202][T10755] CPU: 1 PID: 10755 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 112.200875][T10755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.211531][T10755] Call Trace: 12:59:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:14 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 112.214811][T10755] dump_stack+0x137/0x19d [ 112.219863][T10755] should_fail+0x23c/0x250 [ 112.221188][T10758] EXT4-fs (loop2): mount failed [ 112.224289][T10755] ? __es_insert_extent+0x51f/0xe70 [ 112.234442][T10755] __should_failslab+0x81/0x90 [ 112.239317][T10755] should_failslab+0x5/0x20 [ 112.243824][T10755] kmem_cache_alloc+0x46/0x2f0 [ 112.248611][T10755] ? iput+0x1c2/0x590 [ 112.252657][T10755] __es_insert_extent+0x51f/0xe70 [ 112.257688][T10755] ? kcalloc+0x32/0x50 12:59:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 112.261868][T10755] ? __kmalloc+0x23d/0x340 [ 112.266392][T10755] ? kcalloc+0x32/0x50 [ 112.270610][T10755] ext4_es_insert_extent+0x1bb/0x19d0 [ 112.276275][T10755] ? ext4_ext_convert_to_initialized+0xf50/0xf50 [ 112.282796][T10755] ext4_ext_map_blocks+0xf79/0x1f00 [ 112.288173][T10755] ? __down_read_common+0x16b/0x5a0 [ 112.293427][T10755] ? percpu_counter_add_batch+0x69/0xd0 [ 112.298985][T10755] ? ext4_es_lookup_extent+0x206/0x490 [ 112.304510][T10755] ext4_map_blocks+0x1be/0xef0 [ 112.309551][T10755] ext4_getblk+0xb1/0x3d0 [ 112.313940][T10755] ? __ext4_new_inode+0x2aed/0x2f70 [ 112.319536][T10755] ext4_bread+0x28/0x130 [ 112.323820][T10755] ext4_append+0xd1/0x1c0 [ 112.328170][T10755] ext4_init_new_dir+0x177/0x500 [ 112.333184][T10755] ext4_mkdir+0x329/0x760 [ 112.337504][T10755] vfs_mkdir+0x2a4/0x370 [ 112.341857][T10755] do_mkdirat+0x11d/0x200 [ 112.346232][T10755] __x64_sys_mkdir+0x32/0x40 [ 112.350809][T10755] do_syscall_64+0x4a/0x90 [ 112.355217][T10755] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 112.361356][T10755] RIP: 0033:0x4656e7 [ 112.365451][T10755] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 112.385220][T10755] RSP: 002b:00007f6ea9873fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 112.393614][T10755] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 112.401758][T10755] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 12:59:14 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 112.409843][T10755] RBP: 00007f6ea9874040 R08: 0000000000000000 R09: ffffffffffffffff [ 112.417947][T10755] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 112.426319][T10755] R13: 0000000020000100 R14: 00007f6ea9874000 R15: 00000000200000c0 12:59:14 executing program 0: finit_module(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x0) r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:14 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 112.463060][T10748] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 112.472765][T10755] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:14 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:14 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:14 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:14 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x163000, 0xe5, 0x2}, 0x18) openat(r2, &(0x7f0000000200)='./file0\x00', 0x18100, 0xe0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write(r3, &(0x7f0000000140)="458e43762789e3f465f688553af59dfa3fe92b855e773432c151744f05d935843c5520d90e43be4d4d6dd38a7b2fb017a9b3fc53572aafdefdc18e4439b9e84c16e3649b39bcf8d1c52ed59c344e02", 0x4f) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 112.561029][T10813] loop2: detected capacity change from 0 to 4096 [ 112.591479][T10823] loop5: detected capacity change from 0 to 4 [ 112.605060][T10826] loop1: detected capacity change from 0 to 4 [ 112.621938][T10813] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 112.632941][T10813] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 112.651088][T10823] FAULT_INJECTION: forcing a failure. [ 112.651088][T10823] name failslab, interval 1, probability 0, space 0, times 0 12:59:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 112.664401][T10823] CPU: 1 PID: 10823 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 112.668621][T10813] EXT4-fs (loop2): mount failed [ 112.673631][T10823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.673645][T10823] Call Trace: [ 112.673652][T10823] dump_stack+0x137/0x19d [ 112.697000][T10823] should_fail+0x23c/0x250 [ 112.701426][T10823] ? ext4_mb_new_blocks+0x2e7/0x1f90 [ 112.704469][T10826] FAULT_INJECTION: forcing a failure. [ 112.704469][T10826] name failslab, interval 1, probability 0, space 0, times 0 [ 112.706730][T10823] __should_failslab+0x81/0x90 [ 112.706757][T10823] should_failslab+0x5/0x20 [ 112.728715][T10823] kmem_cache_alloc+0x46/0x2f0 [ 112.733706][T10823] ext4_mb_new_blocks+0x2e7/0x1f90 [ 112.738921][T10823] ? ext4_find_extent+0x6cf/0x7f0 [ 112.743960][T10823] ? ext4_ext_search_right+0x300/0x540 [ 112.749788][T10823] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 112.755518][T10823] ext4_ext_map_blocks+0x1569/0x1f00 [ 112.761052][T10823] ? __down_read_common+0x16b/0x5a0 [ 112.766981][T10823] ? percpu_counter_add_batch+0x69/0xd0 [ 112.772622][T10823] ? ext4_es_lookup_extent+0x206/0x490 [ 112.778231][T10823] ext4_map_blocks+0x70d/0xef0 [ 112.783125][T10823] ext4_getblk+0xb1/0x3d0 [ 112.787631][T10823] ext4_bread+0x28/0x130 [ 112.792013][T10823] ext4_append+0xd1/0x1c0 [ 112.796337][T10823] ext4_init_new_dir+0x177/0x500 [ 112.801431][T10823] ext4_mkdir+0x329/0x760 [ 112.805839][T10823] vfs_mkdir+0x2a4/0x370 [ 112.810142][T10823] do_mkdirat+0x11d/0x200 [ 112.814482][T10823] __x64_sys_mkdir+0x32/0x40 [ 112.819321][T10823] do_syscall_64+0x4a/0x90 [ 112.823980][T10823] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 112.830195][T10823] RIP: 0033:0x4656e7 [ 112.835076][T10823] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 112.855619][T10823] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 112.864266][T10823] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 112.872474][T10823] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 112.880524][T10823] RBP: 00007f0cfa4b6040 R08: 0000000000000000 R09: ffffffffffffffff [ 112.888694][T10823] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 112.896824][T10823] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 112.905769][T10826] CPU: 0 PID: 10826 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 12:59:14 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 112.914981][T10826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.925760][T10826] Call Trace: [ 112.929046][T10826] dump_stack+0x137/0x19d [ 112.933458][T10826] should_fail+0x23c/0x250 [ 112.938305][T10826] ? kcalloc+0x32/0x50 [ 112.942536][T10826] __should_failslab+0x81/0x90 [ 112.947310][T10826] should_failslab+0x5/0x20 [ 112.951914][T10826] __kmalloc+0x66/0x340 [ 112.956273][T10826] ? kcalloc+0x32/0x50 [ 112.960528][T10826] kcalloc+0x32/0x50 [ 112.964620][T10826] ext4_find_extent+0x21c/0x7f0 [ 112.970031][T10826] ? kfree+0xf0/0x1d0 [ 112.974474][T10826] ext4_ext_map_blocks+0xd9/0x1f00 [ 112.980532][T10826] ? __down_write_common+0x45/0x890 [ 112.985951][T10826] ? __down_read_common+0x16b/0x5a0 [ 112.991241][T10826] ? percpu_counter_add_batch+0x69/0xd0 [ 112.997280][T10826] ? ext4_es_lookup_extent+0x206/0x490 [ 113.002800][T10826] ext4_map_blocks+0x70d/0xef0 [ 113.007579][T10826] ext4_getblk+0xb1/0x3d0 [ 113.011968][T10826] ext4_bread+0x28/0x130 [ 113.016280][T10826] ext4_append+0xd1/0x1c0 12:59:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 113.023288][T10826] ext4_init_new_dir+0x177/0x500 [ 113.028359][T10826] ext4_mkdir+0x329/0x760 [ 113.032875][T10826] vfs_mkdir+0x2a4/0x370 [ 113.037346][T10826] do_mkdirat+0x11d/0x200 [ 113.042975][T10826] __x64_sys_mkdir+0x32/0x40 [ 113.047695][T10826] do_syscall_64+0x4a/0x90 [ 113.052380][T10826] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 113.058695][T10826] RIP: 0033:0x4656e7 [ 113.062933][T10826] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.084623][T10826] RSP: 002b:00007f6ea9873fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 113.093641][T10826] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 113.102064][T10826] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 113.110354][T10826] RBP: 00007f6ea9874040 R08: 0000000000000000 R09: ffffffffffffffff 12:59:15 executing program 4: clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:15 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:15 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 113.118633][T10826] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 113.126952][T10826] R13: 0000000020000100 R14: 00007f6ea9874000 R15: 00000000200000c0 12:59:15 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000000c0)) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 113.201262][T10884] loop5: detected capacity change from 0 to 4 [ 113.218585][T10884] FAULT_INJECTION: forcing a failure. [ 113.218585][T10884] name failslab, interval 1, probability 0, space 0, times 0 [ 113.231586][T10884] CPU: 1 PID: 10884 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 113.233499][T10886] loop2: detected capacity change from 0 to 4096 [ 113.240439][T10884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.240452][T10884] Call Trace: [ 113.240459][T10884] dump_stack+0x137/0x19d [ 113.266205][T10884] should_fail+0x23c/0x250 [ 113.270902][T10884] ? ext4_mb_new_blocks+0x70f/0x1f90 [ 113.276314][T10884] __should_failslab+0x81/0x90 [ 113.281418][T10884] should_failslab+0x5/0x20 [ 113.286121][T10884] kmem_cache_alloc+0x46/0x2f0 [ 113.291336][T10884] ext4_mb_new_blocks+0x70f/0x1f90 [ 113.296767][T10884] ? ext4_find_extent+0x6cf/0x7f0 [ 113.302136][T10884] ? ext4_ext_search_right+0x300/0x540 [ 113.307714][T10884] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 113.313697][T10884] ext4_ext_map_blocks+0x1569/0x1f00 [ 113.318980][T10884] ? finish_task_switch+0xce/0x290 [ 113.324294][T10884] ? ext4_es_lookup_extent+0x206/0x490 [ 113.329857][T10884] ext4_map_blocks+0x70d/0xef0 [ 113.334947][T10884] ext4_getblk+0xb1/0x3d0 [ 113.339783][T10884] ext4_bread+0x28/0x130 [ 113.344154][T10884] ext4_append+0xd1/0x1c0 [ 113.348567][T10884] ext4_init_new_dir+0x177/0x500 [ 113.353666][T10884] ext4_mkdir+0x329/0x760 [ 113.358087][T10884] vfs_mkdir+0x2a4/0x370 [ 113.362326][T10884] do_mkdirat+0x11d/0x200 [ 113.366722][T10884] __x64_sys_mkdir+0x32/0x40 [ 113.371417][T10884] do_syscall_64+0x4a/0x90 [ 113.375825][T10884] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 113.382260][T10884] RIP: 0033:0x4656e7 [ 113.386250][T10884] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.406536][T10884] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 113.415287][T10884] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 113.423854][T10884] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 113.432127][T10884] RBP: 00007f0cfa4b6040 R08: 0000000000000000 R09: ffffffffffffffff [ 113.440220][T10884] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 12:59:15 executing program 4: clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:15 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 113.448180][T10884] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:15 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)={0x30, r3, 0x701, 0x0, 0x0, {{}, {@val={0x8, 0x117}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)={0x1c, 0x0, 0x5, 0x0, 0x0, {{0x8}, {@val={0x8, 0x3, r4}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r3, 0x720, 0x70bd27, 0x25dfdbff, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x10000, 0x1b}}}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x9}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x3c}]}, 0x38}, 0x1, 0x0, 0x0, 0x2402c841}, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:15 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:15 executing program 4: clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 113.537423][T10912] loop1: detected capacity change from 0 to 4 [ 113.551534][T10912] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:15 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000640)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000240)=""/207, 0xcf}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000540)=""/198, 0xc6}, {&(0x7f0000000480)=""/140, 0x8c}, {&(0x7f0000000700)=""/231, 0xe7}, {&(0x7f0000000800)=""/230, 0xe6}], 0x8, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:15 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:15 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, 0x0, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 113.669545][T10947] loop5: detected capacity change from 0 to 4 [ 113.694339][T10947] FAULT_INJECTION: forcing a failure. [ 113.694339][T10947] name failslab, interval 1, probability 0, space 0, times 0 [ 113.707436][T10947] CPU: 1 PID: 10947 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 113.716292][T10947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.726437][T10947] Call Trace: [ 113.729711][T10947] dump_stack+0x137/0x19d [ 113.734142][T10947] should_fail+0x23c/0x250 [ 113.738562][T10947] ? __es_insert_extent+0x51f/0xe70 [ 113.743851][T10947] __should_failslab+0x81/0x90 [ 113.749098][T10947] should_failslab+0x5/0x20 [ 113.753590][T10947] kmem_cache_alloc+0x46/0x2f0 [ 113.758425][T10947] __es_insert_extent+0x51f/0xe70 [ 113.763532][T10947] ? ext4_ext_map_blocks+0x10a8/0x1f00 [ 113.768978][T10947] ext4_es_insert_extent+0x1bb/0x19d0 [ 113.774422][T10947] ? percpu_counter_add_batch+0x69/0xd0 [ 113.780128][T10947] ? ext4_es_lookup_extent+0x206/0x490 [ 113.786058][T10947] ext4_map_blocks+0xa4c/0xef0 [ 113.791652][T10947] ext4_getblk+0xb1/0x3d0 [ 113.796080][T10947] ext4_bread+0x28/0x130 [ 113.800305][T10947] ext4_append+0xd1/0x1c0 [ 113.804916][T10947] ext4_init_new_dir+0x177/0x500 [ 113.809967][T10947] ext4_mkdir+0x329/0x760 [ 113.814538][T10947] vfs_mkdir+0x2a4/0x370 [ 113.818781][T10947] do_mkdirat+0x11d/0x200 [ 113.823193][T10947] __x64_sys_mkdir+0x32/0x40 [ 113.827775][T10947] do_syscall_64+0x4a/0x90 [ 113.832772][T10947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 113.839377][T10947] RIP: 0033:0x4656e7 [ 113.843285][T10947] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.862993][T10947] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 113.871658][T10947] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 113.879992][T10947] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 113.888139][T10947] RBP: 00007f0cfa4b6040 R08: 0000000000000000 R09: ffffffffffffffff [ 113.896543][T10947] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 113.905221][T10947] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 113.915806][T10951] loop1: detected capacity change from 0 to 4 [ 113.933997][T10886] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 113.945061][T10886] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 113.964350][T10951] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 113.964577][T10886] EXT4-fs (loop2): mount failed [ 113.987235][T10947] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:15 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:15 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, 0x0, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:15 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:15 executing program 0: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x29, 0x0, 0x3, 0x2698, 0x16, @mcast2, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x7, 0x7800, 0x3bdf, 0x101}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/567, @ANYRES16=r2, @ANYBLOB="010000000000000000000c00000014000380100003800c00018008000100000000000c00018008000100", @ANYRES32=r4, @ANYBLOB], 0x34}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000001c0)={0x34, r6, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x34}}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)={0x368, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xf0}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x34, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r0}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000200}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}]}}]}, 0x368}, 0x1, 0x0, 0x0, 0x20040000}, 0x4) r9 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r10 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r10, 0x0) preadv(r10, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r9, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 114.020049][T10951] loop1: detected capacity change from 0 to 4 12:59:15 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, 0x0, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:16 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 114.051870][T10951] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 114.088691][T10975] loop2: detected capacity change from 0 to 4096 12:59:16 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000140)=""/254, 0xfe}], 0x1, 0xda1, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 114.125587][T10980] loop5: detected capacity change from 0 to 4 [ 114.133423][T10980] FAULT_INJECTION: forcing a failure. [ 114.133423][T10980] name failslab, interval 1, probability 0, space 0, times 0 [ 114.146525][T10980] CPU: 0 PID: 10980 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 114.154425][T10975] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 114.155541][T10980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.155553][T10980] Call Trace: [ 114.155560][T10980] dump_stack+0x137/0x19d [ 114.166461][T10975] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 114.177626][T10980] should_fail+0x23c/0x250 [ 114.177652][T10980] ? __se_sys_mount+0x4e/0x2e0 [ 114.177668][T10980] __should_failslab+0x81/0x90 [ 114.183379][T10975] EXT4-fs (loop2): mount failed [ 114.185607][T10980] should_failslab+0x5/0x20 [ 114.185630][T10980] __kmalloc_track_caller+0x64/0x340 [ 114.230389][T10980] ? strnlen_user+0x137/0x1c0 [ 114.235845][T10980] strndup_user+0x73/0x120 [ 114.240729][T10980] __se_sys_mount+0x4e/0x2e0 [ 114.245707][T10980] ? mntput+0x45/0x70 [ 114.249905][T10980] ? do_mkdirat+0x1c7/0x200 [ 114.254615][T10980] __x64_sys_mount+0x63/0x70 [ 114.259296][T10980] do_syscall_64+0x4a/0x90 [ 114.263738][T10980] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 114.269824][T10980] RIP: 0033:0x467afa [ 114.273703][T10980] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.294194][T10980] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 114.303524][T10980] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 114.312081][T10980] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 114.320144][T10980] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 114.328887][T10980] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 114.337490][T10980] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:16 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:16 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000221000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f000023b000/0x2000)=nil) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:16 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0), 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:16 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 114.462082][T11014] loop1: detected capacity change from 0 to 4 [ 114.472244][T11019] loop5: detected capacity change from 0 to 4 [ 114.481589][T11021] loop2: detected capacity change from 0 to 4096 [ 114.495462][T11019] FAULT_INJECTION: forcing a failure. [ 114.495462][T11019] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 114.509315][T11019] CPU: 0 PID: 11019 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 114.518184][T11019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.528443][T11019] Call Trace: [ 114.532081][T11019] dump_stack+0x137/0x19d [ 114.536503][T11019] should_fail+0x23c/0x250 [ 114.540956][T11019] should_fail_usercopy+0x16/0x20 [ 114.545974][T11019] _copy_from_user+0x1c/0xd0 [ 114.550549][T11019] strndup_user+0xb0/0x120 [ 114.555073][T11019] __se_sys_mount+0x4e/0x2e0 [ 114.559733][T11019] ? mntput+0x45/0x70 [ 114.563711][T11019] ? __fpregs_load_activate+0x103/0x1b0 [ 114.569375][T11019] __x64_sys_mount+0x63/0x70 [ 114.574008][T11019] do_syscall_64+0x4a/0x90 [ 114.578567][T11019] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 114.584547][T11019] RIP: 0033:0x467afa [ 114.588527][T11019] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.608347][T11019] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 114.617382][T11019] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 114.625440][T11019] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 114.633855][T11019] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 114.641902][T11019] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 114.650401][T11019] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:16 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/96, 0x60) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)={'syz1', "b9b1a75eb57c202723c45c58088b74c55ea51cffc240c9549666826aedd4fb9384ccd4e9bfb77bdf8ca8fa048cfcda3fc33552a9f10345e4d15bb3144c0c2843cb83116732695e9d831fdd48d1c2f1f53a56157c89c12870976de40d775f717d2d89396191c1a8a1e146136d4c96db16674c9a83fe52ed33139763a7fa46e3d7c2a32bc4785ed7a95f328fa540689ad6d6b2ca1b95ab8ee547c15ff31b25622f123ab00697a9bb1bd6ed57bd28eeff2255bc06554011527d29a0412bce9d40187730a5439322cfc6c83c203037273511bf3c9b37"}, 0xd8) 12:59:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0), 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 114.668793][T11014] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:16 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:16 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x12, 0x7f, 0x10, 0x9, 0x1, 0x3e, 0x779, 0x228, 0x40, 0xf7, 0xc59, 0x303, 0x38, 0x1, 0xfffb, 0x7, 0x400}, [{0x2, 0x0, 0x4, 0x100, 0x2, 0x4, 0x1, 0xf4}], "14f3c4741dd4e0c3c835f886507bf7a6652db81858c3c5de6214139f0a5bf7ff68dc2693e30ad326fe9ca07642a049086f6390feb05cbd57a73826f07c3749ace1ca7ddd6c2d967c89cedf935bb01a2d51fb452a2f0b6749a866e5020f299a7840c82ae9613d8693", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6e0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:16 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 114.757038][T11014] loop1: detected capacity change from 0 to 4 [ 114.766714][T11014] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 114.802600][T11063] loop5: detected capacity change from 0 to 4 [ 114.808534][T11062] loop2: detected capacity change from 0 to 4096 [ 114.819793][T11063] FAULT_INJECTION: forcing a failure. [ 114.819793][T11063] name failslab, interval 1, probability 0, space 0, times 0 [ 114.832708][T11063] CPU: 1 PID: 11063 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 114.842021][T11063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.852395][T11063] Call Trace: [ 114.855770][T11063] dump_stack+0x137/0x19d [ 114.860200][T11063] should_fail+0x23c/0x250 [ 114.864934][T11063] ? __se_sys_mount+0x91/0x2e0 [ 114.870111][T11063] __should_failslab+0x81/0x90 [ 114.874905][T11063] should_failslab+0x5/0x20 [ 114.880059][T11063] __kmalloc_track_caller+0x64/0x340 [ 114.885805][T11063] ? strnlen_user+0x137/0x1c0 [ 114.890578][T11063] strndup_user+0x73/0x120 [ 114.895202][T11063] __se_sys_mount+0x91/0x2e0 [ 114.899012][T11062] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 114.900255][T11063] ? mntput+0x45/0x70 [ 114.900281][T11063] ? __fpregs_load_activate+0x103/0x1b0 [ 114.911082][T11062] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 114.915174][T11063] __x64_sys_mount+0x63/0x70 [ 114.939619][T11063] do_syscall_64+0x4a/0x90 [ 114.944047][T11063] entry_SYSCALL_64_after_hwframe+0x44/0xae 12:59:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0), 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:16 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000300)={0xfffffffffffffffc, 0x4, &(0x7f00000002c0)={0x0}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0/file0\x00', 0xe8, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="50d434c4717a5c951b2d00e563f4b74631075d6470092d2229deda821f5b587031914326e2f3bfa5d1630e554ea9f72b79e3035adbbb3d487bb92af0ee026e8e496b296c29484ec58f9d8e3defa3348f50a103d16fe48c71546ec1abe75c9cb496e380ef0ff643736d8eccb633dcf1ffa0bb12f7ea708c35e1405fe4457f2d2c83371a32938c234fb9fad0cff93e6ae2bab2ad5aae45133997e0c4bdc398f5187e95a60bed6dd030d0f8e6bc72dd68d9e7695b8c1951ac052269fbdbd7b9fca4167f83", 0xc3, 0x7}, {&(0x7f0000000340)="4227c58e4047bc5d6f91354a127bac3da2e83c1a83aba52f27f16f92833857b40c3b52154a0b952159602c9a4d085611b1e1240f4461e2a199ae35afd4e4ee5b1fffaf6a13a4f951da7838d49cacfeb64d674b2a11915a9b2bda3a83497a7465b017068b0e2e818e8c546c4238bd66378faebb6bfe1bb3585739787f95c4fd53eb", 0x81}], 0x438, &(0x7f0000000480)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x34, 0x3a]}}}}, {@huge_always}, {@nr_blocks={'nr_blocks', 0x3d, [0x5b, 0x31, 0x65]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x33, 0x67, 0x6b, 0x2d]}}, {@mode}, {@uid={'uid', 0x3d, 0xee01}}], [{@fsmagic={'fsmagic', 0x3d, 0x7}}, {@smackfsfloor}, {@smackfstransmute={'smackfstransmute', 0x3d, '..$^#[}(-\\)*\\!:('}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) r4 = syz_io_uring_complete(0x0) sendmsg$NFT_MSG_GETGEN(r4, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x417d05bf4784d3c9, 0x0, 0x8}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) r5 = openat(r3, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000197000/0x4000)=nil, 0x4000, 0x1800005, 0x810, r5, 0x4000) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r6, 0x4008f510, &(0x7f0000000280)=0x2) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 114.950032][T11063] RIP: 0033:0x467afa [ 114.954140][T11063] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.974595][T11063] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 114.982561][T11062] EXT4-fs (loop2): mount failed [ 114.983298][T11063] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 114.983313][T11063] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 114.983324][T11063] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 115.012671][T11063] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 115.020678][T11063] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:17 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 115.046943][T11087] loop1: detected capacity change from 0 to 4 [ 115.060230][T11087] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:17 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 115.127015][T11087] loop1: detected capacity change from 0 to 4 [ 115.152230][T11087] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 115.166612][T11114] loop2: detected capacity change from 0 to 4096 12:59:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 115.180257][T11121] loop5: detected capacity change from 0 to 4 [ 115.187776][T11121] FAULT_INJECTION: forcing a failure. [ 115.187776][T11121] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 115.201603][T11121] CPU: 1 PID: 11121 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 115.210734][T11121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.221054][T11121] Call Trace: [ 115.224415][T11121] dump_stack+0x137/0x19d [ 115.228755][T11121] should_fail+0x23c/0x250 [ 115.233173][T11121] should_fail_usercopy+0x16/0x20 [ 115.238476][T11121] _copy_from_user+0x1c/0xd0 [ 115.243181][T11121] strndup_user+0xb0/0x120 [ 115.247760][T11121] __se_sys_mount+0x91/0x2e0 [ 115.252390][T11121] ? mntput+0x45/0x70 [ 115.256457][T11121] ? __fpregs_load_activate+0x103/0x1b0 [ 115.262204][T11121] __x64_sys_mount+0x63/0x70 [ 115.266899][T11121] do_syscall_64+0x4a/0x90 [ 115.271371][T11121] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 115.277383][T11121] RIP: 0033:0x467afa [ 115.281359][T11121] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.302513][T11121] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 115.311012][T11121] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 115.319185][T11121] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 115.327152][T11121] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 115.335458][T11121] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 115.343711][T11121] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 115.361441][T11114] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 12:59:17 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) mmap(&(0x7f000055c000/0x3000)=nil, 0x3000, 0x1, 0x40010, r1, 0xc5b11000) 12:59:17 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 115.372129][T11114] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 12:59:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:17 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x848c1, 0x0) openat(r2, &(0x7f0000000140)='./file0/file0\x00', 0x880, 0x140) openat(r1, &(0x7f0000000080)='./file0\x00', 0x2080, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 115.455279][T11153] loop5: detected capacity change from 0 to 4 [ 115.497802][T11153] FAULT_INJECTION: forcing a failure. [ 115.497802][T11153] name failslab, interval 1, probability 0, space 0, times 0 [ 115.511261][T11153] CPU: 0 PID: 11153 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 115.520369][T11153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.527999][T11114] EXT4-fs (loop2): mount failed [ 115.530965][T11153] Call Trace: [ 115.530974][T11153] dump_stack+0x137/0x19d [ 115.530997][T11153] should_fail+0x23c/0x250 [ 115.548208][T11153] __should_failslab+0x81/0x90 [ 115.553159][T11153] ? __se_sys_mount+0xf2/0x2e0 [ 115.557954][T11153] should_failslab+0x5/0x20 [ 115.562456][T11153] kmem_cache_alloc_trace+0x49/0x310 [ 115.568012][T11153] ? _copy_from_user+0x94/0xd0 [ 115.572952][T11153] __se_sys_mount+0xf2/0x2e0 [ 115.577714][T11153] ? mntput+0x45/0x70 [ 115.581884][T11153] ? do_mkdirat+0x1c7/0x200 [ 115.586396][T11153] __x64_sys_mount+0x63/0x70 [ 115.591412][T11153] do_syscall_64+0x4a/0x90 12:59:17 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x8c) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 115.595920][T11153] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 115.601821][T11153] RIP: 0033:0x467afa [ 115.605872][T11153] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.625732][T11153] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 115.634233][T11153] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa 12:59:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:17 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 115.642212][T11153] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 115.650283][T11153] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 115.658238][T11153] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 115.666572][T11153] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:17 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 115.762811][T11185] loop5: detected capacity change from 0 to 4 [ 115.780987][T11189] loop2: detected capacity change from 0 to 4096 [ 115.782316][T11185] FAULT_INJECTION: forcing a failure. [ 115.782316][T11185] name failslab, interval 1, probability 0, space 0, times 0 [ 115.800621][T11185] CPU: 1 PID: 11185 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 115.809398][T11185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.819630][T11185] Call Trace: [ 115.823005][T11185] dump_stack+0x137/0x19d [ 115.827464][T11185] should_fail+0x23c/0x250 [ 115.831887][T11185] __should_failslab+0x81/0x90 [ 115.836668][T11185] ? __se_sys_mount+0xf2/0x2e0 [ 115.841526][T11185] should_failslab+0x5/0x20 [ 115.846394][T11185] kmem_cache_alloc_trace+0x49/0x310 [ 115.852060][T11185] ? _copy_from_user+0x94/0xd0 [ 115.857148][T11185] __se_sys_mount+0xf2/0x2e0 [ 115.861946][T11185] ? mntput+0x45/0x70 [ 115.866294][T11185] ? __fpregs_load_activate+0x103/0x1b0 [ 115.871957][T11185] __x64_sys_mount+0x63/0x70 [ 115.876642][T11185] do_syscall_64+0x4a/0x90 [ 115.881054][T11185] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 115.887702][T11185] RIP: 0033:0x467afa [ 115.892062][T11185] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:59:17 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setflags(r2, 0x2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 115.912593][T11185] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 115.921189][T11185] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 115.929614][T11185] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 115.938249][T11185] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 115.946826][T11185] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 115.954965][T11185] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 115.964070][T11191] loop1: detected capacity change from 0 to 4 [ 115.980219][T11189] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 115.991627][T11189] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 116.017695][T11191] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 116.049906][T11189] EXT4-fs (loop2): mount failed [ 116.085685][T11191] loop1: detected capacity change from 0 to 4 [ 116.092516][T11191] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:18 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:18 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000140)=""/232, 0xe8}, {&(0x7f0000000240)=""/238, 0xee}], 0x3, 0x3, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:18 executing program 5 (fault-call:0 fault-nth:45): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:18 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 116.173108][T11242] loop2: detected capacity change from 0 to 4096 [ 116.187628][T11242] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 116.195040][T11252] loop1: detected capacity change from 0 to 4 [ 116.198471][T11242] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 12:59:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:18 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 116.219561][T11252] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 116.241770][T11242] EXT4-fs (loop2): mount failed [ 116.245241][T11262] loop5: detected capacity change from 0 to 4 12:59:18 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 116.289579][T11252] loop1: detected capacity change from 0 to 4 [ 116.296911][T11262] FAULT_INJECTION: forcing a failure. [ 116.296911][T11262] name failslab, interval 1, probability 0, space 0, times 0 [ 116.309813][T11262] CPU: 0 PID: 11262 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 116.318973][T11262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.329299][T11262] Call Trace: [ 116.332793][T11262] dump_stack+0x137/0x19d [ 116.337203][T11262] should_fail+0x23c/0x250 [ 116.341619][T11262] ? getname_flags+0x84/0x3d0 [ 116.346297][T11262] __should_failslab+0x81/0x90 [ 116.351057][T11262] should_failslab+0x5/0x20 [ 116.355593][T11262] kmem_cache_alloc+0x46/0x2f0 [ 116.360601][T11262] getname_flags+0x84/0x3d0 [ 116.365379][T11262] ? should_fail+0xd6/0x250 [ 116.369900][T11262] user_path_at_empty+0x28/0x50 [ 116.374823][T11262] __se_sys_mount+0x209/0x2e0 [ 116.379571][T11262] ? mntput+0x45/0x70 [ 116.384595][T11262] ? __fpregs_load_activate+0x103/0x1b0 [ 116.390295][T11262] __x64_sys_mount+0x63/0x70 [ 116.395231][T11262] do_syscall_64+0x4a/0x90 [ 116.399925][T11262] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 116.405998][T11262] RIP: 0033:0x467afa [ 116.409876][T11262] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.429640][T11262] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 12:59:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:18 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f000066c000/0x1000)=nil, 0x1000, 0x1, 0x50, r1, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000001600)) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = accept$unix(r3, &(0x7f00000016c0)=@abs, &(0x7f0000001680)=0x6e) preadv(r4, &(0x7f0000001580)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000240)=""/145, 0x91}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000000300)=""/135, 0x87}, {&(0x7f00000003c0)=""/63, 0x3f}, {&(0x7f0000001480)=""/217, 0xd9}], 0x6, 0xeefd, 0xffff) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000400)=""/37, 0x25}], 0x1, 0xffffffff, 0x0) [ 116.438120][T11262] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 116.446156][T11262] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 116.454446][T11262] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 116.462601][T11262] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 116.471267][T11262] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 116.503373][T11285] loop2: detected capacity change from 0 to 4096 [ 116.543867][T11285] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 116.554924][T11285] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 116.569854][T11285] EXT4-fs (loop2): mount failed [ 116.583141][T11252] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:18 executing program 5 (fault-call:0 fault-nth:46): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:18 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:18 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800007, 0x2010, r1, 0x726be000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup3(r1, r1, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:18 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:18 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 116.685436][T11323] loop2: detected capacity change from 0 to 4096 [ 116.703139][T11314] loop5: detected capacity change from 0 to 4 [ 116.713040][T11314] FAULT_INJECTION: forcing a failure. [ 116.713040][T11314] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.726729][T11314] CPU: 0 PID: 11314 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 116.735790][T11314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.746119][T11314] Call Trace: [ 116.749494][T11314] dump_stack+0x137/0x19d [ 116.754343][T11314] should_fail+0x23c/0x250 [ 116.758861][T11314] should_fail_usercopy+0x16/0x20 [ 116.764139][T11314] strncpy_from_user+0x21/0x250 [ 116.769090][T11314] getname_flags+0xb8/0x3d0 [ 116.773666][T11314] ? should_fail+0xd6/0x250 [ 116.778361][T11314] user_path_at_empty+0x28/0x50 [ 116.783435][T11314] __se_sys_mount+0x209/0x2e0 [ 116.788211][T11314] ? mntput+0x45/0x70 [ 116.792297][T11314] ? __fpregs_load_activate+0x103/0x1b0 [ 116.798011][T11314] __x64_sys_mount+0x63/0x70 [ 116.802627][T11314] do_syscall_64+0x4a/0x90 [ 116.807261][T11314] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 116.811994][T11330] loop1: detected capacity change from 0 to 4 [ 116.815357][T11314] RIP: 0033:0x467afa [ 116.815377][T11314] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.815393][T11314] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 116.854365][T11314] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 116.862436][T11314] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 116.870609][T11314] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 12:59:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 116.878955][T11314] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 116.887585][T11314] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 116.920501][T11323] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 12:59:18 executing program 5 (fault-call:0 fault-nth:47): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:18 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4(r4, &(0x7f0000000080)=@isdn, &(0x7f0000000100)=0x80, 0x80000) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000001500)={0x9, 0x20, 0x85d}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @remote}, {0x2, 0x0, @local}, {0x2, 0x0, @rand_addr=0x64410102}, 0x26, 0x0, 0x0, 0x0, 0x1}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f0000000200)={"ff05bfc5246290f74f34255d5deb34ea", 0x0, 0x0, {0x100000000, 0x2}, {0x3a, 0x2}, 0xffffffffffffffe0, [0x2, 0x3, 0x20d5, 0x3ff, 0x1, 0x1f, 0x1, 0x8, 0xffff, 0x8001, 0xed, 0x6, 0x9, 0x2, 0x5, 0x9]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001580)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f0000000500)={"6f19c0e001c5c041829554fa580d8877", r5, r6, {0xf0, 0x40}, {0x5, 0x3d27}, 0x9, [0xff, 0x1000000000, 0x8, 0x1, 0xffffffffffff021f, 0x1, 0x7ff, 0x6, 0x1, 0x1, 0x4, 0x8, 0x4, 0xffffffff, 0x4, 0x90e4]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000002c0)={{r3}, r6, 0x10, @unused=[0x0, 0xaba2, 0xffffffffffffff00, 0xfff], @devid}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000300)={{r2}, r6, 0x18, @unused=[0x100000000004, 0x3b, 0x8, 0x72], @subvolid=0x200}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000140)={"47cadfc89e93b17c9dc730c3c01eb9c2", 0x0, r6, {0x9, 0x200}, {0x4379, 0x1f}, 0xbf, [0x1f, 0x5, 0x0, 0xfff, 0x0, 0x6, 0xa72, 0x2, 0x0, 0x3f, 0x4, 0x2, 0x2, 0x6, 0x7fffffff, 0x2]}) r7 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x1cd102, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001fc0)=""/4096) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000080)=0x800, 0x4) 12:59:18 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r1, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r2, 0x4, 0x4000) setsockopt$inet_tcp_int(r2, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r2, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r2, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r2) [ 116.983636][T11323] EXT4-fs (loop2): mount failed 12:59:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 117.033964][T11363] loop5: detected capacity change from 0 to 4 [ 117.050089][T11363] FAULT_INJECTION: forcing a failure. [ 117.050089][T11363] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 117.063848][T11363] CPU: 0 PID: 11363 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 117.073096][T11363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 12:59:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r1, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r2, 0x4, 0x4000) setsockopt$inet_tcp_int(r2, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r2, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r2, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r2) [ 117.083248][T11363] Call Trace: [ 117.086736][T11363] dump_stack+0x137/0x19d [ 117.091175][T11363] should_fail+0x23c/0x250 [ 117.096122][T11363] should_fail_usercopy+0x16/0x20 [ 117.100026][T11330] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 117.101415][T11363] strncpy_from_user+0x21/0x250 [ 117.101442][T11363] getname_flags+0xb8/0x3d0 [ 117.120225][T11363] ? should_fail+0xd6/0x250 [ 117.124823][T11363] user_path_at_empty+0x28/0x50 [ 117.129703][T11363] __se_sys_mount+0x209/0x2e0 [ 117.134386][T11363] ? mntput+0x45/0x70 [ 117.138618][T11363] ? __fpregs_load_activate+0x103/0x1b0 [ 117.144792][T11363] __x64_sys_mount+0x63/0x70 [ 117.149808][T11363] do_syscall_64+0x4a/0x90 [ 117.154508][T11363] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.161056][T11363] RIP: 0033:0x467afa [ 117.165057][T11363] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.185823][T11363] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 117.194824][T11363] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 117.202794][T11363] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 117.210816][T11363] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 117.219130][T11363] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 117.227374][T11363] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 117.289654][T11330] loop1: detected capacity change from 0 to 4 [ 117.315082][T11330] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:19 executing program 0: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000080), 0x0, 0xd9f, 0x0) r1 = memfd_create(&(0x7f00000000c0)='/\x00', 0x6) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000180)=""/30, 0x1e}], 0x2, 0xffffffff, 0x0) 12:59:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:19 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r1, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r2, 0x4, 0x4000) setsockopt$inet_tcp_int(r2, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r2, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r2, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r2) 12:59:19 executing program 5 (fault-call:0 fault-nth:48): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 117.402132][T11408] loop1: detected capacity change from 0 to 4 [ 117.408655][T11407] loop2: detected capacity change from 0 to 4096 [ 117.419020][T11414] loop5: detected capacity change from 0 to 4 [ 117.422264][T11408] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 117.445883][T11414] FAULT_INJECTION: forcing a failure. [ 117.445883][T11414] name failslab, interval 1, probability 0, space 0, times 0 [ 117.459028][T11414] CPU: 1 PID: 11414 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 117.467927][T11414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.478572][T11414] Call Trace: [ 117.481941][T11414] dump_stack+0x137/0x19d [ 117.484352][T11407] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 12:59:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:19 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mknodat(r2, &(0x7f00000000c0)='./file0\x00', 0x20, 0x5) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x149400, 0x40) [ 117.486321][T11414] should_fail+0x23c/0x250 [ 117.504896][T11414] __should_failslab+0x81/0x90 [ 117.509764][T11414] ? alloc_fs_context+0x46/0x500 [ 117.515068][T11414] should_failslab+0x5/0x20 [ 117.519579][T11414] kmem_cache_alloc_trace+0x49/0x310 [ 117.523041][T11407] EXT4-fs (loop2): mount failed [ 117.525230][T11414] alloc_fs_context+0x46/0x500 [ 117.535043][T11414] ? strncmp+0x34/0x70 [ 117.539257][T11414] fs_context_for_mount+0x1d/0x20 [ 117.544436][T11414] path_mount+0xdf5/0x1ce0 [ 117.549628][T11414] __se_sys_mount+0x23d/0x2e0 [ 117.554391][T11414] ? mntput+0x45/0x70 [ 117.558537][T11414] ? __fpregs_load_activate+0x103/0x1b0 [ 117.564128][T11414] __x64_sys_mount+0x63/0x70 [ 117.568774][T11414] do_syscall_64+0x4a/0x90 [ 117.573384][T11414] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.579390][T11414] RIP: 0033:0x467afa [ 117.583336][T11414] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.603386][T11414] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 117.612266][T11414] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 117.620600][T11414] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 117.628831][T11414] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 117.637143][T11414] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 12:59:19 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:19 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 117.645521][T11414] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 117.663224][T11408] loop1: detected capacity change from 0 to 4 [ 117.670180][T11408] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:19 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000080)=[{r1, 0x228}, {0xffffffffffffffff, 0x8168}, {r1, 0x1000}, {r0}], 0x4, &(0x7f0000000140)={r2, r3+10000000}, &(0x7f0000000180)={[0x5]}, 0x8) 12:59:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 117.746370][T11464] loop5: detected capacity change from 0 to 4 [ 117.754027][T11464] FAULT_INJECTION: forcing a failure. [ 117.754027][T11464] name failslab, interval 1, probability 0, space 0, times 0 [ 117.767018][T11464] CPU: 0 PID: 11464 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 117.772969][T11459] loop2: detected capacity change from 0 to 4096 [ 117.776542][T11464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.793589][T11464] Call Trace: [ 117.797045][T11464] dump_stack+0x137/0x19d [ 117.801737][T11464] should_fail+0x23c/0x250 [ 117.806217][T11464] ? vfs_parse_fs_string+0x5e/0xc0 [ 117.811860][T11464] __should_failslab+0x81/0x90 [ 117.816801][T11464] should_failslab+0x5/0x20 [ 117.821492][T11464] __kmalloc_track_caller+0x64/0x340 [ 117.827122][T11464] kmemdup_nul+0x27/0x70 [ 117.831427][T11464] vfs_parse_fs_string+0x5e/0xc0 [ 117.836749][T11464] path_mount+0xf99/0x1ce0 [ 117.841248][T11464] __se_sys_mount+0x23d/0x2e0 [ 117.846097][T11464] ? __schedule+0x427/0x5b0 [ 117.850815][T11464] ? __fpregs_load_activate+0x103/0x1b0 [ 117.856574][T11464] __x64_sys_mount+0x63/0x70 [ 117.861158][T11464] do_syscall_64+0x4a/0x90 [ 117.865867][T11464] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.872141][T11464] RIP: 0033:0x467afa [ 117.876135][T11464] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.897495][T11464] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 117.906190][T11464] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 117.915565][T11464] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 117.923876][T11464] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 117.931974][T11464] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 117.940224][T11464] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 117.968520][T11473] loop1: detected capacity change from 0 to 4 [ 117.978259][T11473] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 117.993008][T11459] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 12:59:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:19 executing program 5 (fault-call:0 fault-nth:50): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 118.014244][T11459] EXT4-fs (loop2): mount failed [ 118.020783][T11473] loop1: detected capacity change from 0 to 4 [ 118.035208][T11473] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 118.105248][T11504] loop5: detected capacity change from 0 to 4 [ 118.113214][T11504] FAULT_INJECTION: forcing a failure. [ 118.113214][T11504] name failslab, interval 1, probability 0, space 0, times 0 [ 118.126746][T11504] CPU: 1 PID: 11504 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 118.135843][T11504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.147197][T11504] Call Trace: [ 118.151166][T11504] dump_stack+0x137/0x19d [ 118.155912][T11504] should_fail+0x23c/0x250 [ 118.160428][T11504] ? vfs_parse_fs_string+0x5e/0xc0 [ 118.165815][T11504] __should_failslab+0x81/0x90 [ 118.170864][T11504] should_failslab+0x5/0x20 [ 118.175475][T11504] __kmalloc_track_caller+0x64/0x340 [ 118.180880][T11504] kmemdup_nul+0x27/0x70 [ 118.185419][T11504] vfs_parse_fs_string+0x5e/0xc0 [ 118.191010][T11504] path_mount+0xf99/0x1ce0 [ 118.195742][T11504] __se_sys_mount+0x23d/0x2e0 [ 118.200413][T11504] ? mntput+0x45/0x70 [ 118.204737][T11504] ? __fpregs_load_activate+0x103/0x1b0 [ 118.210378][T11504] __x64_sys_mount+0x63/0x70 [ 118.215258][T11504] do_syscall_64+0x4a/0x90 [ 118.219837][T11504] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 118.225795][T11504] RIP: 0033:0x467afa [ 118.229793][T11504] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.250373][T11504] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 118.259154][T11504] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 118.268311][T11504] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 118.277155][T11504] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 118.285877][T11504] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 118.296177][T11504] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:20 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:20 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:20 executing program 5 (fault-call:0 fault-nth:51): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 118.439652][T11523] loop5: detected capacity change from 0 to 4 [ 118.447641][T11523] FAULT_INJECTION: forcing a failure. [ 118.447641][T11523] name failslab, interval 1, probability 0, space 0, times 0 [ 118.460849][T11523] CPU: 0 PID: 11523 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 118.469888][T11523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.480826][T11523] Call Trace: [ 118.484198][T11523] dump_stack+0x137/0x19d [ 118.488955][T11523] should_fail+0x23c/0x250 [ 118.493566][T11523] ? ext4_mount+0x40/0x40 [ 118.498310][T11523] ? getname_kernel+0x37/0x1d0 [ 118.503282][T11523] __should_failslab+0x81/0x90 [ 118.508619][T11523] should_failslab+0x5/0x20 [ 118.513387][T11523] kmem_cache_alloc+0x46/0x2f0 [ 118.518168][T11523] ? avc_has_perm_noaudit+0x19a/0x240 [ 118.523799][T11523] ? ext4_mount+0x40/0x40 [ 118.528296][T11523] getname_kernel+0x37/0x1d0 [ 118.532917][T11523] ? ext4_mount+0x40/0x40 [ 118.537467][T11523] kern_path+0x19/0x40 [ 118.541641][T11523] blkdev_get_by_path+0x54/0x1b0 [ 118.546781][T11523] mount_bdev+0x47/0x290 [ 118.551187][T11523] ? ext4_errno_to_code+0x110/0x110 [ 118.557221][T11523] ext4_mount+0x2d/0x40 [ 118.561636][T11523] legacy_get_tree+0x70/0xc0 [ 118.566461][T11523] vfs_get_tree+0x4a/0x1a0 [ 118.571280][T11523] path_mount+0x11d4/0x1ce0 [ 118.575796][T11523] __se_sys_mount+0x23d/0x2e0 [ 118.580581][T11523] ? mntput+0x45/0x70 [ 118.584739][T11523] ? __fpregs_load_activate+0x103/0x1b0 [ 118.590780][T11523] __x64_sys_mount+0x63/0x70 [ 118.595524][T11523] do_syscall_64+0x4a/0x90 [ 118.600005][T11523] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 118.605924][T11523] RIP: 0033:0x467afa [ 118.610168][T11523] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.630329][T11523] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 118.639181][T11523] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 118.647639][T11523] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 118.655779][T11523] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 118.664089][T11523] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 118.672353][T11523] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:20 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) vmsplice(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)="b716dfab09d3e89742d447960baa94e94088de21d3a5231e72ec6c47fff5268c1a710ff1d63f6fdec811b3a4ba56441b21b113a68ce88aee01b4dad08d6a782527e7e01c1933b8cfdfdaa8d12e4e71c9f94066d809fc46068be6aa910b4f5f296329ecb172b23f4bdb391b016141601d1f535da8b38a85e97f611da26cb4c11d65a43b4f95a6e5d52e4c8776308f0005cbd5c723ed", 0x95}, {&(0x7f00000002c0)="787896a4b49dec9d25c6a4bff9d5bd21eecede75a8f6c419a4b17a7a9141a91fa88d253307187ef2c57f7003c91492931504d92f10fd0044142e7b21684166b59b8eb58d47bf4b8c5d5423d1259e7f540c70f640ca04ff3b312b35ae934e431e89dbf1c95573b0b1f92129976708b467bea6989e31b0614d2634f29109e428abe54aaaf9cb72dfe3172c145a9e709b3fabaa331a232be21263f03e7efc55acb08611e59f107ee9f544d7fa5114d9f30e6cb90e594709f41408edb4b53dc1fdb7a59998467c9a9677bd43c9a9c0a1be764b166c84b5267b744c45b4a25e98041b0459934709", 0xe5}, {&(0x7f0000000480)="2f63f732b6564106d27c78ee2c4f8cc031ef1a213f6ddac6e420333641f2a2731eea166a5b043fd6f9612281ce1e6f88878f85af93196c9df186a0a1a143cf3529aa3c6be6fa9ebe64e7da8035d84c407879c6a8b250692795fe03c28c3419e7d878ebd4e28bfee506a5c812e16339de5df713cd6119268d75183aef49ad22db77e93fc8c30b1dd1e4ab2fa750d6d4e2a268819db3cb6fc67fa8df7a17988bac0223d19eee91abd8ef022688d05ade565974535064726ea6f2a1408a4a383a", 0xbf}, {&(0x7f00000003c0)="9e60bafb05b4cf34daafd29e3b8e7f2b813c1e70920bdb08bebf59209fab2be899bd892659408cec2fa4f11183d7ff9c649c4fe3bf3062b85d6b79dbb396e65b368ae1ce76cc2cb7fd4d9e4d85a3704209831b414442bbad4d0658a475b3a7120b3455f73db9a08cf16185b2bc9cb4", 0x6f}, {&(0x7f00000000c0)="67a20acbbca3f32dd02e48d3b17440f762d26447d60c8701e30260ee888653ef", 0x20}, {&(0x7f0000000540)="1e20818a4635f6f5b1e4b4c95b4e982697731d7533518c3ae5bda09bd9291471775e9c4a7dafcd005fa401b60ca21e3a145b548ee2e60dc7c78df264d10a6d2bc65f0ade36bfcfc89962126b4bb2455f85ca58d8f07817dc9fda7e4439e055464766a5906d471be63baa7d4679efe4c77b17e8e10b8f4a736b8f081e31aefd1a8f90c0fd2f23834f34b0a8c2e945d3d851b273a7ef70bb6dc5e01d79a2a2b1d13e8a37e5fb16d0f59b0414f7020cea236bda96d281975cee168725d932e08e7ffdde12570ecb8843c97a6a931d5d0f4fb1fcca0695104db97ea15cc849f652afe25239", 0xe3}, {&(0x7f0000000640)="1c2a79df7e2e83c2251855e12828a8544ca3941865169f9066ed69a06954916b65c18f5180b909463773b69b9970b696c1b727a1ffd509c9295e0bb8a654b626f40058d0d40af7dd68ea6ad8811e189b1f5588ee2ab149250fbb2c9bfcf62f25b543f071c95d4acba82c8fad398a130f0c0f411328ba1e9b1b6cf583ce1b652591ffb518c65327c5de3b4ded2fb771d181fa4332be4aa79215713d9351d82bb9b226eb54ced0e13dcccffe3ac0684e05f765f19c324575b5b49957fa92eebe88fb6770e8b1bc68334e89c141b0bfb655f5274e1057645c757b91150c1b211cbad2c0c0862585942ee6424e31b8c22aac0617c2f4fca7b28ef01b2aba", 0xfc}, {&(0x7f0000000740)="b5aff8e4663a1a516f4f923ccf82ddc58080f32a16441b7e6782557b0d3f94a28407e289f04ff0f86d07331a209eb7f3dff10832d25b04d44b8b7a2f63e89fc85a0b755f3aac342b0006e2ff97aa08d968e291b5dd94f57299e733a60eccaeee", 0x60}], 0x8, 0xb) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r3, 0x80286722, &(0x7f0000000080)={&(0x7f0000000140)=""/130, 0x82, 0x8, 0x9}) 12:59:20 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:20 executing program 5 (fault-call:0 fault-nth:52): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 118.693453][T11527] loop2: detected capacity change from 0 to 4096 [ 118.718558][T11522] loop1: detected capacity change from 0 to 4 12:59:20 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) fcntl$notify(r0, 0x402, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:20 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:20 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 118.757877][T11522] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 118.828096][T11522] loop1: detected capacity change from 0 to 4 [ 118.835986][T11561] loop2: detected capacity change from 0 to 4096 [ 118.842855][T11522] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 118.854200][T11555] loop5: detected capacity change from 0 to 4 [ 118.868265][T11555] FAULT_INJECTION: forcing a failure. [ 118.868265][T11555] name failslab, interval 1, probability 0, space 0, times 0 [ 118.871840][T11561] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 118.881820][T11555] CPU: 1 PID: 11555 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 118.900688][T11561] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 118.909894][T11555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.909910][T11555] Call Trace: [ 118.909916][T11555] dump_stack+0x137/0x19d [ 118.920730][T11561] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 118.930983][T11555] should_fail+0x23c/0x250 [ 118.931008][T11555] ? kzalloc+0x1d/0x30 [ 118.931026][T11555] __should_failslab+0x81/0x90 [ 118.942696][T11561] EXT4-fs (loop2): mount failed [ 118.953912][T11555] should_failslab+0x5/0x20 [ 118.953938][T11555] __kmalloc+0x66/0x340 [ 118.953958][T11555] kzalloc+0x1d/0x30 [ 118.986943][T11555] security_sb_alloc+0x3c/0x180 [ 118.992067][T11555] alloc_super+0x10b/0x520 [ 118.996747][T11555] ? mount_bdev+0x290/0x290 [ 119.001591][T11555] sget+0x1a5/0x400 [ 119.005603][T11555] ? test_bdev_super+0x30/0x30 [ 119.010928][T11555] mount_bdev+0xd3/0x290 [ 119.015459][T11555] ? ext4_mount+0x40/0x40 [ 119.020077][T11555] ? ext4_errno_to_code+0x110/0x110 [ 119.025728][T11555] ext4_mount+0x2d/0x40 [ 119.030133][T11555] legacy_get_tree+0x70/0xc0 [ 119.034906][T11555] vfs_get_tree+0x4a/0x1a0 [ 119.039313][T11555] path_mount+0x11d4/0x1ce0 [ 119.043947][T11555] __se_sys_mount+0x23d/0x2e0 [ 119.048905][T11555] ? mntput+0x45/0x70 [ 119.053071][T11555] ? __fpregs_load_activate+0x103/0x1b0 [ 119.059198][T11555] __x64_sys_mount+0x63/0x70 [ 119.063991][T11555] do_syscall_64+0x4a/0x90 [ 119.068591][T11555] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 119.074738][T11555] RIP: 0033:0x467afa [ 119.079114][T11555] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 119.100362][T11555] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 119.109071][T11555] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 119.117388][T11555] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 12:59:21 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 119.125485][T11555] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 119.133957][T11555] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 119.142352][T11555] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 119.206938][T11578] loop2: detected capacity change from 0 to 4096 [ 119.222331][T11578] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 119.241070][T11578] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 119.253433][T11578] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 119.268978][T11578] EXT4-fs (loop2): mount failed 12:59:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:21 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x5eb4c2, 0x114, 0x12}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) vmsplice(r0, &(0x7f00000017c0)=[{&(0x7f00000003c0)="f8ef51d553657a0fecb7b716309a", 0xe}, {&(0x7f0000000480)="72b54e8a7f39ed2d4a5463d8f90a1d73695a5d0c3cb9ae241496b380935b4627e85150041a8b065ac94b84494821f520660c28f7e754141465168f40170af2a795dc86d3456418ccaffbcaf7972c789c57ffeb0c4e7a541432e9c76184e01848e8b0378fbb1a49c70978e952360bf322068375c8dddbc6081cb6343829066f927167a8bd90e8d193b1bacc8583c1696bc54d5a03c43094800bac2e955360dc41f64abe73d5fd92914fc98a9f9bbd6fdbf2e077a8e8b0db846e0ee2f3f6", 0xbd}, {&(0x7f0000000540)="818a765b068ba07c69a2ec3a3d0e1b8f908320f7a9f99aa39ee872e463a93b0ffc4ae567f1f82c9c4a64b3d45056c45a4f6764319e6e93cc6458dd7ce756d3e7facf2e9256a6092c5f6c350ac50fa1e2fc7ffc76f30b261d3f2a168fd76b29872234dc2e9329bec0508c4335fbb515c9c44ecab2e9b5c87c5434c9345f5cab0cdb69015374973d4a4cd02f9536aa6763dba1f43d6af7a12d9ae570cd3282a683096cce9e87576e4c10bf9d319f79f70e94187f371be680acac8a6600d2f7385217d269c2fa", 0xc5}, {&(0x7f0000000400)="8f83655c991cbeb723d21324a1b68a00afba0a150b191b3935bd7f4a0047295a4a93fe8909cfd2c7bf324e2af550f5d2fae2", 0x32}, {&(0x7f0000000640)="c9cd15ccb10890bb10b999b6394689eccbb444cec2df28d70053249d88e5dbc20a8e7f20a68184615c73259d75025147f0c2cd2d95d07a66543fdc30c2e2a1b263449b54ff95ffd2be2bcf2cf17811716be93072b9183f9de2a9d9fa92d808f483d4ce329fe9b91aeeab20697327918d969fce1655938de55d65f38b3f2f9dbf8d9ac5480966d204e87bbeaed700fd926e559b5db1bd67ce8483f5026300c91a2068d919292c74775825ec82fdbe69d850f50fdd67790b57367b83e2c340318ce5a0df60e51d9ac321414af731d4af22c8189f5e", 0xd4}, {&(0x7f0000000740)="160f070e481fc37c678cc35393a9a55889b98239fb79b1a24283b6733820c9cec5545b5c4311f4836a2117ba78f6c109453f17fe4ae3342c9cc7ecd3984179e56c8218d650ea7270905c5e26ab767f7011", 0x51}, {&(0x7f00000007c0)="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", 0x1000}], 0x7, 0xa) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001880), 0x121000, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r2, 0x80089419, &(0x7f0000001940)) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000001840)=0x5) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xff, 0x3, &(0x7f0000000300)=[{&(0x7f0000000140)="e09f45e9caedc6cd2acd912234be398079b4ddb89fda4e68922f0818f7281ece91c804087df7bb143a64b0d28266d6659b42ee2deb9cbe7a95f066d11e07d23b31d2cb56d054403cf6a8feee26b0662d3d50c8a45633924875d30f2fe8e5adfc3ac76ab7e5ec856641cd9e61abf91c2274d802e0ddbc02418e1c73b47df495751cf83e0d4728688bed3012dfc12cfe721e69aeca82d186ec04112c78ac827b22ba829d667961e49b3c76f96a7eaf15138916bb02f52a7db0e835386b1905f5935c71330c18b797b23d15ce3675033bea79", 0xd1, 0x2}, {&(0x7f0000000240)="f3f8fc8db4693ef416", 0x9, 0x1000}, {&(0x7f0000000280)="e581ee1680c12c5ff4cce64d3215cd6b8766ae2861f2b7479160ab7ce425a12e1b08504886955acfc9f732effc82f9c5c987525a747c71eb7d3b036b827af84068932c06342d10a5f0be2719132709bd32cb37a7f8d51bb3084155b17bf9c783201e", 0x62, 0xffffffffffffa422}], 0x8, &(0x7f0000000380)={[{}, {'&,^\\'}, {'\x13,..'}, {'[-(&-#%&'}, {'\xfa{'}, {}, {}, {'.'}, {}], [{@uid_eq={'uid', 0x3d, 0xee00}}]}) open(&(0x7f0000001900)='./file0\x00', 0x40000, 0x30224943359f8970) 12:59:21 executing program 5 (fault-call:0 fault-nth:53): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:21 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 119.554858][T11601] loop2: detected capacity change from 0 to 4096 [ 119.563509][T11600] loop5: detected capacity change from 0 to 4 [ 119.569921][T11603] loop1: detected capacity change from 0 to 4 [ 119.577813][T11602] loop0: detected capacity change from 0 to 16292 [ 119.581021][T11600] FAULT_INJECTION: forcing a failure. [ 119.581021][T11600] name failslab, interval 1, probability 0, space 0, times 0 [ 119.594716][T11602] nfs: Unknown parameter '&' [ 119.598023][T11600] CPU: 1 PID: 11600 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 119.611790][T11600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.621937][T11600] Call Trace: [ 119.625473][T11600] dump_stack+0x137/0x19d [ 119.630099][T11600] should_fail+0x23c/0x250 [ 119.634692][T11600] ? __list_lru_init+0x70/0x680 [ 119.639794][T11600] __should_failslab+0x81/0x90 [ 119.644619][T11600] should_failslab+0x5/0x20 [ 119.649416][T11600] __kmalloc+0x66/0x340 [ 119.653748][T11600] ? prealloc_memcg_shrinker+0x444/0x460 [ 119.659734][T11600] __list_lru_init+0x70/0x680 [ 119.664666][T11600] alloc_super+0x490/0x520 [ 119.669371][T11600] ? mount_bdev+0x290/0x290 [ 119.674161][T11600] sget+0x1a5/0x400 [ 119.678235][T11600] ? test_bdev_super+0x30/0x30 [ 119.683200][T11600] mount_bdev+0xd3/0x290 [ 119.687693][T11600] ? ext4_mount+0x40/0x40 [ 119.692294][T11600] ? ext4_errno_to_code+0x110/0x110 [ 119.697761][T11600] ext4_mount+0x2d/0x40 [ 119.702341][T11600] legacy_get_tree+0x70/0xc0 [ 119.707497][T11600] vfs_get_tree+0x4a/0x1a0 [ 119.711940][T11600] path_mount+0x11d4/0x1ce0 [ 119.716709][T11600] __se_sys_mount+0x23d/0x2e0 [ 119.722018][T11600] ? mntput+0x45/0x70 [ 119.726528][T11600] ? __fpregs_load_activate+0x103/0x1b0 [ 119.732183][T11600] __x64_sys_mount+0x63/0x70 [ 119.736963][T11600] do_syscall_64+0x4a/0x90 [ 119.741683][T11600] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 119.747725][T11600] RIP: 0033:0x467afa [ 119.752506][T11600] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 119.774244][T11600] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 119.783669][T11600] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 119.791989][T11600] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 119.800834][T11600] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 119.809111][T11600] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 119.817522][T11600] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 119.837574][T11603] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 119.847548][T11601] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 119.866327][T11601] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 119.877666][T11601] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 119.893132][T11601] EXT4-fs (loop2): mount failed 12:59:21 executing program 5 (fault-call:0 fault-nth:54): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:21 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:21 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x19390734c78688ad) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0x434, 0x3f4, 0x400, 0x70bd27, 0x25dfdbfe, {0x6, 0x0, 0x5, [0x1ff, 0x6, 0x4, 0x4, 0x7, 0x4, 0x9, 0xffffffc0, 0x81, 0xe2, 0x1f, 0x8001, 0x3, 0xffffff50, 0x3ff, 0x8, 0x8, 0x2438, 0x7, 0x2, 0x8, 0x1, 0x8, 0x3, 0x4, 0x81, 0x0, 0xe, 0x6, 0x401, 0x26, 0x400, 0x94, 0x0, 0x6, 0x100, 0x2, 0xf40d, 0xa, 0x6, 0xe453, 0x800, 0x3, 0x400, 0x1f, 0xc2e9, 0x401, 0xc840, 0x6, 0xffff, 0x7f, 0x1, 0x80000001, 0xc40, 0x1ff, 0x0, 0xce5, 0x0, 0x1, 0x7, 0x2, 0x0, 0x8, 0x2], [0x6, 0x2, 0x664f583, 0x8e, 0x2fc6, 0x3f2, 0x0, 0x4, 0x3, 0x3, 0x8, 0x6, 0x9, 0x10001, 0x1000, 0x5, 0x5, 0x8, 0x6, 0x0, 0xff, 0x7, 0x0, 0xdf, 0xce09, 0x0, 0x7ff, 0xfff, 0x7fff, 0x6, 0x2, 0x5, 0x80, 0x8, 0x20, 0x81, 0xbb, 0x72b, 0x9, 0x8001, 0x200, 0x7, 0x2, 0xff, 0x2, 0x5, 0x0, 0x100, 0x4, 0x7e94, 0x5f, 0x7f, 0x3f, 0xfffeffff, 0x7fff, 0x2, 0x2, 0x101, 0x1, 0x2, 0x0, 0x18, 0x9, 0x101], [0x7, 0x1, 0xf5, 0x8, 0x5c1, 0x40, 0xffffffff, 0x731dbe7d, 0x1b, 0x6, 0x5, 0x0, 0x8b8, 0xfffffffd, 0x6, 0x2bf, 0x5bb, 0x10001, 0x3, 0x20, 0x400, 0x0, 0x38, 0x4, 0x0, 0x40000000, 0x0, 0x20, 0x0, 0x100, 0x4, 0x4, 0x800, 0x6, 0x75d3, 0x40, 0x73c2, 0x7f, 0x6, 0x41, 0x1, 0x2, 0xf6, 0x0, 0x1f13, 0xffffffff, 0x7, 0x2, 0x85, 0xa0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x3, 0xa621, 0xb2, 0xa000000, 0x7882f8e4, 0x7, 0x4, 0x80000000, 0x9], [0x7ff, 0xfffffffc, 0x10001, 0x2d, 0x0, 0x0, 0xfffffffd, 0x6, 0x0, 0x9, 0x5, 0x0, 0x10001, 0x3c, 0x4, 0x10001, 0x7ff, 0x3, 0x2, 0x0, 0x9, 0x7, 0x7495, 0x8001, 0x3, 0x5, 0x7fffffff, 0x9, 0x3, 0x7, 0x8, 0x0, 0x0, 0x1, 0x81, 0xfff, 0x1, 0x3, 0x4, 0x100, 0x8, 0x8001, 0x2, 0x109, 0x5, 0x1, 0xffff, 0x8, 0x3, 0x0, 0x7fffffff, 0x6, 0x3, 0x200, 0x1, 0x1000, 0x1000, 0xbd0b, 0x4, 0x9, 0xd39, 0x6, 0x8001, 0x9], 0x12, ['\x00', '\x00', 'nl80211\x00', 'nl80211\x00']}, ["", "", "", "", ""]}, 0x434}, 0x1, 0x0, 0x0, 0x4051}, 0x20894) r1 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0107465400000000000000006700000000000000000006000800", @ANYRES32=0x0, @ANYBLOB="0c0099000000000000000000"], 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_SURVEY(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r4, 0x300, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0xffffffc0, 0x70}}}}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000810}, 0x10) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r1, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000000)="12001a00e5ff007b00000000008000a10000", 0x12, 0x24000040, 0x0, 0x0) recvmmsg(r5, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fchmod(r5, 0x0) [ 119.939777][T11603] loop1: detected capacity change from 0 to 4 [ 119.971734][T11603] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 120.009915][T11658] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1012 sclass=netlink_route_socket pid=11658 comm=syz-executor.0 [ 120.028661][T11659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1012 sclass=netlink_route_socket pid=11659 comm=syz-executor.0 [ 120.047207][T11652] loop2: detected capacity change from 0 to 4096 [ 120.055120][T11654] loop5: detected capacity change from 0 to 4 [ 120.073966][T11654] FAULT_INJECTION: forcing a failure. [ 120.073966][T11654] name failslab, interval 1, probability 0, space 0, times 0 [ 120.087753][T11654] CPU: 1 PID: 11654 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 120.096821][T11654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.107635][T11654] Call Trace: [ 120.111354][T11654] dump_stack+0x137/0x19d [ 120.115908][T11654] should_fail+0x23c/0x250 [ 120.120335][T11654] __should_failslab+0x81/0x90 [ 120.125120][T11654] should_failslab+0x5/0x20 [ 120.129621][T11654] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 120.135601][T11654] ? __list_lru_init+0x70/0x680 [ 120.140697][T11654] ? __kmalloc_node+0x30/0x40 [ 120.145826][T11654] __kmalloc_node+0x30/0x40 [ 120.150684][T11654] kvmalloc_node+0x81/0xf0 [ 120.155108][T11654] __list_lru_init+0x2d7/0x680 [ 120.160180][T11654] alloc_super+0x490/0x520 [ 120.164979][T11654] ? mount_bdev+0x290/0x290 [ 120.169764][T11654] sget+0x1a5/0x400 [ 120.173938][T11654] ? test_bdev_super+0x30/0x30 [ 120.178982][T11654] mount_bdev+0xd3/0x290 [ 120.183470][T11654] ? ext4_mount+0x40/0x40 [ 120.188343][T11654] ? ext4_errno_to_code+0x110/0x110 [ 120.193714][T11654] ext4_mount+0x2d/0x40 [ 120.198463][T11654] legacy_get_tree+0x70/0xc0 [ 120.203190][T11654] vfs_get_tree+0x4a/0x1a0 [ 120.207717][T11654] path_mount+0x11d4/0x1ce0 [ 120.212262][T11654] __se_sys_mount+0x23d/0x2e0 [ 120.217589][T11654] ? mntput+0x45/0x70 [ 120.221881][T11654] ? __fpregs_load_activate+0x103/0x1b0 [ 120.227560][T11654] __x64_sys_mount+0x63/0x70 [ 120.232276][T11654] do_syscall_64+0x4a/0x90 [ 120.236879][T11654] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 120.243437][T11654] RIP: 0033:0x467afa [ 120.247872][T11654] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 120.269062][T11654] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 120.277736][T11654] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 120.285789][T11654] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 120.293970][T11654] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 120.302169][T11654] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 120.310167][T11654] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 120.322070][T11652] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 120.341307][T11652] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 12:59:22 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000080)='j', 0x1}], 0x1, 0x3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:22 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:22 executing program 5 (fault-call:0 fault-nth:55): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 120.352386][T11652] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 120.375000][T11652] EXT4-fs (loop2): mount failed 12:59:22 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:22 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 120.435091][T11690] loop1: detected capacity change from 0 to 4 [ 120.443329][T11690] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 120.462674][T11695] loop5: detected capacity change from 0 to 4 [ 120.502105][T11695] FAULT_INJECTION: forcing a failure. [ 120.502105][T11695] name failslab, interval 1, probability 0, space 0, times 0 [ 120.515665][T11695] CPU: 0 PID: 11695 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 120.525301][T11695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.535436][T11695] Call Trace: [ 120.539002][T11695] dump_stack+0x137/0x19d [ 120.543379][T11695] should_fail+0x23c/0x250 [ 120.547956][T11695] ? __list_lru_init+0x70/0x680 [ 120.552841][T11695] __should_failslab+0x81/0x90 [ 120.557597][T11695] should_failslab+0x5/0x20 [ 120.562329][T11695] __kmalloc+0x66/0x340 [ 120.566846][T11695] __list_lru_init+0x70/0x680 [ 120.571954][T11695] alloc_super+0x4bf/0x520 [ 120.577061][T11695] ? mount_bdev+0x290/0x290 [ 120.581904][T11695] sget+0x1a5/0x400 [ 120.585738][T11695] ? test_bdev_super+0x30/0x30 [ 120.590668][T11695] mount_bdev+0xd3/0x290 [ 120.594898][T11695] ? ext4_mount+0x40/0x40 [ 120.599243][T11695] ? ext4_errno_to_code+0x110/0x110 [ 120.605411][T11695] ext4_mount+0x2d/0x40 [ 120.609843][T11695] legacy_get_tree+0x70/0xc0 [ 120.615155][T11695] vfs_get_tree+0x4a/0x1a0 [ 120.619941][T11695] path_mount+0x11d4/0x1ce0 [ 120.625113][T11695] __se_sys_mount+0x23d/0x2e0 [ 120.630167][T11695] ? mntput+0x45/0x70 [ 120.634559][T11695] ? __fpregs_load_activate+0x103/0x1b0 [ 120.640120][T11695] __x64_sys_mount+0x63/0x70 [ 120.644726][T11695] do_syscall_64+0x4a/0x90 [ 120.649696][T11695] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 120.656046][T11695] RIP: 0033:0x467afa [ 120.660309][T11695] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 120.680723][T11695] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 120.689414][T11695] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa 12:59:22 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800005, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080), 0x0, &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:22 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 120.697494][T11695] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 120.705614][T11695] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 120.713912][T11695] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 120.722362][T11695] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 120.734799][T11703] loop2: detected capacity change from 0 to 4096 12:59:22 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") 12:59:22 executing program 5 (fault-call:0 fault-nth:56): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 120.774591][T11690] loop1: detected capacity change from 0 to 4 [ 120.802079][T11690] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 120.859972][T11738] loop2: detected capacity change from 0 to 4096 [ 120.877946][T11745] loop5: detected capacity change from 0 to 4 [ 120.896440][T11745] FAULT_INJECTION: forcing a failure. [ 120.896440][T11745] name failslab, interval 1, probability 0, space 0, times 0 [ 120.910150][T11745] CPU: 0 PID: 11745 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 120.919327][T11745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.930084][T11745] Call Trace: [ 120.933415][T11745] dump_stack+0x137/0x19d [ 120.937902][T11745] should_fail+0x23c/0x250 [ 120.942604][T11745] ? __list_lru_init+0x70/0x680 [ 120.947627][T11745] __should_failslab+0x81/0x90 [ 120.952569][T11745] should_failslab+0x5/0x20 [ 120.957234][T11745] __kmalloc+0x66/0x340 [ 120.961379][T11745] __list_lru_init+0x70/0x680 [ 120.966219][T11745] alloc_super+0x4bf/0x520 [ 120.970721][T11745] ? mount_bdev+0x290/0x290 [ 120.975499][T11745] sget+0x1a5/0x400 [ 120.979335][T11745] ? test_bdev_super+0x30/0x30 [ 120.984610][T11745] mount_bdev+0xd3/0x290 [ 120.989200][T11745] ? ext4_mount+0x40/0x40 [ 120.993815][T11745] ? ext4_errno_to_code+0x110/0x110 [ 120.999398][T11745] ext4_mount+0x2d/0x40 [ 121.004229][T11745] legacy_get_tree+0x70/0xc0 [ 121.008987][T11745] vfs_get_tree+0x4a/0x1a0 [ 121.013469][T11745] path_mount+0x11d4/0x1ce0 [ 121.017965][T11745] __se_sys_mount+0x23d/0x2e0 [ 121.022748][T11745] ? mntput+0x45/0x70 [ 121.026735][T11745] ? __fpregs_load_activate+0x103/0x1b0 [ 121.032298][T11745] __x64_sys_mount+0x63/0x70 [ 121.036918][T11745] do_syscall_64+0x4a/0x90 [ 121.042559][T11745] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 121.048797][T11745] RIP: 0033:0x467afa [ 121.053114][T11745] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.073232][T11745] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 121.082153][T11745] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 121.090560][T11745] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 121.098804][T11745] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 12:59:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 121.107054][T11745] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 121.115397][T11745] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:23 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8300, 0x2d) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800007, 0x12, r1, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000016c0)=ANY=[@ANYRESHEX, @ANYRES16=r3, @ANYRESDEC, @ANYBLOB="e4b3fcdfaf28d2f54df080980ecba931899b0008000000000000074dae8564120ea7471c8734c4922298574f4a6257e44b155e19c37e446191e681261f836eaf0cef84dce214261ca313fcce6833276cb1e4ba13668bbfeb3b5024ed222970f9e1ddabb042e3695f67e387c26fa634b4d9bfda45b262ff431c6d56785cf7fed495c7f6bc172da0e3349c47edadc95de0995d0500000049c46e0d364800bdfa1bac1bbd842f1dbd4cf73f2a5311fa106c0c61b59bfa82276f2a1aadff1ad04e31a1ad41059976b940f5452f93e868863e967bd1ffb3e15179e8435815ff0fd89ad8e4342c79b161531cb1265a507536be04f68db7f3f5f5a9160f73f4e398a6d9124ba0601046b3e86acc21361d878e6571e9e04a45c29f36f02db5053b317c831eed0d97d8669da67e98acecb5cff9b219be9943a3fa223e8a66308c31da0ebaf1f7c9694bcf90738405808086e92412ad5268cecd8a4fcabeaa8a9e3899b8ebd04dee8f6c027b98e8d6ded5680c8f3f304ba1ffba8e13958fa14635aa1f0e148f76c71e5947e6b6a0c3a0c13eb5ea7b1093b689cd698e159504413068d04cb0143f702196774cef3e6a002386196b72c3629b8413448c34ac87161c7a86d108826578208ad5b5cfe76db9a141cc1e971ba511e70c061634f475947a200dfee7b012cff1d2c62d708e4f665161f2d9afab092f92d5b706d7e221c9b2add66e0b13f35b070b"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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", @ANYRES16=r3, @ANYRESDEC], 0x1d4}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000001c0)={0x0, 0x1, 0x20}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000200)={{}, 0x0, 0xe, @unused=[0x0, 0xfffffffffffeffff, 0xffffffffffff8af2, 0x4], @devid}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000200)={0x0, "b4533b4f5f87ddd4537c3d1ad60c478d"}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000001c0)={{}, 0x0, 0x8, @inherit={0x98, &(0x7f0000000100)={0x0, 0xa, 0x100, 0x47, {0x21, 0x7, 0x9, 0x10001, 0x1fa}, [0x9, 0x0, 0x2, 0x8, 0x9, 0x1ff, 0x100000001, 0x80000000, 0x238a, 0x10001]}}, @devid}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000800)={0x0, 0x6, 0x40, 0x1}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000240)={0x0, 0x6, 0x6, 0x1}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000480)={0x0, 0x7fffffff, 0x8}) quotactl(0x0, &(0x7f0000000000)='\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080), 0x0, 0x0, 0x0) 12:59:23 executing program 5 (fault-call:0 fault-nth:57): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 121.143876][T11738] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 121.162527][T11738] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 121.173780][T11738] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 121.204075][T11738] EXT4-fs (loop2): mount failed 12:59:23 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:23 executing program 0: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$vcsu(&(0x7f0000000080), 0x400, 0x8000) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x6d8040, 0x0) preadv(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/48, 0x30}, {&(0x7f0000000140)=""/135, 0x87}, {&(0x7f0000000200)=""/157, 0x9d}], 0x3, 0x1, 0x1) [ 121.243065][T11765] loop1: detected capacity change from 0 to 4 [ 121.256033][T11765] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 121.322714][T11783] loop5: detected capacity change from 0 to 4 [ 121.334991][T11765] loop1: detected capacity change from 0 to 4 [ 121.344590][T11783] FAULT_INJECTION: forcing a failure. [ 121.344590][T11783] name failslab, interval 1, probability 0, space 0, times 0 [ 121.357551][T11783] CPU: 1 PID: 11783 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 121.363602][T11765] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 121.366401][T11783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.366413][T11783] Call Trace: [ 121.366419][T11783] dump_stack+0x137/0x19d [ 121.383271][T11802] loop2: detected capacity change from 0 to 4096 [ 121.386700][T11783] should_fail+0x23c/0x250 [ 121.386724][T11783] ? ext4_fill_super+0x3d/0x8010 [ 121.410232][T11783] __should_failslab+0x81/0x90 [ 121.415321][T11783] should_failslab+0x5/0x20 [ 121.420241][T11783] __kmalloc_track_caller+0x64/0x340 [ 121.426060][T11783] ? bdev_name+0x1e1/0x240 [ 121.430513][T11783] kstrdup+0x31/0x70 [ 121.434443][T11783] ext4_fill_super+0x3d/0x8010 [ 121.436103][T11802] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 121.439307][T11783] ? vsnprintf+0xe8f/0xed0 [ 121.439332][T11783] ? snprintf+0x6f/0x90 12:59:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x0, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 121.457844][T11802] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 121.462273][T11783] ? register_shrinker_prepared+0xc2/0xd0 [ 121.462299][T11783] ? set_blocksize+0x197/0x270 [ 121.466460][T11802] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 121.477224][T11783] mount_bdev+0x1e8/0x290 [ 121.494969][T11802] EXT4-fs (loop2): mount failed [ 121.502297][T11783] ? ext4_mount+0x40/0x40 [ 121.502324][T11783] ? ext4_errno_to_code+0x110/0x110 12:59:23 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0), 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 121.522379][T11783] ext4_mount+0x2d/0x40 [ 121.526567][T11783] legacy_get_tree+0x70/0xc0 [ 121.531318][T11783] vfs_get_tree+0x4a/0x1a0 [ 121.536024][T11783] path_mount+0x11d4/0x1ce0 [ 121.540811][T11783] __se_sys_mount+0x23d/0x2e0 [ 121.540835][T11783] ? mntput+0x45/0x70 [ 121.540856][T11783] __x64_sys_mount+0x63/0x70 [ 121.540872][T11783] do_syscall_64+0x4a/0x90 [ 121.540893][T11783] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 121.540935][T11783] RIP: 0033:0x467afa [ 121.540947][T11783] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.540961][T11783] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 121.540976][T11783] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa 12:59:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:23 executing program 5 (fault-call:0 fault-nth:58): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 121.541018][T11783] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 12:59:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x0, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:23 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 121.541027][T11783] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 12:59:23 executing program 4: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/96, 0x60) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)={'syz1', "b9b1a75eb57c202723c45c58088b74c55ea51cffc240c9549666826aedd4fb9384ccd4e9bfb77bdf8ca8fa048cfcda3fc33552a9f10345e4d15bb3144c0c2843cb83116732695e9d831fdd48d1c2f1f53a56157c89c12870976de40d775f717d2d89396191c1a8a1e146136d4c96db16674c9a83fe52ed33139763a7fa46e3d7c2a32bc4785ed7a95f328fa540689ad6d6b2ca1b95ab8ee547c15ff31b25622f123ab00697a9bb1bd6ed57bd28eeff2255bc06554011527d29a0412bce9d40187730a5439322cfc6c83c203037273511bf3c9b37"}, 0xd8) 12:59:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x0, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 121.541036][T11783] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 121.541045][T11783] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 121.729892][T11839] loop5: detected capacity change from 0 to 4 [ 121.731294][T11839] FAULT_INJECTION: forcing a failure. 12:59:23 executing program 5 (fault-call:0 fault-nth:59): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 121.731294][T11839] name failslab, interval 1, probability 0, space 0, times 0 [ 121.731316][T11839] CPU: 0 PID: 11839 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 121.731336][T11839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.731392][T11839] Call Trace: [ 121.731397][T11839] dump_stack+0x137/0x19d 12:59:23 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 121.731419][T11839] should_fail+0x23c/0x250 [ 121.731437][T11839] __should_failslab+0x81/0x90 [ 121.731459][T11839] ? ext4_fill_super+0x62/0x8010 [ 121.731481][T11839] should_failslab+0x5/0x20 [ 121.731497][T11839] kmem_cache_alloc_trace+0x49/0x310 [ 121.731568][T11839] ext4_fill_super+0x62/0x8010 [ 121.731585][T11839] ? vsnprintf+0xe8f/0xed0 [ 121.731599][T11839] ? snprintf+0x6f/0x90 [ 121.731614][T11839] ? register_shrinker_prepared+0xc2/0xd0 [ 121.731632][T11839] ? set_blocksize+0x197/0x270 [ 121.731648][T11839] mount_bdev+0x1e8/0x290 [ 121.731671][T11839] ? ext4_mount+0x40/0x40 [ 121.731686][T11839] ? ext4_errno_to_code+0x110/0x110 [ 121.731736][T11839] ext4_mount+0x2d/0x40 [ 121.731751][T11839] legacy_get_tree+0x70/0xc0 [ 121.731785][T11839] vfs_get_tree+0x4a/0x1a0 [ 121.731804][T11839] path_mount+0x11d4/0x1ce0 [ 121.731820][T11839] __se_sys_mount+0x23d/0x2e0 [ 121.731835][T11839] ? mntput+0x45/0x70 [ 121.731855][T11839] ? __fpregs_load_activate+0x103/0x1b0 [ 121.731937][T11839] __x64_sys_mount+0x63/0x70 [ 121.731953][T11839] do_syscall_64+0x4a/0x90 [ 121.731973][T11839] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 121.731997][T11839] RIP: 0033:0x467afa [ 121.732007][T11839] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.732019][T11839] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 121.732034][T11839] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 121.732047][T11839] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 121.732058][T11839] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 121.732069][T11839] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 121.732080][T11839] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 121.780494][T11845] loop2: detected capacity change from 0 to 4096 [ 121.810577][T11840] loop1: detected capacity change from 0 to 4 [ 121.823095][T11840] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 121.824186][T11845] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 12:59:24 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) mmap(&(0x7f00003b6000/0x3000)=nil, 0x3000, 0x0, 0x2010, r0, 0x4e4d9000) 12:59:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:24 executing program 4: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/96, 0x60) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)={'syz1', "b9b1a75eb57c202723c45c58088b74c55ea51cffc240c9549666826aedd4fb9384ccd4e9bfb77bdf8ca8fa048cfcda3fc33552a9f10345e4d15bb3144c0c2843cb83116732695e9d831fdd48d1c2f1f53a56157c89c12870976de40d775f717d2d89396191c1a8a1e146136d4c96db16674c9a83fe52ed33139763a7fa46e3d7c2a32bc4785ed7a95f328fa540689ad6d6b2ca1b95ab8ee547c15ff31b25622f123ab00697a9bb1bd6ed57bd28eeff2255bc06554011527d29a0412bce9d40187730a5439322cfc6c83c203037273511bf3c9b37"}, 0xd8) 12:59:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) [ 121.824238][T11845] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 121.824324][T11845] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 121.828701][T11845] EXT4-fs (loop2): mount failed [ 121.858800][T11864] loop5: detected capacity change from 0 to 4 [ 122.138798][T11871] loop2: detected capacity change from 0 to 4096 [ 122.169804][T11871] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 122.179350][T11864] FAULT_INJECTION: forcing a failure. [ 122.179350][T11864] name failslab, interval 1, probability 0, space 0, times 0 [ 122.189605][T11871] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 122.202659][T11864] CPU: 1 PID: 11864 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 122.213390][T11871] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 122.222628][T11864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.222640][T11864] Call Trace: [ 122.222647][T11864] dump_stack+0x137/0x19d [ 122.255205][T11884] loop1: detected capacity change from 0 to 4 [ 122.255680][T11864] should_fail+0x23c/0x250 [ 122.255703][T11864] __should_failslab+0x81/0x90 [ 122.271562][T11864] ? ext4_fill_super+0x1ed/0x8010 [ 122.276588][T11864] should_failslab+0x5/0x20 [ 122.281090][T11864] kmem_cache_alloc_trace+0x49/0x310 [ 122.286704][T11864] ? ext4_fill_super+0x62/0x8010 [ 122.292159][T11864] ext4_fill_super+0x1ed/0x8010 [ 122.297173][T11864] ? vsnprintf+0xe8f/0xed0 [ 122.301613][T11864] ? snprintf+0x6f/0x90 [ 122.305785][T11864] ? register_shrinker_prepared+0xc2/0xd0 [ 122.311717][T11864] ? set_blocksize+0x197/0x270 [ 122.316628][T11864] mount_bdev+0x1e8/0x290 [ 122.321071][T11864] ? ext4_mount+0x40/0x40 [ 122.325696][T11864] ? ext4_errno_to_code+0x110/0x110 [ 122.331004][T11864] ext4_mount+0x2d/0x40 [ 122.335165][T11864] legacy_get_tree+0x70/0xc0 [ 122.340011][T11864] vfs_get_tree+0x4a/0x1a0 [ 122.344615][T11864] path_mount+0x11d4/0x1ce0 [ 122.349197][T11864] __se_sys_mount+0x23d/0x2e0 [ 122.354197][T11864] ? mntput+0x45/0x70 [ 122.358176][T11864] ? __fpregs_load_activate+0x103/0x1b0 [ 122.364122][T11864] __x64_sys_mount+0x63/0x70 [ 122.369679][T11864] do_syscall_64+0x4a/0x90 [ 122.374351][T11864] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 122.380948][T11864] RIP: 0033:0x467afa [ 122.385187][T11864] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 122.405890][T11864] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 12:59:24 executing program 4: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/96, 0x60) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)={'syz1', "b9b1a75eb57c202723c45c58088b74c55ea51cffc240c9549666826aedd4fb9384ccd4e9bfb77bdf8ca8fa048cfcda3fc33552a9f10345e4d15bb3144c0c2843cb83116732695e9d831fdd48d1c2f1f53a56157c89c12870976de40d775f717d2d89396191c1a8a1e146136d4c96db16674c9a83fe52ed33139763a7fa46e3d7c2a32bc4785ed7a95f328fa540689ad6d6b2ca1b95ab8ee547c15ff31b25622f123ab00697a9bb1bd6ed57bd28eeff2255bc06554011527d29a0412bce9d40187730a5439322cfc6c83c203037273511bf3c9b37"}, 0xd8) [ 122.414508][T11864] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 122.422809][T11864] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 122.431142][T11864] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 122.439298][T11864] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 122.447357][T11864] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:24 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000480)={0x0, "ac93c7fc17f02d5e2f26e41dcc5bb3e7"}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) io_submit(0x0, 0x2, &(0x7f0000000240)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xab2, r2, &(0x7f0000000080)="aa81890bb3a5c35710642047d7b0d0b1ee8c5188f8486b17097f7510c2964509d1b002477c0d73e6ce0bfe28b48089cebee7b006b67e522a046afc1dfdd7326c91d142b0131dcc33e2b2fdca3895cd36b1ddfb48fd5fbef6ce49e0b9dc44dbd2120263401d", 0x65, 0x3, 0x0, 0x2}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x8, r0, &(0x7f0000000180)="c816fdda176646b883a7a1a3dac54942947b83919cfa54c433230a17547c769f0d357f8d82f9e011e26553b468a776646ea1bab657411b96048f824f3cf93a340199446e0a360968bee86dc54010e50190da97f8", 0x54, 0x5fb8, 0x0, 0x2}]) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:24 executing program 4: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/96, 0x60) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r3) 12:59:24 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="08859873c37902d945e38e4020dd2378fe6c0c7f3cec46fd1abd0fb0f50da78be3ef1980553314db8e3fc1835610b1345041385904876062eb95ac557825269d42f512acf56a2a106ae29e09e441d39542e4c2c0e29f6abe2b310d96e15c2d15fa290d927196e320ec00", 0x6a, 0x1}, {&(0x7f00000001c0)="c80a4b7173c4cb40ef04480cbde21ef53c4d7f528f60acb3541f4363e459c3a88add728468f463c0ecb9d1bbda4234d4db003be8639a6429dee77c01aada7bb8587d476dc23ec813d536a78ad0f5acd3baeff99a9b5681180db7a6cc2b147aed5b56b8e09a5bbf619bd76034227a7cef3a18b05ff089af9cd701b645cca8969f6b6d35338d73431c8c1d81d19efc3e5c80cd8614d3a24decf4c1ee6e92bb500bdcb962e29c27bc6f8b89713fb2fde656c18d1d99dac416d5ffdd533dcd7000bb75343c6b9daf1474f0", 0xc9, 0x5}, {&(0x7f00000002c0)="03212cf9e2e63325235d116f7b9675dbd4a38431c0a00748498b6e4c863b063bd22502e7416ffbe2fb2333e5265d65411712e7a6a5b6310affccc419092a8d9a97d4087425f44d99fed7b5", 0x4b, 0xffffffffffffff4a}, {&(0x7f0000000340)="669318442562f4760126f68a3cda3cbcfec29971c9b41ab93a012aa325e0f5c5a776373ce14bbc1e5247495618843c4e7c5b6e62c8dfb80e410a0b982bd6e6e7ccf0e5245f32dffc5e152357af1fcfde", 0x50, 0x5}, {&(0x7f00000003c0)="d6c55542397dad", 0x7, 0x9}], 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="61636c2c726f6f74636ff8000000000000007374656d5f752c008af98f088ac57df1e1f74a4611"]) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 122.535160][T11871] EXT4-fs (loop2): mount failed [ 122.540563][T11884] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:24 executing program 5 (fault-call:0 fault-nth:60): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:24 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:24 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 122.617480][T11884] loop1: detected capacity change from 0 to 4 [ 122.624847][T11884] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 122.650276][T11914] loop0: detected capacity change from 0 to 16383 [ 122.659482][T11914] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 122.667689][T11922] loop5: detected capacity change from 0 to 4 [ 122.674449][T11921] loop2: detected capacity change from 0 to 4096 [ 122.685456][T11922] FAULT_INJECTION: forcing a failure. [ 122.685456][T11922] name failslab, interval 1, probability 0, space 0, times 0 [ 122.698752][T11922] CPU: 1 PID: 11922 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 12:59:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0xc840, 0x0, 0x0) close(r3) 12:59:24 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 122.707890][T11922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.718680][T11922] Call Trace: [ 122.722135][T11922] dump_stack+0x137/0x19d [ 122.726880][T11922] should_fail+0x23c/0x250 [ 122.731485][T11922] __should_failslab+0x81/0x90 [ 122.736371][T11922] ? ext4_fill_super+0x1ed/0x8010 [ 122.741569][T11922] should_failslab+0x5/0x20 [ 122.746484][T11922] kmem_cache_alloc_trace+0x49/0x310 [ 122.750150][T11921] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 122.751871][T11922] ? ext4_fill_super+0x62/0x8010 [ 122.751898][T11922] ext4_fill_super+0x1ed/0x8010 [ 122.770586][T11921] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 122.775560][T11922] ? vsnprintf+0xe8f/0xed0 [ 122.780942][T11921] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 122.791551][T11922] ? snprintf+0x6f/0x90 [ 122.791577][T11922] ? register_shrinker_prepared+0xc2/0xd0 [ 122.806183][T11921] EXT4-fs (loop2): mount failed [ 122.810397][T11922] ? set_blocksize+0x197/0x270 [ 122.810420][T11922] mount_bdev+0x1e8/0x290 [ 122.810437][T11922] ? ext4_mount+0x40/0x40 [ 122.810457][T11922] ? ext4_errno_to_code+0x110/0x110 [ 122.846865][T11922] ext4_mount+0x2d/0x40 [ 122.851247][T11922] legacy_get_tree+0x70/0xc0 [ 122.855977][T11922] vfs_get_tree+0x4a/0x1a0 [ 122.860560][T11922] path_mount+0x11d4/0x1ce0 [ 122.865115][T11922] __se_sys_mount+0x23d/0x2e0 [ 122.870040][T11922] ? mntput+0x45/0x70 [ 122.874127][T11922] ? __fpregs_load_activate+0x103/0x1b0 [ 122.879782][T11922] __x64_sys_mount+0x63/0x70 [ 122.884486][T11922] do_syscall_64+0x4a/0x90 [ 122.888924][T11922] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 122.895468][T11922] RIP: 0033:0x467afa [ 122.899449][T11922] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 122.919510][T11922] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 122.928002][T11922] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 122.936575][T11922] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 122.944913][T11922] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 122.953449][T11922] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 12:59:24 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:24 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 122.961671][T11922] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 123.012578][T11943] loop1: detected capacity change from 0 to 4 [ 123.019168][T11952] loop2: detected capacity change from 0 to 4096 [ 123.029623][T11952] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 123.049252][T11952] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 12:59:24 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='user.syz\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0xc840, 0x0, 0x0) close(r3) 12:59:25 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0xc840, 0x0, 0x0) close(r3) 12:59:25 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 123.060461][T11952] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 123.075637][T11952] EXT4-fs (loop2): mount failed 12:59:25 executing program 5 (fault-call:0 fault-nth:61): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:25 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:25 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0x0, 0xc840, 0x0, 0x0) close(r3) [ 123.161537][T11943] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 123.174106][T11977] loop5: detected capacity change from 0 to 4 [ 123.181608][T11978] loop2: detected capacity change from 0 to 4096 [ 123.220720][T11977] FAULT_INJECTION: forcing a failure. [ 123.220720][T11977] name failslab, interval 1, probability 0, space 0, times 0 [ 123.230531][T11943] loop1: detected capacity change from 0 to 4 [ 123.233682][T11977] CPU: 1 PID: 11977 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 123.248949][T11977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.260029][T11977] Call Trace: [ 123.263391][T11977] dump_stack+0x137/0x19d [ 123.267813][T11977] should_fail+0x23c/0x250 [ 123.272412][T11977] ? mempool_alloc_slab+0x16/0x20 [ 123.278150][T11977] __should_failslab+0x81/0x90 [ 123.283043][T11977] should_failslab+0x5/0x20 [ 123.287974][T11977] kmem_cache_alloc+0x46/0x2f0 [ 123.292996][T11977] ? workingset_activation+0x23c/0x270 [ 123.298832][T11977] mempool_alloc_slab+0x16/0x20 [ 123.303953][T11977] ? mempool_free+0x130/0x130 [ 123.308811][T11977] mempool_alloc+0x8c/0x300 [ 123.313841][T11977] ? pagecache_get_page+0x7a3/0x900 [ 123.319271][T11977] bio_alloc_bioset+0xcc/0x480 [ 123.324153][T11977] ? __find_get_block+0x82c/0x900 [ 123.329406][T11977] submit_bh_wbc+0x130/0x330 [ 123.334349][T11977] ? __getblk_gfp+0x4d3/0x590 [ 123.339060][T11977] submit_bh+0x21/0x30 [ 123.343217][T11977] ? __wait_on_buffer+0x60/0x60 [ 123.348356][T11977] ext4_read_bh+0xdf/0x190 [ 123.353221][T11977] ext4_sb_bread_unmovable+0xf1/0x1d0 [ 123.358761][T11977] ext4_fill_super+0x41f/0x8010 [ 123.364233][T11977] ? vsnprintf+0xe8f/0xed0 [ 123.368990][T11977] ? snprintf+0x6f/0x90 [ 123.373146][T11977] ? register_shrinker_prepared+0xc2/0xd0 [ 123.378859][T11977] ? set_blocksize+0x197/0x270 [ 123.383764][T11977] mount_bdev+0x1e8/0x290 [ 123.388085][T11977] ? ext4_mount+0x40/0x40 [ 123.392412][T11977] ? ext4_errno_to_code+0x110/0x110 [ 123.397781][T11977] ext4_mount+0x2d/0x40 [ 123.401931][T11977] legacy_get_tree+0x70/0xc0 [ 123.406515][T11977] vfs_get_tree+0x4a/0x1a0 [ 123.410942][T11977] path_mount+0x11d4/0x1ce0 [ 123.415522][T11977] __se_sys_mount+0x23d/0x2e0 [ 123.420909][T11977] ? mntput+0x45/0x70 [ 123.425388][T11977] ? __fpregs_load_activate+0x103/0x1b0 [ 123.430927][T11977] __x64_sys_mount+0x63/0x70 [ 123.435727][T11977] do_syscall_64+0x4a/0x90 [ 123.440176][T11977] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 123.446271][T11977] RIP: 0033:0x467afa [ 123.450239][T11977] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 123.470675][T11977] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 123.479284][T11977] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 123.487616][T11977] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 123.495965][T11977] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 123.504021][T11977] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 123.512336][T11977] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 123.542469][T11978] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 123.553143][T11978] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 123.590427][T11978] EXT4-fs (loop2): mount failed 12:59:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:25 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:25 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000140)=""/21, 0x15}], 0x2, 0xffffffff, 0x0) 12:59:25 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0x0, 0xc840, 0x0, 0x0) close(r3) 12:59:25 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 123.702298][T11943] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 123.724971][T11977] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:25 executing program 5 (fault-call:0 fault-nth:62): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 123.795293][T12004] loop2: detected capacity change from 0 to 4096 [ 123.809022][T12015] loop5: detected capacity change from 0 to 4 [ 123.821964][T12015] FAULT_INJECTION: forcing a failure. [ 123.821964][T12015] name failslab, interval 1, probability 0, space 0, times 0 [ 123.834919][T12015] CPU: 1 PID: 12015 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 123.844026][T12015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.852501][T12004] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 123.854563][T12015] Call Trace: [ 123.854571][T12015] dump_stack+0x137/0x19d [ 123.865512][T12004] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 123.869023][T12015] should_fail+0x23c/0x250 [ 123.892500][T12015] __should_failslab+0x81/0x90 [ 123.893653][T12024] loop1: detected capacity change from 0 to 4 [ 123.897501][T12015] should_failslab+0x5/0x20 [ 123.897520][T12015] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 123.897543][T12015] ? __crypto_alg_lookup+0x36d/0x3a0 [ 123.919733][T12015] ? __kmalloc_node+0x30/0x40 [ 123.924712][T12015] __kmalloc_node+0x30/0x40 [ 123.929359][T12015] crypto_create_tfm_node+0x4a/0x1f0 [ 123.934876][T12015] ? crypto_alg_mod_lookup+0x397/0x4e0 [ 123.940472][T12015] crypto_alloc_tfm_node+0x100/0x290 [ 123.945978][T12015] crypto_alloc_shash+0x2b/0x30 [ 123.950875][T12015] ext4_fill_super+0x616/0x8010 [ 123.956071][T12015] ? vsnprintf+0xe8f/0xed0 [ 123.960614][T12015] ? snprintf+0x6f/0x90 [ 123.964846][T12015] ? register_shrinker_prepared+0xc2/0xd0 [ 123.970607][T12015] ? set_blocksize+0x197/0x270 [ 123.975744][T12015] mount_bdev+0x1e8/0x290 [ 123.980096][T12015] ? ext4_mount+0x40/0x40 [ 123.984557][T12015] ? ext4_errno_to_code+0x110/0x110 [ 123.989847][T12015] ext4_mount+0x2d/0x40 [ 123.994227][T12015] legacy_get_tree+0x70/0xc0 [ 123.998993][T12015] vfs_get_tree+0x4a/0x1a0 [ 124.003409][T12015] path_mount+0x11d4/0x1ce0 [ 124.008518][T12015] __se_sys_mount+0x23d/0x2e0 [ 124.013279][T12015] ? mntput+0x45/0x70 [ 124.018065][T12015] ? __fpregs_load_activate+0x103/0x1b0 [ 124.024082][T12015] __x64_sys_mount+0x63/0x70 [ 124.029073][T12015] do_syscall_64+0x4a/0x90 [ 124.033832][T12015] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.040507][T12015] RIP: 0033:0x467afa [ 124.044482][T12015] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 124.064653][T12015] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 124.073181][T12015] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 124.081456][T12015] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 12:59:25 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040), 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x80, 0x20) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) io_cancel(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x6, r2, &(0x7f0000000140)="6812ed24352e5a928bd8ed1e2f0fde796405b59cb864fe5d9b40d65476d7a23484e73d7fec29f72a43599fea3c6b9026cd61625c85dd8e02ae4029d235c594c09868a976c276118571731483b56d1425370c931104ce6a7eac436c8cb04140fafc795b4b21c2449d0c2e4f732d5f7619cfe4694db79380b80712d88a17b5d4ab27f5868666988798eb0b104b1f42a9076e", 0x91, 0x4, 0x0, 0x1, r3}, &(0x7f0000000200)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) preadv(r1, &(0x7f0000000280), 0x0, 0x9, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:25 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/96, 0x60) 12:59:26 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0x0, 0xc840, 0x0, 0x0) close(r3) [ 124.089589][T12015] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 124.097929][T12015] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 124.106175][T12015] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 124.114900][T12015] EXT4-fs (loop5): Cannot load crc32c driver. [ 124.133619][T12004] EXT4-fs (loop2): mount failed 12:59:26 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/96, 0x60) 12:59:26 executing program 5 (fault-call:0 fault-nth:63): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:26 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 124.162212][T12024] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 124.213775][T12049] loop5: detected capacity change from 0 to 4 [ 124.228382][T12049] FAULT_INJECTION: forcing a failure. [ 124.228382][T12049] name failslab, interval 1, probability 0, space 0, times 0 [ 124.241404][T12049] CPU: 1 PID: 12049 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 124.241576][T12054] loop2: detected capacity change from 0 to 4096 [ 124.250508][T12049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.250522][T12049] Call Trace: [ 124.250528][T12049] dump_stack+0x137/0x19d [ 124.250552][T12049] should_fail+0x23c/0x250 [ 124.250569][T12049] ? match_int+0x4b/0xf0 [ 124.285420][T12049] __should_failslab+0x81/0x90 [ 124.290800][T12049] should_failslab+0x5/0x20 [ 124.296346][T12049] __kmalloc_track_caller+0x64/0x340 [ 124.301922][T12049] ? simple_strtoul+0x8a/0xb0 [ 124.306663][T12049] kmemdup_nul+0x27/0x70 [ 124.311347][T12049] match_int+0x4b/0xf0 [ 124.315605][T12049] parse_options+0x3df/0x1860 [ 124.320506][T12049] ? crypto_alloc_tfm_node+0x26a/0x290 [ 124.326131][T12049] ? make_kgid+0x131/0x190 [ 124.330647][T12049] ext4_fill_super+0x1556/0x8010 [ 124.335579][T12049] ? snprintf+0x6f/0x90 [ 124.339784][T12049] ? register_shrinker_prepared+0xc2/0xd0 [ 124.345860][T12049] ? set_blocksize+0x197/0x270 [ 124.350790][T12049] mount_bdev+0x1e8/0x290 [ 124.355316][T12049] ? ext4_mount+0x40/0x40 [ 124.359677][T12049] ? ext4_errno_to_code+0x110/0x110 [ 124.365054][T12049] ext4_mount+0x2d/0x40 [ 124.369213][T12049] legacy_get_tree+0x70/0xc0 [ 124.374139][T12049] vfs_get_tree+0x4a/0x1a0 [ 124.378601][T12049] path_mount+0x11d4/0x1ce0 [ 124.383385][T12049] __se_sys_mount+0x23d/0x2e0 [ 124.388233][T12049] ? mntput+0x45/0x70 [ 124.392570][T12049] ? __fpregs_load_activate+0x103/0x1b0 [ 124.398211][T12049] __x64_sys_mount+0x63/0x70 [ 124.402907][T12049] do_syscall_64+0x4a/0x90 [ 124.407413][T12049] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.413311][T12049] RIP: 0033:0x467afa [ 124.417410][T12049] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 124.437481][T12049] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 124.446313][T12049] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 124.455004][T12049] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 124.463061][T12049] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 124.471037][T12049] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 124.479629][T12049] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 124.509645][T12024] loop1: detected capacity change from 0 to 4 [ 124.516611][T12024] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 124.529781][T12054] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 124.540821][T12054] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 12:59:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x12, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:26 executing program 0: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x4, 0x5, 0x717f, 0x8, 0x15, "9566d658eaf4d1b72e53d312049a9d4f08afe7"}) r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) pwritev2(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="acb8cf524d52304b586547f833a32fa49b1e56c99f1558632727d8725c40edef25bc4225d9c63d20659e50529e4ebc0769d41f265a9ba1c6ff9c44b6de9dd3a14e6c3d74d90608067eb2571b36579924d2258d97315ae19107ed5e10625baca217188bcd04219a704e9f598a0cad", 0x6e}, {&(0x7f00000001c0)="161b00bc62978308ae397d9c76b33f0dc5571d542de4373a6201da68cf3743504bc7e15dfbaaa62f666f9081d5483de53e1c72fdd45b31ceaab9cc49e996582b84e11b095999a4a12e5bbc7dfc92dd870d1d63c27b709736264fd07a2caa68206d462f37907b23fd885361878e665d21f2bd35e6e5b0adbc476687393e650af4766001198b9c", 0x86}, {&(0x7f0000000480)="b0c9d8e44753ef9c07fa2d80f922e334c62988ebd6b274615488b64bafcb8c2fb9becfd5d7b38bd99d43f297409cbdc61114deed67ba508819c80267c9eb618e708618330f556f134be29d6c20123a1420f924f2c30aaee17d42424485b44aeb3f085c7652959e2d70af5a76f8edbf57608c70d8747b878166436185d9a2832629713fe058fa1d0d9c819943fb828f19fa58c0457d2116cea117c1c9692b6177f2f502b1a573614bccf102381fc2998fbc190c5b38a2ecc131ee11b525a18b9e00575e469490887f62d27f032b7b863cf450378f59b51a333a5b450505ce9d79fc4eb9ec485344bbf579d3f262f50321a3e6c1451d287c47e2c0319c47305ad5489f03fc10cf20e8f393f1185e023984e2462faf3d3147c054364d0093febd8084ced870d1bfdb89b070faedd683ac3a51317072dfe8540e64f0d6a5ef71db984087b7557b26ef958ca50208511289a43f6c3c030fbe3834117149347768ba338e2d5672616fc27e34cb94738fdd1a92e373ab8c1aeeb3f4f610c5b2da1f1598c9bdcc5ec89a37caa63f0a9ea63e41d479c7bffce7c1cf3c34f71d3a09fb1fd3d0d8f693e6cb8d54437a1dc9cfe8ddb992294d9bd67798efe2fe4ce4c926b0f7a01f75b8fd4fba778f360fac267340e4280c04316f1ba6a4801f3516873429bfb990c7eace677a71508e892a3d3f309f53651ef02f999f0c9c52757d98915c72b225bb0983026798b9df948dcd15db13a191889a543c530203fced8abcff3095406042c18dc43f652416b1be97c9240d50fffb83d9f12c22b8e8007511d30bff9cd9bfd7cf00db12444bd58653abb8412079c61c5f6f9c4f97a5319e0b15653a6d18518356fe5b3f2f3ef243575a9d815d16182c25d6d11706eb17443f1b0cd450b248823fa5c75138e9a8054f97e526aca8ab331819235192a9a7d38a07cdb25a91facf5257d41a1ed1633e4d43103fccf4cbb99d95ad0b9685bea27e1ad31dc1ee9f9f3174a5099e3c7444d2897d118411f7ea3385d121baf0bbe84ea99a6a5568ed5c2c8c28432619623199164d24187ad5440ce5361b891158f2559eb723955616c36390e46bfe9f8b94403121198cbe80f4ab6fc39986cb95ba2f59b4db6a00d81d2addbcb5d582001805423c25e678ef9b76a7f779c1691cb68c3542215c09eb43d61ead229b8cda636b14f5afe55e1edcff4c47bdd276e81cb7ad8000e02375d6eb805790e388be8fa1449948809cc88eb59ebfaf757d3f854114da22503587e9eb005f828800d8edc7eb565e05c124286b94b42b410e8f97762a3025ae64fd265a08afaff694b1f9e514ac0d1e96950a8d8a8ce68b6806daa607779e6c23662d296014e1d62bf84d8098acb6906d7bb98de4699c1964ef4e63e72147ce506fbf846b4f7761c48f6227907e13321565d51efbc95d3a43536c2cb8e91efd0f0dbc1099397996a6da28da3357494ce2f2ed3bfc7fc6694b8354bbf029c23802767e4466e753cf9677bb2e703ddde86f314738d1813cd40b99874c2f02f6b6ad63be03f11948084a9359f6bdd495867afa1adc762b4974110973f5c787a7d4a168a2df67e4019d6603b63292c1229269beca123e835a8dd0137a8fd2dadaa8c35e5552f404e3c6273cd64e65212b214bb960db1822186a8976eac0d3eaf337c498f42846a6f9761695e3422f6c509f74805d96f65746552833bc0e4b4e19256f1aeb09e9cabc257dab5d354488d5b5854f8c03fb771bcced6f37698d6cfd68d9efbb5f5435a186c2693ee6490eceef7a8487d9a8bce12008981969f442d8a52ce4b82df315e82f9e81a0b03cf8b613c9c8ab52bda4d0ff54495942ae501938ec812361e0051e02de8f55de3901add32fecaa031587a2438b7fc665c8da9346d6cb5dd46115a755373c329d9a541b708cf26fa3390da259603ce8f8ade16aec9d3d5eabc0e129e9ffa549a516e0146555951312a3006bcc3221320fe66d2b226a86e9a7cef459dd8de819bdcbf8c052975fd4fc4a6ec54de2dec90b90877d350d8f8f7f883abea445ece1feb682d05156a198407004786f5e334c90c3304d74144b6bddee873bce13b7d500a893cfb6edfdcf8ac8983f396403ec711066d90b3c6f3b8c637d001ba5da3723c0eb71be8d015b4f148077af155ae069166fbc32eda0de908858b376d2017d2d1501606f3a377242b9daa050357928a828db65d979f6f20b669f7bfbf8a2caf1ef64e186b3a50f07ca7d1f82f22cf33cff80d0fe42ef7115528ce967d2eda656e3dc0ca8acabea589dbe4feba9a468eb87b8522a7d490209ddb3a3493488171c50f72e4cde8a795a2b874b756c54603aced91816dcd3da7af9f6d00144ee4fa24cc4569a54b1bebb290bc96477153549bfc1ae6eb65562c61692760fe03cd486e0260df82f286b06aad2afcfaeb8e1a8865e5772b9f881002571a2df721465df51e5c2b632df5daa6149140be18e46a7db823b92154250c38eac5e67763b5152933b8824c49d4a54af7be88992909b0a0eb3223657822aa2f50df68d45f99c10d5660e31b24a37d5e7ceaddba98e10c87c2f27d08926405b0c75001efb92ae6d31fd90ea2905faed83816c686a2f0c575eecccbb766e05633d6b03e1ec30133c4bce704a83cac819d234adf1ffec579b99bc81398c64d8dd6e85edee6d4955a5e33ecb1bf3289bc0adadb2f7938dcbc56d692f1ace01eb595f4a8a2904c132993b7cac480286d7ef029c395c810a53177de00a2c66b2851fd0d16001a0aab3cf9ddb313a6025f99cd3b9ecd74cc93482684b12aa358ed32ce7d4bbaf75f85df8889ac3ad08cd0b2400903ed500a5244c4d7d072c3d1c872c9fba26a2f4fb4b119f9bd5d2f1e93f9b3153f941453f47e2d9117095b3541dd38e6d202d76738e528dde0479d8efc39aa66d7c55c192895f4022da237c1e28255c229dc1937f8fb85c4be614ce58b109f44caf6521e804bed30a08cd5a65925e6b839d1243a153cc43d0ab5abcd1bd19e4b41b193bcd9929ab08005deb615a517185aa7ff37d1a6d9df92bbc71ffa692b80ed5226795f17d8049174512e534025f28a8aa9a5d7eba2a4eefe2c0de09b6d67fcc7c56f7fe321a0c7bef38749c2a7ceb030c49286137f38988b6d8500b23de20bc0aa609953b88ef05af84622ed64f7603205f63e584799698f134aee8ffb333492803d5322cd1a1b1a081e248041ad19282c34f477010a3185cdefcd7b037691e9eb729440bd34e0a8b2854b0562ea863da7d1ac62808e709a0bd1f5ac7a63e3dcee5571c15b0e551be7159efe80c484cee6a2671db4402d90d02dac98a6e712e7f4fd9266a3b97defb571e1c3fb652b325a0733a97f95b2ecd6ba5b941d9530d30a2deac617f660602dce673b326db426112d8dd6f90b939b3a8223742201f61540e0346969cc4cab4e3b25ab308b82dd0b51602227b1133414b0dd3b784cc9113daa6b4dca7f6096651c5424721da60b9ac693449008a56feba018e6e5e2add02f9a1c3faf375c3151ab12e79a8cb0e2953fbae7979540bf8d81f23dc83026e96ad2b2952eda9b166f3200848493d5c4eea356f6ea87ee9b42658d24aa1542d148c1767c5511ad07e0e641ca781986bbf486bf9e1e604886ab121f0830f1a7fafa4b29c2e731b913f2f914c419c62edb2c74350a5b07492598b7d7ef0794b1d4c948e73bf594c2f1629890768449513227a9bebc606116acfe597b94e93b094f964e75514a86af1e221887848affa8183a33131393f84dfdff19f811a20a23003f39c371d926addb6d2d1489365bde0f4d39dbca2e283d9980d94bb4e00b71d4fb9bad4d62d84de8ea6de6b3e3b22ded4b52d72f8ad5251c6380fde26fc3df39c864693e05101e8415f155200f309aad180130e60f41e313414c143e6877eee76bf45792fc2919a1dde0c2282052cad09f32ce653a1dd8c7145fdd6dfc716bab346e8688a7a246d2128c2834e36a461773cee4e5b4fd9d1a8cf1987fac83da311c8dda682d1ecb40ccddff840fa123adf13893616c50b0cc6ee17910074e58af088fa6f21466114143bd48199c10ccde19cdbff836271a90d1200393fd26333cb4cbea7be14109c922395ede7f7f78a12132a105dfbb20baf027b501f86ecc966dabf46e11f90435138e1888e636d919b2a65777c1f6b78df919b5bb704933c30cdfa07f739c17f30b729d472a1b4ddbec2f451ce325b514a33601f4592485280b3618ef25eb3542eadacc205013e9e057463b6239a8bb590649657721f545db8d4c6aaab25bed314e66f754b9fb54fa48cc268f440f6d2e62bb1c4a74e964087afa8098d4aab44dd378744f8b928cf671d7a326914d1222823b631e17914a75b1800e841d012eeeb59fe922fc6d767f60c77571fd6dde48c2cf0bc7b4368a9e80b3cdc24bf767200e7f660da3ed1337526f768189f30153b6d0d1e22eeef215af803a1509e33efb7712fa8bbd83d237c3745a08dc39d7b4eb41419fd0276a62ec4b05983798df13a414fbcec81739e90aa2a64f655b2eacfceb7d102d981ba252a9d24d0c94f82a2689804a04d18b5b7cbb9c00e08a49065c87178682236ad42a61708fa39243e72d2aca8ce3f13cbf6b1e49bce773d9346cd2ec6e3a7324292a2ac81488e77418762ad2abd2f0048315591688d2ffe57e0a9a2be7503bc04085e619895791f8479c496f0ffc92c6bf5b522a0b6e09c717ced15ad4036acc556adb15a846afd13813d75b624ea23e5276e2661dc60024703ad9de41aaeb44d263c85a61ab071fac3994f73c1a8f0719d15f1907e024be8b7fdbed628f1f885795e8e81e33c0d523dfef05c55c74f665d48465ef02a6fdbbfd1f82970f97b4eeb5addc7727a77aa482dac5413103d56b9b8fbc61e8e8654df52d25031d10c64268a1a4cab5869c626a35050930fa662560129218742735c95a3a2d7d60381e302757277d41ea536b4fab6596f5fad48c16cb67504ac45d341ed22cb2fba087aa6b6f7c5ba5fba8fcc2756bc295039cd6cf71929a1b30756d323bd652f506c30162b5d89a24eae2f0f0a7d156029e07ac6fcb02fcbf1ca69b8d9e4db83471cad1f574414ff6a35ca1e28af1aae7fd4b239ba64d4f50f208e771895e8d67948dbbaed19d2869b33162e7322e983cffd59dae8a57ae711835726755df7c158e87821451e7fdb2946291f3e41b78f51c05fa3f490f796b45e3575f42fd1d5696eaa7e5e31882f02185b35bd6428ef4860725b62b1fd9e4f5f04d739ea28977cb92561f6951f869400863cd5b3ad8e0305828b1ef332ebdb6da53334c2733e8230015b5aa27abfba322bcdc44b5db01427fd1a4716003a7199f3ebc914b35be605dc0d71c639ee929e801591aa0e4da3599924d11aee1b6d49895d83f95995ab0a5ff8091beaf3f036a9bf6b275db2470623fccfec6b9146de13f78082e53796d72220de05ab69ef303d3c6482b31a9713125e03f3138c3cfd7b984def92c2e0c16654e63bac636c51a8f025435217d6c279314b56a60184f313c0d13198ec40d405b73b813bf30696fc1cbc665dc0eec4de2d43e6d45f779bc21635eb82ed3c16170d544f146293c7e073eaab54bcf84e9619a5bf0ee8314a1c08d3a27ed6a49586aee109ccae0f4a229d26adacd188ee563a52871321d27cb783faacdb9e87897fe019a0d76ff92eaba32390173a8ee98e49a2b992a42e96f1fcc6edbc562b631257f80f887ab21ce221971e27c4983cbf940838e4c774e67dd2e7e1dce0590880243f1dc64684336f", 0x1000}], 0x3, 0x8a, 0x590b, 0x9) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x8800, 0x19) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:26 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) close(r3) 12:59:26 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/96, 0x60) [ 124.556258][T12054] EXT4-fs (loop2): mount failed 12:59:26 executing program 5 (fault-call:0 fault-nth:64): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:26 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:26 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x1a) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000480)={0x0, 0x101, 0x1, [0x20000000000000, 0x10001, 0x10001, 0x9, 0x3], [0xc08, 0x3, 0x5, 0x6, 0xed, 0xd71, 0x1, 0x10000, 0x507, 0x0, 0x0, 0x81, 0x7fffffff, 0x0, 0x7, 0x80000000, 0x2, 0x1, 0x2, 0x1, 0x5, 0x3, 0x1f, 0xffffffffffffffe1, 0x0, 0x9, 0x225b, 0xb5, 0x6, 0x3, 0x401, 0x8000, 0x7f4f99ee, 0x7, 0x9, 0x101, 0x578, 0x2, 0x8, 0x1, 0x686969d3, 0x6, 0x17f6, 0x3, 0x8, 0x8, 0x5, 0x4, 0x6, 0x2, 0xffffffff, 0x8000, 0x1000, 0x4, 0xff, 0x409, 0x1, 0x7fffffff, 0x0, 0x2, 0x10001, 0x5, 0x1ff, 0x200, 0x0, 0x5, 0x5, 0x100, 0xfffffffffffffe00, 0x0, 0x7, 0x6, 0xffffffffffff48dd, 0x8ce, 0x2, 0x11, 0x2, 0x9, 0x8, 0x6d4, 0xef91, 0x80000000000000, 0x15e3, 0x101, 0x6, 0x9, 0x800, 0x0, 0x2, 0xfffffffffffffe01, 0xc6b8, 0x1, 0xfffffffffffffffc, 0x100000001, 0x101, 0x6, 0x1, 0x1, 0x5, 0x7, 0x472d, 0x40c, 0x400, 0x1, 0x5, 0x2, 0x2, 0x3ff, 0x2, 0x7f, 0x9, 0x100000000, 0x3ff, 0x50f, 0x7, 0x2, 0x80000000, 0x12be679a, 0x9, 0x3, 0x9]}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000008c0)={r2, 0x7, 0x8, 0x1}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = pidfd_getfd(r0, r0, 0x0) preadv(r3, &(0x7f0000000440)=[{&(0x7f0000000080)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:26 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:26 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) close(r3) [ 124.648473][T12082] loop5: detected capacity change from 0 to 4 [ 124.669885][T12084] loop1: detected capacity change from 0 to 4 [ 124.672439][T12089] loop2: detected capacity change from 0 to 4096 [ 124.687504][T12084] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:26 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000080)={@id={0x2, 0x0, @d}}) [ 124.704156][T12082] FAULT_INJECTION: forcing a failure. [ 124.704156][T12082] name failslab, interval 1, probability 0, space 0, times 0 [ 124.717952][T12082] CPU: 0 PID: 12082 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 124.726825][T12082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.737358][T12082] Call Trace: [ 124.741230][T12082] dump_stack+0x137/0x19d [ 124.745778][T12082] should_fail+0x23c/0x250 [ 124.750686][T12082] __should_failslab+0x81/0x90 [ 124.755750][T12082] should_failslab+0x5/0x20 [ 124.760432][T12082] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 124.766602][T12082] ? __crypto_alg_lookup+0x36d/0x3a0 [ 124.772185][T12082] ? __kmalloc_node+0x30/0x40 [ 124.776973][T12082] __kmalloc_node+0x30/0x40 [ 124.781651][T12082] crypto_create_tfm_node+0x4a/0x1f0 [ 124.787125][T12082] ? crypto_alg_mod_lookup+0x397/0x4e0 [ 124.792599][T12082] crypto_alloc_tfm_node+0x100/0x290 [ 124.798408][T12082] crypto_alloc_shash+0x2b/0x30 [ 124.803479][T12082] ext4_fill_super+0x616/0x8010 [ 124.808723][T12082] ? vsnprintf+0xe8f/0xed0 [ 124.813413][T12082] ? snprintf+0x6f/0x90 [ 124.817570][T12082] ? register_shrinker_prepared+0xc2/0xd0 [ 124.823515][T12082] ? set_blocksize+0x197/0x270 [ 124.828473][T12082] mount_bdev+0x1e8/0x290 [ 124.832884][T12082] ? ext4_mount+0x40/0x40 [ 124.837627][T12082] ? ext4_errno_to_code+0x110/0x110 [ 124.843704][T12082] ext4_mount+0x2d/0x40 [ 124.848047][T12082] legacy_get_tree+0x70/0xc0 [ 124.852714][T12082] vfs_get_tree+0x4a/0x1a0 [ 124.857312][T12082] path_mount+0x11d4/0x1ce0 [ 124.861961][T12082] __se_sys_mount+0x23d/0x2e0 [ 124.866947][T12082] ? mntput+0x45/0x70 [ 124.871028][T12082] ? __fpregs_load_activate+0x103/0x1b0 [ 124.876932][T12082] __x64_sys_mount+0x63/0x70 [ 124.882015][T12082] do_syscall_64+0x4a/0x90 [ 124.886435][T12082] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.892446][T12082] RIP: 0033:0x467afa [ 124.896529][T12082] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 124.917310][T12082] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 124.925930][T12082] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 124.934151][T12082] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0cfa4b6000 [ 124.943111][T12082] RBP: 00007f0cfa4b6040 R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 124.952110][T12082] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 124.960251][T12082] R13: 0000000020000100 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 124.969567][T12082] EXT4-fs (loop5): Cannot load crc32c driver. [ 124.981510][T12089] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 124.994410][T12089] EXT4-fs (loop2): get root inode failed 12:59:26 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x41) r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 125.000674][T12089] EXT4-fs (loop2): mount failed 12:59:26 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) close(r3) [ 125.042233][T12084] loop1: detected capacity change from 0 to 4 [ 125.062113][T12084] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x17, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:27 executing program 5 (fault-call:0 fault-nth:65): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:27 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:27 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(0xffffffffffffffff) 12:59:27 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440), 0x0, 0xffffffff, 0x0) 12:59:27 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00', &(0x7f0000000140)='\\\')+[\\^\xc2,*]\f\x00', 0xd, 0x2) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 125.169019][T12143] loop1: detected capacity change from 0 to 4 [ 125.193882][T12148] loop5: detected capacity change from 0 to 4 [ 125.202416][T12143] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(0xffffffffffffffff) 12:59:27 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x309c80, 0x100, 0x13}, 0x18) preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000280)=""/74, 0x4a}, {&(0x7f0000000300)=""/11, 0xb}, {&(0x7f0000000340)=""/233, 0xe9}], 0x3, 0x2, 0x9) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) preadv(r3, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/179, 0xb3}], 0x1, 0x5, 0xfffeffff) [ 125.212792][T12148] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 125.214608][T12149] loop2: detected capacity change from 0 to 4096 12:59:27 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:27 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000080)=0xfffffffffffffff8) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:27 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 125.281296][T12149] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 125.293712][T12149] EXT4-fs (loop2): get root inode failed [ 125.299442][T12149] EXT4-fs (loop2): mount failed [ 125.310905][T12148] FAULT_INJECTION: forcing a failure. [ 125.310905][T12148] name failslab, interval 1, probability 0, space 0, times 0 [ 125.323703][T12148] CPU: 0 PID: 12148 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 125.329370][T12143] loop1: detected capacity change from 0 to 4 [ 125.333214][T12148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.333229][T12148] Call Trace: [ 125.333236][T12148] dump_stack+0x137/0x19d [ 125.357718][T12148] should_fail+0x23c/0x250 [ 125.358421][T12143] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 125.362168][T12148] __should_failslab+0x81/0x90 [ 125.362196][T12148] ? kobject_uevent_env+0x1a7/0xc40 [ 125.381956][T12148] should_failslab+0x5/0x20 [ 125.386547][T12148] kmem_cache_alloc_trace+0x49/0x310 [ 125.392064][T12148] ? rb_erase+0x4bb/0x750 [ 125.396579][T12148] ? kernfs_put+0x39/0x300 [ 125.401413][T12148] ? dev_uevent_filter+0x70/0x70 [ 125.406516][T12148] kobject_uevent_env+0x1a7/0xc40 [ 125.412068][T12148] ? __kernfs_remove+0x678/0x6a0 [ 125.417103][T12148] ? kernfs_find_ns+0x30d/0x320 [ 125.422142][T12148] ? kernfs_put+0x39/0x300 [ 125.426588][T12148] kobject_uevent+0x18/0x20 [ 125.431298][T12148] __loop_clr_fd+0x433/0x640 [ 125.435929][T12148] lo_ioctl+0x9eb/0x11f0 [ 125.440181][T12148] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 125.445753][T12148] ? call_rcu+0x259/0x6c0 [ 125.450442][T12148] ? avc_has_extended_perms+0x5d8/0x7b0 [ 125.456610][T12148] ? kfree+0xf0/0x1d0 [ 125.460710][T12148] ? blkdev_common_ioctl+0x9c3/0x1040 [ 125.466383][T12148] ? selinux_file_ioctl+0x8e0/0x970 [ 125.471832][T12148] ? lo_release+0x120/0x120 [ 125.476997][T12148] blkdev_ioctl+0x1d0/0x3c0 [ 125.481706][T12148] block_ioctl+0x6d/0x80 [ 125.486225][T12148] ? blkdev_iopoll+0x70/0x70 [ 125.491267][T12148] __se_sys_ioctl+0xcb/0x140 [ 125.496362][T12148] __x64_sys_ioctl+0x3f/0x50 [ 125.501318][T12148] do_syscall_64+0x4a/0x90 [ 125.506207][T12148] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.512302][T12148] RIP: 0033:0x466397 [ 125.516269][T12148] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.537085][T12148] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 125.545774][T12148] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466397 [ 125.554058][T12148] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 125.562716][T12148] RBP: 00007f0cfa4b66bc R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 125.570799][T12148] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 125.578924][T12148] R13: 0000000000000016 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x22, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0xccd00, 0xe6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) vmsplice(r2, &(0x7f0000000000), 0x11, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f00000000c0)=0x40001, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x20044ffc, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(0xffffffffffffffff) 12:59:27 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:27 executing program 0: setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x2, 0x3) r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x10240, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:27 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:27 executing program 5 (fault-call:0 fault-nth:66): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:27 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f00000000c0)={0x1e99c2, 0x0, 0x11}, 0x18) r1 = syz_open_dev$vcsn(&(0x7f0000000080), 0xfffffffffffffff8, 0x200000) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@getpolicy={0x6c, 0x15, 0x100, 0x70bd25, 0x25dfdbff, {{@in6=@local, @in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x4e23, 0x100, 0x4e22, 0x1f, 0x2, 0x20, 0xa0, 0x73, 0x0, r3}, 0x6e6bb9, 0x1}, [@XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x1f}, @tfcpad={0x8, 0x16, 0x4}, @offload={0xc, 0x1c, {0x0, 0x2}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8040) 12:59:27 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 125.664104][T12214] loop1: detected capacity change from 0 to 4 [ 125.670908][T12210] loop5: detected capacity change from 0 to 4 [ 125.677681][T12214] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 125.688005][T12210] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 125.698022][T12213] loop2: detected capacity change from 0 to 4096 12:59:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:27 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 125.768305][T12213] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 125.778513][T12238] loop1: detected capacity change from 0 to 4 [ 125.781216][T12213] EXT4-fs (loop2): get root inode failed [ 125.793129][T12213] EXT4-fs (loop2): mount failed [ 125.793537][T12239] loop3: detected capacity change from 0 to 4096 [ 125.805141][T12210] FAULT_INJECTION: forcing a failure. [ 125.805141][T12210] name failslab, interval 1, probability 0, space 0, times 0 12:59:27 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000280)=""/96, 0x60) [ 125.805155][T12238] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 125.818612][T12210] CPU: 0 PID: 12210 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 125.837826][T12210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.848465][T12210] Call Trace: [ 125.851858][T12210] dump_stack+0x137/0x19d [ 125.856233][T12210] should_fail+0x23c/0x250 [ 125.860842][T12210] ? kzalloc+0x1d/0x30 12:59:27 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000280)=""/96, 0x60) [ 125.865008][T12210] __should_failslab+0x81/0x90 [ 125.869815][T12210] should_failslab+0x5/0x20 [ 125.874473][T12210] __kmalloc+0x66/0x340 [ 125.878744][T12210] kzalloc+0x1d/0x30 [ 125.882755][T12210] kobject_get_path+0x7c/0x110 [ 125.887527][T12210] kobject_uevent_env+0x1be/0xc40 [ 125.892642][T12210] ? __kernfs_remove+0x678/0x6a0 [ 125.893439][T12239] EXT4-fs error (device loop3): ext4_ext_check_inode:459: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 12:59:27 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r2, 0xc058671e, &(0x7f00000008c0)={{}, {0x7}, 0x0, 0x0, 0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)="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", 0x146, 0x0, &(0x7f0000000680)={0x2, 0x147, {0x1, 0xc, 0x4a, "0724a33e1a7f5210328b0c374f461faa00c1e15f0747def98cb46c731175608cb6dae09eefb479c3c3803022f3c7fdf726316767ae6b124bfbf0f04bf672e3624c4e579643ad832948be", 0xf0, "7d2d4aa807ae30f593b96b12c5f32017acb435e12e6d98d40592d766c2617ec02890704ee9b567de23dc5e7feeb2a30c7d34b2b0c6c4e678ec2b4bce43b6257c03106a98a86fc3f98b42807ed50055f80d4d6b01c81e5d50d7c683e31fcb63653a83353a9604d532bbd0787e5f93c8f35d59a0bfa4d9418434a189c308d80113e19ac0297e39751ce5b56b1f4ba6b0c83f2bdbdb12eb513d286c9317650aca8f2236c202671276fe91740ff4eb1825880a391166f9f5c727a8a265c158c067b03dfff6f5acc13243b200c863b0c6cc9838e594e60d9aeb312386a3bbbc21872373c2b5d5d1d39be3ab7b1b9c5b75d345"}, 0xcb, "65320224d60956418c3b12d1bd0006ebdbf4dbc5e39883af461ec26c7ac2166d5cf1bebe7ebb8880dad78c83899f710b89e1b07b0a82ee4f4d13c856bb2c86e55e61608a666718d3576a430b8b023b23a6c249a5293725edef8510cfeebbb04151e7a11c8770d77014edd5fb515b9ab38f01303da21157f8160da10a30b2abb974b737c24da01399528c9f5e2da7bcca61207782d75af44bc84a2fbaa4f04cbaf9047b0de6b70c3fd22a7214c90f57b475e874940f55530798ee208cf3b29296de014d256c6a732a706712"}, 0x21e}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 125.897790][T12210] ? kernfs_find_ns+0x30d/0x320 [ 125.897814][T12210] ? kernfs_put+0x39/0x300 [ 125.916247][T12239] EXT4-fs error (device loop3): ext4_quota_enable:6432: comm syz-executor.3: Bad quota inode # 3 [ 125.921078][T12210] kobject_uevent+0x18/0x20 [ 125.925503][T12239] EXT4-fs warning (device loop3): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 125.936168][T12210] __loop_clr_fd+0x433/0x640 [ 125.936217][T12210] lo_ioctl+0x9eb/0x11f0 [ 125.949527][T12239] EXT4-fs (loop3): mount failed [ 125.955827][T12210] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 125.955853][T12210] ? call_rcu+0x259/0x6c0 [ 125.980890][T12210] ? avc_has_extended_perms+0x5d8/0x7b0 [ 125.987381][T12210] ? kfree+0xf0/0x1d0 [ 125.992454][T12210] ? blkdev_common_ioctl+0x9c3/0x1040 [ 125.998373][T12210] ? selinux_file_ioctl+0x8e0/0x970 [ 126.004985][T12210] ? lo_release+0x120/0x120 [ 126.010567][T12210] blkdev_ioctl+0x1d0/0x3c0 [ 126.015541][T12210] block_ioctl+0x6d/0x80 [ 126.019870][T12210] ? blkdev_iopoll+0x70/0x70 [ 126.024595][T12210] __se_sys_ioctl+0xcb/0x140 [ 126.029326][T12210] __x64_sys_ioctl+0x3f/0x50 [ 126.034262][T12210] do_syscall_64+0x4a/0x90 [ 126.038773][T12210] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.045352][T12210] RIP: 0033:0x466397 [ 126.049405][T12210] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:59:28 executing program 5 (fault-call:0 fault-nth:67): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 126.069380][T12210] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 126.078537][T12210] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466397 [ 126.086705][T12210] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 126.095010][T12210] RBP: 00007f0cfa4b66bc R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 126.103150][T12210] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 126.111644][T12210] R13: 0000000000000016 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:28 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 126.148439][T12254] loop0: detected capacity change from 0 to 253 [ 126.156168][T12238] loop1: detected capacity change from 0 to 4 [ 126.187695][T12238] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:28 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000280)=""/96, 0x60) 12:59:28 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:28 executing program 3: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r2, 0xc058671e, &(0x7f00000008c0)={{}, {0x7}, 0x0, 0x0, 0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)="005d55ba5379311ee461ba0ea073e64910a094408b01964ec6639a2950c47f5cddc395d2b700b14075441cc0030c8c672297b253149ed79e340bfea4a2ef922029c7d5cd0fbaf4681079799440ec6c999a9923bc9425ef2ea716b7cf8b92ed206b79bd957e5a5ed4accf4c9cea194abb3b619459aec6bdcef011a0b0003aaf7a0bc41cd95e2fa6721098df6450ad01c339428b3895343d407c087318addde5d26c56255106a1a641962e7583b307214f89beea644f467ff182fc2c48cae0de811421fe9adfc96c077fb7ddfd18701627c16cb1ccee38d95f44518fac42ef5a1cbf52c8235e8e744a0d9881230315df2c5a0926e9e70273a83f4abe59f37598fc581e2be3cca0e2fe32ebca929d73dcd8339871ea19f9b5d9570af3999fa8f83a627fef06dcc7ae56dfebc6a15b16b7ba29caac3945a9666b4f70b12954c1705ac78a5f83e541", 0x146, 0x0, &(0x7f0000000680)={0x2, 0x147, {0x1, 0xc, 0x4a, "0724a33e1a7f5210328b0c374f461faa00c1e15f0747def98cb46c731175608cb6dae09eefb479c3c3803022f3c7fdf726316767ae6b124bfbf0f04bf672e3624c4e579643ad832948be", 0xf0, "7d2d4aa807ae30f593b96b12c5f32017acb435e12e6d98d40592d766c2617ec02890704ee9b567de23dc5e7feeb2a30c7d34b2b0c6c4e678ec2b4bce43b6257c03106a98a86fc3f98b42807ed50055f80d4d6b01c81e5d50d7c683e31fcb63653a83353a9604d532bbd0787e5f93c8f35d59a0bfa4d9418434a189c308d80113e19ac0297e39751ce5b56b1f4ba6b0c83f2bdbdb12eb513d286c9317650aca8f2236c202671276fe91740ff4eb1825880a391166f9f5c727a8a265c158c067b03dfff6f5acc13243b200c863b0c6cc9838e594e60d9aeb312386a3bbbc21872373c2b5d5d1d39be3ab7b1b9c5b75d345"}, 0xcb, "65320224d60956418c3b12d1bd0006ebdbf4dbc5e39883af461ec26c7ac2166d5cf1bebe7ebb8880dad78c83899f710b89e1b07b0a82ee4f4d13c856bb2c86e55e61608a666718d3576a430b8b023b23a6c249a5293725edef8510cfeebbb04151e7a11c8770d77014edd5fb515b9ab38f01303da21157f8160da10a30b2abb974b737c24da01399528c9f5e2da7bcca61207782d75af44bc84a2fbaa4f04cbaf9047b0de6b70c3fd22a7214c90f57b475e874940f55530798ee208cf3b29296de014d256c6a732a706712"}, 0x21e}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:28 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000080), 0x3, 0x111240) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, &(0x7f0000000340)={0x3, 0x8, [0xa13c, 0x400, 0xca7, 0x3], &(0x7f0000000280)=[0x0]}) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r2, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/121, 0x79}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/54, 0x36}, {&(0x7f00000001c0)=""/178, 0xb2}, {&(0x7f0000000280)}], 0x5, 0x101, 0x1) 12:59:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 126.209093][T12271] loop5: detected capacity change from 0 to 4 [ 126.220194][T12271] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 126.230714][T12273] loop2: detected capacity change from 0 to 4096 12:59:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 126.287196][T12273] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 126.299537][T12273] EXT4-fs (loop2): get root inode failed [ 126.305657][T12273] EXT4-fs (loop2): mount failed [ 126.312036][T12271] FAULT_INJECTION: forcing a failure. [ 126.312036][T12271] name failslab, interval 1, probability 0, space 0, times 0 [ 126.323992][T12292] loop3: detected capacity change from 0 to 253 12:59:28 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0xcd00, 0x0) copy_file_range(r1, &(0x7f0000000080)=0x6, r2, &(0x7f0000000140)=0x2, 0x7, 0x0) 12:59:28 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 126.325129][T12271] CPU: 1 PID: 12271 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 126.332147][T12293] loop1: detected capacity change from 0 to 4 [ 126.340218][T12271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.340231][T12271] Call Trace: [ 126.340239][T12271] dump_stack+0x137/0x19d [ 126.364324][T12271] should_fail+0x23c/0x250 [ 126.368759][T12271] __should_failslab+0x81/0x90 [ 126.373644][T12271] should_failslab+0x5/0x20 [ 126.378156][T12271] kmem_cache_alloc_node+0x58/0x2b0 12:59:28 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:28 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/113, 0x71}, {&(0x7f0000000140)=""/116, 0x74}], 0x2, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 126.383643][T12271] ? __alloc_skb+0xed/0x420 [ 126.388656][T12271] __alloc_skb+0xed/0x420 [ 126.393302][T12271] alloc_uevent_skb+0x5b/0x120 [ 126.398399][T12271] kobject_uevent_env+0x863/0xc40 [ 126.403659][T12271] ? kernfs_put+0x39/0x300 [ 126.408261][T12271] kobject_uevent+0x18/0x20 [ 126.412869][T12271] __loop_clr_fd+0x433/0x640 [ 126.417723][T12271] lo_ioctl+0x9eb/0x11f0 [ 126.422229][T12271] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 126.427610][T12271] ? call_rcu+0x259/0x6c0 [ 126.432048][T12271] ? avc_has_extended_perms+0x5d8/0x7b0 [ 126.437608][T12271] ? kfree+0xf0/0x1d0 [ 126.442811][T12271] ? blkdev_common_ioctl+0x9c3/0x1040 [ 126.448438][T12271] ? selinux_file_ioctl+0x8e0/0x970 [ 126.453764][T12271] ? lo_release+0x120/0x120 [ 126.458280][T12271] blkdev_ioctl+0x1d0/0x3c0 [ 126.462961][T12271] block_ioctl+0x6d/0x80 [ 126.467400][T12271] ? blkdev_iopoll+0x70/0x70 [ 126.472314][T12271] __se_sys_ioctl+0xcb/0x140 [ 126.477812][T12271] __x64_sys_ioctl+0x3f/0x50 [ 126.482999][T12271] do_syscall_64+0x4a/0x90 [ 126.487848][T12271] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.494315][T12271] RIP: 0033:0x466397 [ 126.499414][T12271] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.519718][T12271] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 126.528779][T12271] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466397 12:59:28 executing program 5 (fault-call:0 fault-nth:68): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 126.536829][T12271] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 126.545329][T12271] RBP: 00007f0cfa4b66bc R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 126.553753][T12271] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 126.561715][T12271] R13: 0000000000000016 R14: 00007f0cfa4b6000 R15: 00000000200000c0 [ 126.578049][T12293] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:28 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:28 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:28 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) accept(r2, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000140)=0x80) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) r3 = open(&(0x7f0000001a80)='./file0\x00', 0x301c81, 0x2) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001b00), 0xffffffffffffffff) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f0000001d40)={&(0x7f0000001ac0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001b40)={0x1a0, r4, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xaa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_BEARER={0x100, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}, 0xff}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'ip6gre0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1, @mcast2}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x9, @local, 0x6}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x71}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x5, @mcast1, 0x3e}}}}]}, @TIPC_NLA_BEARER={0x20, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x81}, 0x4000000) 12:59:28 executing program 3: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r2, 0xc058671e, &(0x7f00000008c0)={{}, {0x7}, 0x0, 0x0, 0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)="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", 0x146, 0x0, &(0x7f0000000680)={0x2, 0x147, {0x1, 0xc, 0x4a, "0724a33e1a7f5210328b0c374f461faa00c1e15f0747def98cb46c731175608cb6dae09eefb479c3c3803022f3c7fdf726316767ae6b124bfbf0f04bf672e3624c4e579643ad832948be", 0xf0, "7d2d4aa807ae30f593b96b12c5f32017acb435e12e6d98d40592d766c2617ec02890704ee9b567de23dc5e7feeb2a30c7d34b2b0c6c4e678ec2b4bce43b6257c03106a98a86fc3f98b42807ed50055f80d4d6b01c81e5d50d7c683e31fcb63653a83353a9604d532bbd0787e5f93c8f35d59a0bfa4d9418434a189c308d80113e19ac0297e39751ce5b56b1f4ba6b0c83f2bdbdb12eb513d286c9317650aca8f2236c202671276fe91740ff4eb1825880a391166f9f5c727a8a265c158c067b03dfff6f5acc13243b200c863b0c6cc9838e594e60d9aeb312386a3bbbc21872373c2b5d5d1d39be3ab7b1b9c5b75d345"}, 0xcb, "65320224d60956418c3b12d1bd0006ebdbf4dbc5e39883af461ec26c7ac2166d5cf1bebe7ebb8880dad78c83899f710b89e1b07b0a82ee4f4d13c856bb2c86e55e61608a666718d3576a430b8b023b23a6c249a5293725edef8510cfeebbb04151e7a11c8770d77014edd5fb515b9ab38f01303da21157f8160da10a30b2abb974b737c24da01399528c9f5e2da7bcca61207782d75af44bc84a2fbaa4f04cbaf9047b0de6b70c3fd22a7214c90f57b475e874940f55530798ee208cf3b29296de014d256c6a732a706712"}, 0x21e}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 126.620488][T12322] loop5: detected capacity change from 0 to 4 [ 126.649598][T12322] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 126.664472][T12293] loop1: detected capacity change from 0 to 4 12:59:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 126.676898][T12293] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:28 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/150, 0x96}], 0x2c70f5f214fcce8e, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:28 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) [ 126.729262][T12339] loop2: detected capacity change from 0 to 4096 [ 126.743823][T12340] loop3: detected capacity change from 0 to 253 [ 126.761807][T12322] FAULT_INJECTION: forcing a failure. [ 126.761807][T12322] name failslab, interval 1, probability 0, space 0, times 0 [ 126.774861][T12322] CPU: 1 PID: 12322 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 126.784641][T12322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.795588][T12322] Call Trace: [ 126.799660][T12322] dump_stack+0x137/0x19d [ 126.805155][T12322] should_fail+0x23c/0x250 [ 126.809831][T12322] __should_failslab+0x81/0x90 [ 126.815274][T12322] should_failslab+0x5/0x20 [ 126.819982][T12322] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 126.826051][T12322] ? __kmalloc_node_track_caller+0x30/0x40 [ 126.831950][T12322] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 126.837508][T12322] __kmalloc_node_track_caller+0x30/0x40 [ 126.843884][T12322] ? alloc_uevent_skb+0x5b/0x120 [ 126.849077][T12322] __alloc_skb+0x187/0x420 [ 126.853582][T12322] alloc_uevent_skb+0x5b/0x120 [ 126.858476][T12322] kobject_uevent_env+0x863/0xc40 [ 126.863809][T12322] ? kernfs_put+0x39/0x300 [ 126.868345][T12322] kobject_uevent+0x18/0x20 [ 126.873334][T12322] __loop_clr_fd+0x433/0x640 [ 126.878182][T12322] lo_ioctl+0x9eb/0x11f0 [ 126.882823][T12322] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 126.888345][T12322] ? call_rcu+0x259/0x6c0 [ 126.892703][T12322] ? avc_has_extended_perms+0x5d8/0x7b0 [ 126.898364][T12322] ? kfree+0xf0/0x1d0 [ 126.902374][T12322] ? blkdev_common_ioctl+0x9c3/0x1040 [ 126.907945][T12322] ? selinux_file_ioctl+0x8e0/0x970 [ 126.913299][T12322] ? lo_release+0x120/0x120 [ 126.917880][T12322] blkdev_ioctl+0x1d0/0x3c0 [ 126.922680][T12322] block_ioctl+0x6d/0x80 [ 126.927090][T12322] ? blkdev_iopoll+0x70/0x70 [ 126.932067][T12322] __se_sys_ioctl+0xcb/0x140 [ 126.936656][T12322] __x64_sys_ioctl+0x3f/0x50 [ 126.941476][T12322] do_syscall_64+0x4a/0x90 [ 126.946855][T12322] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.953123][T12322] RIP: 0033:0x466397 [ 126.957310][T12322] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.978382][T12322] RSP: 002b:00007f0cfa4b5fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 126.989020][T12322] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466397 [ 126.997987][T12322] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 127.006784][T12322] RBP: 00007f0cfa4b66bc R08: 00007f0cfa4b6040 R09: 0000000020000000 [ 127.015101][T12322] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 127.023486][T12322] R13: 0000000000000016 R14: 00007f0cfa4b6000 R15: 00000000200000c0 12:59:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:28 executing program 3: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r2, 0xc058671e, &(0x7f00000008c0)={{}, {0x7}, 0x0, 0x0, 0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)="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", 0x146, 0x0, &(0x7f0000000680)={0x2, 0x147, {0x1, 0xc, 0x4a, "0724a33e1a7f5210328b0c374f461faa00c1e15f0747def98cb46c731175608cb6dae09eefb479c3c3803022f3c7fdf726316767ae6b124bfbf0f04bf672e3624c4e579643ad832948be", 0xf0, "7d2d4aa807ae30f593b96b12c5f32017acb435e12e6d98d40592d766c2617ec02890704ee9b567de23dc5e7feeb2a30c7d34b2b0c6c4e678ec2b4bce43b6257c03106a98a86fc3f98b42807ed50055f80d4d6b01c81e5d50d7c683e31fcb63653a83353a9604d532bbd0787e5f93c8f35d59a0bfa4d9418434a189c308d80113e19ac0297e39751ce5b56b1f4ba6b0c83f2bdbdb12eb513d286c9317650aca8f2236c202671276fe91740ff4eb1825880a391166f9f5c727a8a265c158c067b03dfff6f5acc13243b200c863b0c6cc9838e594e60d9aeb312386a3bbbc21872373c2b5d5d1d39be3ab7b1b9c5b75d345"}, 0xcb, "65320224d60956418c3b12d1bd0006ebdbf4dbc5e39883af461ec26c7ac2166d5cf1bebe7ebb8880dad78c83899f710b89e1b07b0a82ee4f4d13c856bb2c86e55e61608a666718d3576a430b8b023b23a6c249a5293725edef8510cfeebbb04151e7a11c8770d77014edd5fb515b9ab38f01303da21157f8160da10a30b2abb974b737c24da01399528c9f5e2da7bcca61207782d75af44bc84a2fbaa4f04cbaf9047b0de6b70c3fd22a7214c90f57b475e874940f55530798ee208cf3b29296de014d256c6a732a706712"}, 0x21e}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:29 executing program 5 (fault-call:0 fault-nth:69): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 127.059302][T12339] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 127.071087][T12353] loop1: detected capacity change from 0 to 4 [ 127.072208][T12339] EXT4-fs (loop2): get root inode failed [ 127.083915][T12339] EXT4-fs (loop2): mount failed [ 127.109957][T12353] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 127.127720][T12374] loop3: detected capacity change from 0 to 253 [ 127.152768][T12378] loop5: detected capacity change from 0 to 4 12:59:29 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:29 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="bd27e46ecebce8a2b9012b1a9fd3a86ea536aa46a95200ff003617552d3a66553ad72ee74b4d2d8fbb0af3664b4d", 0x2e}, {&(0x7f00000000c0)="3bfac1b29f67a66e44bd9670937fdf3b4158d130999676d9d95f351f0e8767f526d577dea273ac1b67aaca805663095612ad0456ea09", 0x36}, {&(0x7f0000000140)="5d0a27b3b1b56ad43a802746db508198478c0de6181f36fd44807d7a0385e04b4a", 0x21}], 0x3) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:29 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f00000008c0)={{}, {0x7}, 0x0, 0x0, 0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)="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", 0x146, 0x0, &(0x7f0000000680)={0x2, 0x147, {0x1, 0xc, 0x4a, "0724a33e1a7f5210328b0c374f461faa00c1e15f0747def98cb46c731175608cb6dae09eefb479c3c3803022f3c7fdf726316767ae6b124bfbf0f04bf672e3624c4e579643ad832948be", 0xf0, "7d2d4aa807ae30f593b96b12c5f32017acb435e12e6d98d40592d766c2617ec02890704ee9b567de23dc5e7feeb2a30c7d34b2b0c6c4e678ec2b4bce43b6257c03106a98a86fc3f98b42807ed50055f80d4d6b01c81e5d50d7c683e31fcb63653a83353a9604d532bbd0787e5f93c8f35d59a0bfa4d9418434a189c308d80113e19ac0297e39751ce5b56b1f4ba6b0c83f2bdbdb12eb513d286c9317650aca8f2236c202671276fe91740ff4eb1825880a391166f9f5c727a8a265c158c067b03dfff6f5acc13243b200c863b0c6cc9838e594e60d9aeb312386a3bbbc21872373c2b5d5d1d39be3ab7b1b9c5b75d345"}, 0xcb, "65320224d60956418c3b12d1bd0006ebdbf4dbc5e39883af461ec26c7ac2166d5cf1bebe7ebb8880dad78c83899f710b89e1b07b0a82ee4f4d13c856bb2c86e55e61608a666718d3576a430b8b023b23a6c249a5293725edef8510cfeebbb04151e7a11c8770d77014edd5fb515b9ab38f01303da21157f8160da10a30b2abb974b737c24da01399528c9f5e2da7bcca61207782d75af44bc84a2fbaa4f04cbaf9047b0de6b70c3fd22a7214c90f57b475e874940f55530798ee208cf3b29296de014d256c6a732a706712"}, 0x21e}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 127.201155][T12378] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 127.226403][T12353] loop1: detected capacity change from 0 to 4 [ 127.254758][T12353] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 127.267091][T12400] loop2: detected capacity change from 0 to 4096 [ 127.283871][T12403] loop5: detected capacity change from 0 to 4 [ 127.289498][T12400] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated 12:59:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:29 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) r2 = socket(0x10, 0x803, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f0000000380)={{}, {0x3}, 0x40, 0x0, 0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)="549771691f273fe1e344972eed35d58bb727be5b2d18c13452ecdb44b86bb8f3ba2aefaedaa95aeb9909f85f066b81cdaa4b61196dd5755fe1e9360ba0cb84cfd7ab36dc16ee88590209695e838f7ad55be499bf9c1a7785cf5d7aad2d8b9b46be1726108217015dab9c6df09243b065c68d1fd217168e8cf371aaecd7664538baaae293dd8b0c9a0a2d91a2cc37351e", 0x90, 0x0, &(0x7f0000000200)={0x2, 0x82, {0x0, 0xc, 0x75, "6b3c3230b9d1898766816a410d01e5ea69f2c52bcfba1e64fd4ac942aad6631ac5d53d16565824843731518adf8b55b6e723febd444085421e7e9078dd584648cce9a0587025a68f4bd0e77972db92c34e67fe7b710905e7bb17e21b164d5236f7bc907469bff4f52b19f3c9ea20c11bdb990e8913"}, 0xdf, "d01bec5e70b395c69738fb221444bbaf6e592496ab50d2a781b92346118aeec89572581141d128ec77de7fdb0c1e5264018a39cad9e28d8541e31a70645b76633fde1df1175d0b7264434f9f5ab25f379298e20896750b8c42152416e5ba883ab56b179e3c3098f5c9e80eddf438a013693102a091e374906e2224c6b7674730be4d9ff99316b4840765f04da03950326849861d134fac0f9c54588710825feb86877275f0981377ffc0e7035a51ca175703e9cdcb4a19aa615ba6b87737c4ea77246f878d259445c03936be88093772fc62c32969a033be1cc520661d8a54"}, 0x16d}) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bind(r3, &(0x7f0000000480)=@ll={0x11, 0x17, 0x0, 0x1, 0x6, 0x6, @local}, 0x80) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$getown(r2, 0x9) [ 127.302743][T12403] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 127.303341][T12400] EXT4-fs (loop2): get root inode failed [ 127.316893][T12406] loop3: detected capacity change from 0 to 253 [ 127.318623][T12400] EXT4-fs (loop2): mount failed 12:59:29 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f00000008c0)={{}, {0x7}, 0x0, 0x0, 0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)="005d55ba5379311ee461ba0ea073e64910a094408b01964ec6639a2950c47f5cddc395d2b700b14075441cc0030c8c672297b253149ed79e340bfea4a2ef922029c7d5cd0fbaf4681079799440ec6c999a9923bc9425ef2ea716b7cf8b92ed206b79bd957e5a5ed4accf4c9cea194abb3b619459aec6bdcef011a0b0003aaf7a0bc41cd95e2fa6721098df6450ad01c339428b3895343d407c087318addde5d26c56255106a1a641962e7583b307214f89beea644f467ff182fc2c48cae0de811421fe9adfc96c077fb7ddfd18701627c16cb1ccee38d95f44518fac42ef5a1cbf52c8235e8e744a0d9881230315df2c5a0926e9e70273a83f4abe59f37598fc581e2be3cca0e2fe32ebca929d73dcd8339871ea19f9b5d9570af3999fa8f83a627fef06dcc7ae56dfebc6a15b16b7ba29caac3945a9666b4f70b12954c1705ac78a5f83e541", 0x146, 0x0, &(0x7f0000000680)={0x2, 0x147, {0x1, 0xc, 0x4a, "0724a33e1a7f5210328b0c374f461faa00c1e15f0747def98cb46c731175608cb6dae09eefb479c3c3803022f3c7fdf726316767ae6b124bfbf0f04bf672e3624c4e579643ad832948be", 0xf0, "7d2d4aa807ae30f593b96b12c5f32017acb435e12e6d98d40592d766c2617ec02890704ee9b567de23dc5e7feeb2a30c7d34b2b0c6c4e678ec2b4bce43b6257c03106a98a86fc3f98b42807ed50055f80d4d6b01c81e5d50d7c683e31fcb63653a83353a9604d532bbd0787e5f93c8f35d59a0bfa4d9418434a189c308d80113e19ac0297e39751ce5b56b1f4ba6b0c83f2bdbdb12eb513d286c9317650aca8f2236c202671276fe91740ff4eb1825880a391166f9f5c727a8a265c158c067b03dfff6f5acc13243b200c863b0c6cc9838e594e60d9aeb312386a3bbbc21872373c2b5d5d1d39be3ab7b1b9c5b75d345"}, 0xcb, "65320224d60956418c3b12d1bd0006ebdbf4dbc5e39883af461ec26c7ac2166d5cf1bebe7ebb8880dad78c83899f710b89e1b07b0a82ee4f4d13c856bb2c86e55e61608a666718d3576a430b8b023b23a6c249a5293725edef8510cfeebbb04151e7a11c8770d77014edd5fb515b9ab38f01303da21157f8160da10a30b2abb974b737c24da01399528c9f5e2da7bcca61207782d75af44bc84a2fbaa4f04cbaf9047b0de6b70c3fd22a7214c90f57b475e874940f55530798ee208cf3b29296de014d256c6a732a706712"}, 0x21e}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:29 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:29 executing program 0: ioctl$BTRFS_IOC_INO_PATHS(0xffffffffffffffff, 0xc0389423, &(0x7f00000000c0)={0x1ff, 0x38, [0x7, 0x4, 0x4, 0x9], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) 12:59:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 127.452009][T12426] loop3: detected capacity change from 0 to 253 [ 127.492082][T12441] loop2: detected capacity change from 0 to 4096 12:59:29 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = syz_open_dev$vcsu(&(0x7f00000009c0), 0x0, 0x20400) openat(r2, &(0x7f0000000a00)='./file0\x00', 0x800, 0x10e) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000080)=""/90, 0x58}, {&(0x7f0000000140)=""/90, 0x5a}, {&(0x7f0000001fc0)=""/4098, 0x1002}, {&(0x7f0000000280)=""/132, 0x84}], 0x4, 0x9, 0x9) r3 = socket$nl_generic(0x10, 0x3, 0x10) readv(r3, &(0x7f0000000740)=[{&(0x7f0000000340)=""/142, 0x8e}, {&(0x7f00000001c0)=""/103, 0x67}, {&(0x7f0000000480)=""/102, 0x66}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/221, 0xdd}, {&(0x7f00000006c0)=""/100, 0x64}], 0x6) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400), r4) open_tree(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x1800) r5 = accept4(r0, &(0x7f00000008c0)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000940)=0x80, 0x800) syz_genetlink_get_family_id$ethtool(&(0x7f0000000880), r5) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, 0xffffffff, 0x0) lsetxattr(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000980)=@known='com.apple.system.Security\x00', &(0x7f0000000840)='team\x00', 0x5, 0x3) 12:59:29 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f00000008c0)={{}, {0x7}, 0x0, 0x0, 0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)="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", 0x146, 0x0, &(0x7f0000000680)={0x2, 0x147, {0x1, 0xc, 0x4a, "0724a33e1a7f5210328b0c374f461faa00c1e15f0747def98cb46c731175608cb6dae09eefb479c3c3803022f3c7fdf726316767ae6b124bfbf0f04bf672e3624c4e579643ad832948be", 0xf0, "7d2d4aa807ae30f593b96b12c5f32017acb435e12e6d98d40592d766c2617ec02890704ee9b567de23dc5e7feeb2a30c7d34b2b0c6c4e678ec2b4bce43b6257c03106a98a86fc3f98b42807ed50055f80d4d6b01c81e5d50d7c683e31fcb63653a83353a9604d532bbd0787e5f93c8f35d59a0bfa4d9418434a189c308d80113e19ac0297e39751ce5b56b1f4ba6b0c83f2bdbdb12eb513d286c9317650aca8f2236c202671276fe91740ff4eb1825880a391166f9f5c727a8a265c158c067b03dfff6f5acc13243b200c863b0c6cc9838e594e60d9aeb312386a3bbbc21872373c2b5d5d1d39be3ab7b1b9c5b75d345"}, 0xcb, "65320224d60956418c3b12d1bd0006ebdbf4dbc5e39883af461ec26c7ac2166d5cf1bebe7ebb8880dad78c83899f710b89e1b07b0a82ee4f4d13c856bb2c86e55e61608a666718d3576a430b8b023b23a6c249a5293725edef8510cfeebbb04151e7a11c8770d77014edd5fb515b9ab38f01303da21157f8160da10a30b2abb974b737c24da01399528c9f5e2da7bcca61207782d75af44bc84a2fbaa4f04cbaf9047b0de6b70c3fd22a7214c90f57b475e874940f55530798ee208cf3b29296de014d256c6a732a706712"}, 0x21e}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 127.498761][T12444] loop1: detected capacity change from 0 to 4 [ 127.505348][T12439] loop5: detected capacity change from 0 to 4 [ 127.531877][T12444] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 127.541941][T12441] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 127.554736][T12441] EXT4-fs (loop2): get root inode failed [ 127.556812][T12460] loop3: detected capacity change from 0 to 253 [ 127.560674][T12441] EXT4-fs (loop2): mount failed [ 127.563844][T12439] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 127.641215][T12439] loop5: detected capacity change from 0 to 4 [ 127.661081][T12439] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 127.672064][T12444] loop1: detected capacity change from 0 to 4 12:59:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:29 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f00000008c0)={{}, {0x7}, 0x0, 0x0, 0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)="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", 0x146, 0x0, &(0x7f0000000680)={0x2, 0x147, {0x1, 0xc, 0x4a, "0724a33e1a7f5210328b0c374f461faa00c1e15f0747def98cb46c731175608cb6dae09eefb479c3c3803022f3c7fdf726316767ae6b124bfbf0f04bf672e3624c4e579643ad832948be", 0xf0, "7d2d4aa807ae30f593b96b12c5f32017acb435e12e6d98d40592d766c2617ec02890704ee9b567de23dc5e7feeb2a30c7d34b2b0c6c4e678ec2b4bce43b6257c03106a98a86fc3f98b42807ed50055f80d4d6b01c81e5d50d7c683e31fcb63653a83353a9604d532bbd0787e5f93c8f35d59a0bfa4d9418434a189c308d80113e19ac0297e39751ce5b56b1f4ba6b0c83f2bdbdb12eb513d286c9317650aca8f2236c202671276fe91740ff4eb1825880a391166f9f5c727a8a265c158c067b03dfff6f5acc13243b200c863b0c6cc9838e594e60d9aeb312386a3bbbc21872373c2b5d5d1d39be3ab7b1b9c5b75d345"}, 0xcb, "65320224d60956418c3b12d1bd0006ebdbf4dbc5e39883af461ec26c7ac2166d5cf1bebe7ebb8880dad78c83899f710b89e1b07b0a82ee4f4d13c856bb2c86e55e61608a666718d3576a430b8b023b23a6c249a5293725edef8510cfeebbb04151e7a11c8770d77014edd5fb515b9ab38f01303da21157f8160da10a30b2abb974b737c24da01399528c9f5e2da7bcca61207782d75af44bc84a2fbaa4f04cbaf9047b0de6b70c3fd22a7214c90f57b475e874940f55530798ee208cf3b29296de014d256c6a732a706712"}, 0x21e}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:29 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 127.690173][T12444] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 127.773043][T12487] loop5: detected capacity change from 0 to 4 [ 127.800464][T12488] loop3: detected capacity change from 0 to 253 [ 127.808196][T12492] loop2: detected capacity change from 0 to 4096 [ 127.808243][T12493] loop1: detected capacity change from 0 to 4 [ 127.830974][T12488] ================================================================== [ 127.839614][T12488] BUG: KCSAN: data-race in __blkdev_get / __blkdev_put [ 127.846996][T12488] [ 127.849500][T12488] write to 0xffff8881013780e0 of 4 bytes by task 1038 on cpu 0: [ 127.858107][T12488] __blkdev_get+0xc1/0x6d0 [ 127.862730][T12488] blkdev_get_by_dev+0x9b/0x480 [ 127.867580][T12488] blkdev_open+0xb3/0x130 [ 127.872033][T12488] do_dentry_open+0x53e/0x830 [ 127.876708][T12488] vfs_open+0x43/0x50 [ 127.881097][T12488] path_openat+0x184e/0x20b0 [ 127.885864][T12488] do_filp_open+0xd9/0x1f0 [ 127.890703][T12488] do_sys_openat2+0xa3/0x250 [ 127.896108][T12488] __x64_sys_open+0xe2/0x110 [ 127.901097][T12488] do_syscall_64+0x4a/0x90 [ 127.905972][T12488] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.911946][T12488] [ 127.914445][T12488] read to 0xffff8881013780e0 of 4 bytes by task 12488 on cpu 1: [ 127.922864][T12488] __blkdev_put+0x5a/0x460 [ 127.927727][T12488] blkdev_put+0x23e/0x2c0 [ 127.932460][T12488] blkdev_close+0x47/0x50 [ 127.937425][T12488] __fput+0x25b/0x4e0 [ 127.941834][T12488] ____fput+0x11/0x20 [ 127.945806][T12488] task_work_run+0xae/0x130 [ 127.950628][T12488] exit_to_user_mode_prepare+0x156/0x190 [ 127.956642][T12488] syscall_exit_to_user_mode+0x20/0x40 [ 127.962735][T12488] do_syscall_64+0x56/0x90 [ 127.967436][T12488] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.973406][T12488] [ 127.975736][T12488] value changed: 0x00000001 -> 0x00000002 [ 127.981527][T12488] [ 127.984119][T12488] Reported by Kernel Concurrency Sanitizer on: [ 127.991131][T12488] CPU: 1 PID: 12488 Comm: syz-executor.3 Not tainted 5.13.0-rc4-syzkaller #0 [ 128.000894][T12488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.012515][T12488] ================================================================== 12:59:29 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 128.028599][T12487] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 128.039371][T12493] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 128.066424][T12492] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated 12:59:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 128.079598][T12492] EXT4-fs (loop2): get root inode failed [ 128.086443][T12492] EXT4-fs (loop2): mount failed [ 128.112721][T12487] loop5: detected capacity change from 0 to 4 [ 128.119982][T12487] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 128.126453][T12493] loop1: detected capacity change from 0 to 4 [ 128.132197][T12516] loop3: detected capacity change from 0 to 253 [ 128.150587][T12493] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:30 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:30 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 128.423956][T12552] loop1: detected capacity change from 0 to 4 [ 128.432438][T12552] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 128.437782][T12551] loop2: detected capacity change from 0 to 4096 [ 128.456918][T12555] loop5: detected capacity change from 0 to 4 [ 128.473010][T12555] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 128.473899][T12553] loop3: detected capacity change from 0 to 253 [ 128.509018][T12552] loop1: detected capacity change from 0 to 4 12:59:30 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 128.526656][T12552] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 128.537574][T12551] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 128.550238][T12551] EXT4-fs (loop2): get root inode failed [ 128.556170][T12551] EXT4-fs (loop2): mount failed 12:59:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:30 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 128.573525][T12555] loop5: detected capacity change from 0 to 4 [ 128.587135][T12555] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 128.663760][T12596] loop1: detected capacity change from 0 to 4 [ 128.664347][T12593] loop3: detected capacity change from 0 to 253 [ 128.685473][T12595] loop2: detected capacity change from 0 to 4096 12:59:30 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 128.710510][T12595] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 128.723021][T12595] EXT4-fs (loop2): get root inode failed [ 128.728745][T12595] EXT4-fs (loop2): mount failed [ 128.735304][T12596] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x0, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 128.782991][T12617] loop5: detected capacity change from 0 to 4 [ 128.800848][T12617] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 128.810564][T12596] loop1: detected capacity change from 0 to 4 [ 128.812901][T12618] loop3: detected capacity change from 0 to 253 [ 128.826007][T12596] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x0, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:30 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:30 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) socket(0x10, 0x803, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 128.855575][T12617] loop5: detected capacity change from 0 to 4 [ 128.881128][T12617] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x0, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 128.983993][T12649] loop2: detected capacity change from 0 to 4096 [ 128.995123][T12652] loop3: detected capacity change from 0 to 253 [ 128.995123][T12650] loop1: detected capacity change from 0 to 4 12:59:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 129.037564][T12650] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:31 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 129.075347][T12649] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 129.088267][T12649] EXT4-fs (loop2): get root inode failed [ 129.094042][T12649] EXT4-fs (loop2): mount failed [ 129.145909][T12650] loop1: detected capacity change from 0 to 4 [ 129.156054][T12670] loop5: detected capacity change from 0 to 4 [ 129.171212][T12674] loop3: detected capacity change from 0 to 253 [ 129.185662][T12650] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:31 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:31 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 129.212988][T12670] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 129.308031][T12697] loop1: detected capacity change from 0 to 4 [ 129.315439][T12695] loop2: detected capacity change from 0 to 4096 [ 129.321890][T12670] loop5: detected capacity change from 0 to 4 [ 129.341534][T12697] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 129.370716][T12703] loop3: detected capacity change from 0 to 253 [ 129.372413][T12670] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 129.389901][T12695] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 129.402249][T12695] EXT4-fs (loop2): get root inode failed [ 129.408253][T12695] EXT4-fs (loop2): mount failed 12:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:31 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 129.420416][T12697] loop1: detected capacity change from 0 to 4 [ 129.431643][T12697] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:31 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 129.562834][T12730] loop3: detected capacity change from 0 to 253 [ 129.580204][T12737] loop2: detected capacity change from 0 to 4096 [ 129.590303][T12738] loop1: detected capacity change from 0 to 4 12:59:31 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 129.608117][T12738] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 129.617643][T12745] loop5: detected capacity change from 0 to 4 [ 129.626607][T12737] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 129.638780][T12737] EXT4-fs (loop2): get root inode failed [ 129.638850][T12745] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 129.644698][T12737] EXT4-fs (loop2): mount failed 12:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 129.718567][T12745] loop5: detected capacity change from 0 to 4 [ 129.725196][T12738] loop1: detected capacity change from 0 to 4 12:59:31 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 129.759338][T12738] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 129.770285][T12745] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x184, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 129.816056][T12775] loop3: detected capacity change from 0 to 253 [ 129.838155][T12782] loop2: detected capacity change from 0 to 4096 12:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 129.876396][T12782] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 129.888790][T12782] EXT4-fs (loop2): get root inode failed [ 129.894592][T12782] EXT4-fs (loop2): mount failed 12:59:31 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:31 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 129.980220][T12800] loop5: detected capacity change from 0 to 4 [ 129.986810][T12803] loop1: detected capacity change from 0 to 4 [ 130.031784][T12800] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 130.047996][T12803] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 130.066235][T12804] loop3: detected capacity change from 0 to 253 12:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff00", 0x9, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 130.094121][T12818] loop2: detected capacity change from 0 to 4096 12:59:32 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff00", 0x9, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 130.147481][T12818] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 130.159545][T12818] EXT4-fs (loop2): get root inode failed [ 130.165316][T12818] EXT4-fs (loop2): mount failed [ 130.192801][T12803] loop1: detected capacity change from 0 to 4 12:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff00", 0x9, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:32 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x185, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:32 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 130.257112][T12841] loop3: detected capacity change from 0 to 253 [ 130.294844][T12843] loop5: detected capacity change from 0 to 4 12:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000", 0xe, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 130.346148][T12843] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 130.372343][T12851] loop2: detected capacity change from 0 to 4096 [ 130.380652][T12861] loop3: detected capacity change from 0 to 253 12:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000", 0xe, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:32 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 130.407283][T12859] loop1: detected capacity change from 0 to 4 [ 130.427615][T12851] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 130.440193][T12851] EXT4-fs (loop2): get root inode failed [ 130.445968][T12851] EXT4-fs (loop2): mount failed [ 130.456817][T12859] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 130.470212][T12843] loop5: detected capacity change from 0 to 4 [ 130.481481][T12843] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:32 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000", 0xe, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 130.514725][T12884] loop3: detected capacity change from 0 to 253 [ 130.555425][T12859] loop1: detected capacity change from 0 to 4 [ 130.570125][T12895] loop2: detected capacity change from 0 to 4096 [ 130.572058][T12859] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b000000000080", 0x10, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:32 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 130.597230][T12895] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 130.609566][T12895] EXT4-fs (loop2): get root inode failed [ 130.615226][T12895] EXT4-fs (loop2): mount failed [ 130.621372][T12906] loop5: detected capacity change from 0 to 4 12:59:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1ee, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b000000000080", 0x10, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 130.658476][T12905] loop3: detected capacity change from 0 to 253 [ 130.670747][T12906] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b000000000080", 0x10, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 130.766422][T12906] loop5: detected capacity change from 0 to 4 [ 130.772957][T12920] loop1: detected capacity change from 0 to 4 [ 130.785565][T12906] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 130.796225][T12920] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 130.807976][T12925] loop2: detected capacity change from 0 to 4096 12:59:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000", 0x11, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 130.866149][T12920] loop1: detected capacity change from 0 to 4 [ 130.888578][T12948] loop5: detected capacity change from 0 to 4 [ 130.896243][T12948] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000", 0x11, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000", 0x11, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 130.909352][T12920] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 130.919150][T12925] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 130.931214][T12935] loop3: detected capacity change from 0 to 253 [ 130.931213][T12925] EXT4-fs (loop2): get root inode failed [ 130.931233][T12925] EXT4-fs (loop2): mount failed 12:59:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x204, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:32 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 131.009502][T12948] loop5: detected capacity change from 0 to 4 [ 131.044311][T12948] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/96, 0x60) 12:59:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 131.074635][T12971] loop1: detected capacity change from 0 to 4 [ 131.088059][T12975] loop3: detected capacity change from 0 to 253 [ 131.108583][T12971] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:33 executing program 3: openat2(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 131.123004][T12972] loop2: detected capacity change from 0 to 4096 [ 131.140475][T12972] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 131.162454][T12972] EXT4-fs (loop2): mount failed 12:59:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/96, 0x60) [ 131.192605][T12971] loop1: detected capacity change from 0 to 4 [ 131.201058][T12971] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:33 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 131.235284][T12995] loop5: detected capacity change from 0 to 4 [ 131.244291][T12995] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 131.255489][T12998] loop3: detected capacity change from 0 to 253 12:59:33 executing program 3: openat2(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 131.284192][T13007] loop2: detected capacity change from 0 to 4096 12:59:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x211, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/96, 0x60) [ 131.313131][T12995] loop5: detected capacity change from 0 to 4 [ 131.333259][T12995] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 131.350279][T13007] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 131.363820][T13022] loop1: detected capacity change from 0 to 4 [ 131.366498][T13018] loop3: detected capacity change from 0 to 253 [ 131.377318][T13022] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 131.389205][T13007] EXT4-fs (loop2): mount failed 12:59:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) 12:59:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x27a, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:33 executing program 3: openat2(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) 12:59:33 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 131.556361][T13038] loop3: detected capacity change from 0 to 253 [ 131.564972][T13039] loop1: detected capacity change from 0 to 4 [ 131.579385][T13039] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 131.591819][T13043] loop5: detected capacity change from 0 to 4 12:59:33 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) [ 131.603864][T13043] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 131.625617][T13051] loop2: detected capacity change from 0 to 4096 [ 131.640148][T13039] loop1: detected capacity change from 0 to 4 12:59:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 131.662043][T13039] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 131.675065][T13051] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 131.696610][T13062] loop3: detected capacity change from 0 to 253 [ 131.703116][T13051] EXT4-fs (loop2): mount failed 12:59:33 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x27b, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:33 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:33 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 131.738455][T13074] loop5: detected capacity change from 0 to 4 [ 131.754011][T13074] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 131.805841][T13085] loop1: detected capacity change from 0 to 4 [ 131.817846][T13085] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 131.822921][T13086] loop3: detected capacity change from 0 to 253 [ 131.829777][T13090] loop4: detected capacity change from 0 to 4096 [ 131.840367][T13089] loop2: detected capacity change from 0 to 4096 [ 131.851773][T13089] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 131.864368][T13089] EXT4-fs (loop2): get root inode failed [ 131.870346][T13089] EXT4-fs (loop2): mount failed [ 131.877877][T13090] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 131.890157][T13090] EXT4-fs (loop4): get root inode failed [ 131.895993][T13090] EXT4-fs (loop4): mount failed 12:59:33 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:33 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:33 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f00000008c0)={{}, {0x7}, 0x0, 0x0, 0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)="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", 0x146, 0x0, &(0x7f0000000680)={0x2, 0x147, {0x1, 0xc, 0x4a, "0724a33e1a7f5210328b0c374f461faa00c1e15f0747def98cb46c731175608cb6dae09eefb479c3c3803022f3c7fdf726316767ae6b124bfbf0f04bf672e3624c4e579643ad832948be", 0xf0, "7d2d4aa807ae30f593b96b12c5f32017acb435e12e6d98d40592d766c2617ec02890704ee9b567de23dc5e7feeb2a30c7d34b2b0c6c4e678ec2b4bce43b6257c03106a98a86fc3f98b42807ed50055f80d4d6b01c81e5d50d7c683e31fcb63653a83353a9604d532bbd0787e5f93c8f35d59a0bfa4d9418434a189c308d80113e19ac0297e39751ce5b56b1f4ba6b0c83f2bdbdb12eb513d286c9317650aca8f2236c202671276fe91740ff4eb1825880a391166f9f5c727a8a265c158c067b03dfff6f5acc13243b200c863b0c6cc9838e594e60d9aeb312386a3bbbc21872373c2b5d5d1d39be3ab7b1b9c5b75d345"}, 0xcb, "65320224d60956418c3b12d1bd0006ebdbf4dbc5e39883af461ec26c7ac2166d5cf1bebe7ebb8880dad78c83899f710b89e1b07b0a82ee4f4d13c856bb2c86e55e61608a666718d3576a430b8b023b23a6c249a5293725edef8510cfeebbb04151e7a11c8770d77014edd5fb515b9ab38f01303da21157f8160da10a30b2abb974b737c24da01399528c9f5e2da7bcca61207782d75af44bc84a2fbaa4f04cbaf9047b0de6b70c3fd22a7214c90f57b475e874940f55530798ee208cf3b29296de014d256c6a732a706712"}, 0x21e}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 131.934180][T13074] loop5: detected capacity change from 0 to 4 [ 131.962032][T13074] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 131.980504][T13085] loop1: detected capacity change from 0 to 4 [ 131.991435][T13085] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 132.005793][T13116] loop2: detected capacity change from 0 to 4096 [ 132.026843][T13117] loop3: detected capacity change from 0 to 253 [ 132.066041][T13122] loop4: detected capacity change from 0 to 253 [ 132.066060][T13116] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 132.085165][T13116] EXT4-fs (loop2): get root inode failed [ 132.090888][T13116] EXT4-fs (loop2): mount failed [ 132.098115][T13134] loop1: detected capacity change from 0 to 4 [ 132.106439][T13133] loop5: detected capacity change from 0 to 4 12:59:34 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6204c080, &(0x7f0000000080)="672b8aa34c8b442b8e3741b16376d4a3ec0bc50f9313e30c180596911327972429e32566a35b8ee189591759b785ac870b4bf34959476dce236ee5497a2a4da5447e470415ed468554dfab128108b32a380dd824b437897795d3e1666866f8e00db7e7268ddd0d200c89466393fa2e1ed40fe7697f2ac4b4775b0a05c19479433ed878007fe13a793f3e5706634f6c8b79bccacb95821ba53f9a83c75dbb9cb8cbc951559d8d7bd265c1e23a2ec2315ec4b203e0c5a4f6320d94", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9a696b8e0338263f0635b534e1c86b901ea6ab9cf19fa8298de9008933f94b4de097e93ade673275b9b7cc11f9bea54a33e6bcf66c14fabb606b018d71ff7782d2d2656ae908103a5d7fb9d8fb425be5623181be49e82538978110f2ce866b94") [ 132.126748][T13134] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:34 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040), 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 132.178739][T13133] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 132.201174][T13134] loop1: detected capacity change from 0 to 4 [ 132.214747][T13134] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 132.224268][T13147] loop2: detected capacity change from 0 to 4096 12:59:34 executing program 4 (fault-call:5 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 132.259649][T13157] loop3: detected capacity change from 0 to 253 [ 132.270001][T13147] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 132.282470][T13147] EXT4-fs (loop2): get root inode failed [ 132.288202][T13147] EXT4-fs (loop2): mount failed 12:59:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x402, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 132.340256][T13133] loop5: detected capacity change from 0 to 4 [ 132.352283][T13133] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 132.383798][T13181] FAULT_INJECTION: forcing a failure. [ 132.383798][T13181] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 132.397265][T13181] CPU: 0 PID: 13181 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 132.406205][T13181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.416534][T13181] Call Trace: [ 132.419817][T13181] dump_stack+0x137/0x19d [ 132.424196][T13181] should_fail+0x23c/0x250 [ 132.428622][T13181] should_fail_usercopy+0x16/0x20 [ 132.434016][T13181] _copy_to_iter+0x17c/0xdd0 [ 132.438801][T13181] ? __skb_try_recv_from_queue+0x3d0/0x430 [ 132.445052][T13181] ? check_stack_object+0x61/0x70 [ 132.450316][T13181] ? __virt_addr_valid+0x15a/0x1a0 [ 132.455619][T13181] ? __check_object_size+0x253/0x310 [ 132.461011][T13181] simple_copy_to_iter+0x4c/0x60 [ 132.466007][T13181] ? skb_copy_datagram_iter+0xc0/0xc0 [ 132.471392][T13181] __skb_datagram_iter+0xac/0x520 [ 132.476548][T13181] skb_copy_datagram_iter+0x39/0xc0 [ 132.481858][T13181] netlink_recvmsg+0x1ab/0x760 [ 132.487621][T13181] sock_read_iter+0x19e/0x1e0 [ 132.492570][T13181] vfs_read+0x565/0x5d0 [ 132.497106][T13181] ksys_read+0xce/0x180 [ 132.501455][T13181] ? fpregs_assert_state_consistent+0x7d/0x90 [ 132.507953][T13181] __x64_sys_read+0x3e/0x50 [ 132.512731][T13181] do_syscall_64+0x4a/0x90 [ 132.517163][T13181] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.523093][T13181] RIP: 0033:0x4665d9 [ 132.527307][T13181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.547737][T13181] RSP: 002b:00007f0898e98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 132.556653][T13181] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 132.564926][T13181] RDX: 0000000000000060 RSI: 0000000020000280 RDI: 0000000000000004 [ 132.573263][T13181] RBP: 00007f0898e981d0 R08: 0000000000000000 R09: 0000000000000000 12:59:34 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040), 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) 12:59:34 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 132.581264][T13181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.589347][T13181] R13: 00007fff35d35c3f R14: 00007f0898e98300 R15: 0000000000022000 12:59:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 132.647304][T13182] loop1: detected capacity change from 0 to 4 [ 132.666244][T13187] loop3: detected capacity change from 0 to 253 [ 132.679362][T13182] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 12:59:34 executing program 4 (fault-call:5 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 132.691892][T13191] loop2: detected capacity change from 0 to 4096 12:59:34 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040), 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 132.721000][T13199] loop5: detected capacity change from 0 to 4 [ 132.729197][T13205] FAULT_INJECTION: forcing a failure. [ 132.729197][T13205] name failslab, interval 1, probability 0, space 0, times 0 [ 132.742608][T13205] CPU: 0 PID: 13205 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 132.751560][T13205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.762235][T13205] Call Trace: [ 132.765703][T13205] dump_stack+0x137/0x19d [ 132.770368][T13205] should_fail+0x23c/0x250 [ 132.774963][T13205] __should_failslab+0x81/0x90 [ 132.779854][T13205] should_failslab+0x5/0x20 [ 132.784635][T13205] kmem_cache_alloc_node+0x58/0x2b0 [ 132.790209][T13205] ? __alloc_skb+0xed/0x420 [ 132.795453][T13205] ? __virt_addr_valid+0x15a/0x1a0 [ 132.800591][T13205] __alloc_skb+0xed/0x420 [ 132.804962][T13205] ? ___cache_free+0x3c/0x300 [ 132.809803][T13205] netlink_dump+0x15f/0x860 [ 132.814705][T13205] ? kmem_cache_free+0x59/0xe0 [ 132.820368][T13205] netlink_recvmsg+0x40c/0x760 [ 132.825591][T13205] sock_read_iter+0x19e/0x1e0 [ 132.830674][T13205] vfs_read+0x565/0x5d0 [ 132.835026][T13205] ksys_read+0xce/0x180 [ 132.839289][T13205] ? fpregs_assert_state_consistent+0x7d/0x90 [ 132.845721][T13205] __x64_sys_read+0x3e/0x50 [ 132.850511][T13205] do_syscall_64+0x4a/0x90 [ 132.855308][T13205] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.861366][T13205] RIP: 0033:0x4665d9 [ 132.865593][T13205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.885853][T13205] RSP: 002b:00007f0898e98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 132.894698][T13205] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 132.903046][T13205] RDX: 0000000000000060 RSI: 0000000020000280 RDI: 0000000000000004 [ 132.911414][T13205] RBP: 00007f0898e981d0 R08: 0000000000000000 R09: 0000000000000000 12:59:34 executing program 4 (fault-call:5 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) [ 132.919552][T13205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.927899][T13205] R13: 00007fff35d35c3f R14: 00007f0898e98300 R15: 0000000000022000 [ 132.944067][T13182] loop1: detected capacity change from 0 to 4 [ 132.967970][T13199] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 132.978530][T13182] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 132.990487][T13191] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 132.990531][T13214] loop3: detected capacity change from 0 to 253 [ 133.000301][T13191] EXT4-fs (loop2): group descriptors corrupted! [ 133.011961][T13213] FAULT_INJECTION: forcing a failure. [ 133.011961][T13213] name failslab, interval 1, probability 0, space 0, times 0 [ 133.026089][T13213] CPU: 1 PID: 13213 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 133.034883][T13213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.045274][T13213] Call Trace: [ 133.048785][T13213] dump_stack+0x137/0x19d [ 133.053276][T13213] should_fail+0x23c/0x250 [ 133.057815][T13213] __should_failslab+0x81/0x90 [ 133.062604][T13213] should_failslab+0x5/0x20 [ 133.067377][T13213] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 133.073422][T13213] ? __kmalloc_node_track_caller+0x30/0x40 [ 133.079302][T13213] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 133.084786][T13213] __kmalloc_node_track_caller+0x30/0x40 [ 133.090702][T13213] ? netlink_dump+0x15f/0x860 [ 133.095570][T13213] __alloc_skb+0x187/0x420 [ 133.100159][T13213] netlink_dump+0x15f/0x860 [ 133.104875][T13213] ? kmem_cache_free+0x59/0xe0 [ 133.109866][T13213] netlink_recvmsg+0x40c/0x760 [ 133.114852][T13213] sock_read_iter+0x19e/0x1e0 [ 133.119814][T13213] vfs_read+0x565/0x5d0 [ 133.123994][T13213] ksys_read+0xce/0x180 [ 133.128180][T13213] ? fpregs_assert_state_consistent+0x7d/0x90 [ 133.134576][T13213] __x64_sys_read+0x3e/0x50 [ 133.139099][T13213] do_syscall_64+0x4a/0x90 [ 133.143533][T13213] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.149452][T13213] RIP: 0033:0x4665d9 [ 133.153374][T13213] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:59:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x406, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) [ 133.173282][T13213] RSP: 002b:00007f0898e98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 133.182065][T13213] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 133.190147][T13213] RDX: 0000000000000060 RSI: 0000000020000280 RDI: 0000000000000004 [ 133.198268][T13213] RBP: 00007f0898e981d0 R08: 0000000000000000 R09: 0000000000000000 [ 133.206348][T13213] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.214745][T13213] R13: 00007fff35d35c3f R14: 00007f0898e98300 R15: 0000000000022000 12:59:35 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) 12:59:35 executing program 4 (fault-call:5 fault-nth:3): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:35 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 133.290539][T13199] loop5: detected capacity change from 0 to 4 [ 133.296812][T13231] FAULT_INJECTION: forcing a failure. [ 133.296812][T13231] name failslab, interval 1, probability 0, space 0, times 0 [ 133.302166][T13199] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (1 blocks) [ 133.310533][T13231] CPU: 1 PID: 13231 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 133.329130][T13231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.339450][T13231] Call Trace: [ 133.342829][T13231] dump_stack+0x137/0x19d [ 133.347259][T13231] should_fail+0x23c/0x250 [ 133.351967][T13231] __should_failslab+0x81/0x90 [ 133.356831][T13231] ? inet6_dump_fib+0x195/0x650 [ 133.361734][T13231] should_failslab+0x5/0x20 [ 133.366482][T13231] kmem_cache_alloc_trace+0x49/0x310 [ 133.373114][T13231] ? rmqueue_pcplist+0x152/0x190 [ 133.378181][T13231] inet6_dump_fib+0x195/0x650 [ 133.383077][T13231] ? inet_dump_fib+0x45e/0x4e0 [ 133.387847][T13231] ? fib6_age+0xe0/0xe0 [ 133.392010][T13231] rtnl_dump_all+0x1ae/0x240 [ 133.396992][T13231] netlink_dump+0x359/0x860 [ 133.401597][T13231] netlink_recvmsg+0x40c/0x760 [ 133.406533][T13231] sock_read_iter+0x19e/0x1e0 [ 133.411260][T13231] vfs_read+0x565/0x5d0 [ 133.415532][T13231] ksys_read+0xce/0x180 [ 133.420053][T13231] ? fpregs_assert_state_consistent+0x7d/0x90 [ 133.426680][T13231] __x64_sys_read+0x3e/0x50 [ 133.431302][T13231] do_syscall_64+0x4a/0x90 [ 133.436089][T13231] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.442168][T13231] RIP: 0033:0x4665d9 [ 133.446061][T13231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.466045][T13231] RSP: 002b:00007f0898e98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 133.474549][T13231] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 133.482740][T13231] RDX: 0000000000000060 RSI: 0000000020000280 RDI: 0000000000000004 [ 133.491072][T13231] RBP: 00007f0898e981d0 R08: 0000000000000000 R09: 0000000000000000 [ 133.492054][T13228] loop2: detected capacity change from 0 to 4096 [ 133.499677][T13231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.499693][T13231] R13: 00007fff35d35c3f R14: 00007f0898e98300 R15: 0000000000022000 [ 133.531251][T13232] loop1: detected capacity change from 0 to 4 [ 133.542487][T13242] loop3: detected capacity change from 0 to 253 [ 133.568493][T13232] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 133.579068][T13228] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 12:59:35 executing program 4 (fault-call:5 fault-nth:4): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 12:59:35 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chown(&(0x7f00000003c0)='./file0\x00', 0xee00, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, 0x0, 0x0) [ 133.589114][T13228] EXT4-fs (loop2): group descriptors corrupted! 12:59:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_dev}]}) 12:59:35 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x349, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)='y', 0x1, 0x4}, {&(0x7f0000000180)="6178e6909effc39f7857aa9183a37adc80a6082f357ae2c9a587a3b1a1bea070398e9015d16fe5712e82ed337b9a057ec23c77d69c3aee0940fbe9ad176b2757936092f8b0e1e5a5af0aa7c281e6ffd69b78b10268627cc5e02c3f7e5b4ab6748bbef7f2cab33b11ee8216788aba7411a1002054b92a99b9c641e1c62502dadbc1d2b79003d7ce5d9794aff224156b59f5183b23e5028a1301aad2e602", 0x9d, 0x2}, {&(0x7f0000000240)="929b1a20f927e1fe453286b9570461e4636661fce55a7f83c8aa3434e797918c7fdda7bacce15cc72ea8befa5c7e4e2f57ee84ae3c421e675ea80df4708ed445046c78c0a84fa194b557d91e6847b59683e736a9b956811c1ade595b198af0bfa0f0ff01b4", 0x65, 0xfd6c}, {&(0x7f00000002c0)="92e9c7f799d09bd500432ec2548b7f3e8e874a76a69992ac873228793b6a4ed071bd8137e1b0fa74d778576a116c5da699622578543d94584b3e52f00cb0fff23bb5d23777e07a4908ff3ba63b0aae3c16d6ae36ac5bbd6beabe73811a5e6d0e170af31a726f3e306207c90fd6d2d5d3ed6fd861ef84715406cb4afbda03b3ae7f774e8feb200bd68cae35fe0ec490a6fde3ddc1b053042cbb0512731353d0d4e7121eeb727d76c6af48262428d2ec9004bccdb94ae183e5c80e", 0xba, 0x7}], 0x2803000, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c7065726d69745f6469857b9959c97265637469633d3078303030303030303030663766346331332c00000000"]) [ 133.636360][T13232] loop1: detected capacity change from 0 to 4 [ 133.650258][T13232] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 133.684712][T13261] loop2: detected capacity change from 0 to 4096 [ 133.693215][T13261] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 133.695365][T13264] FAULT_INJECTION: forcing a failure. [ 133.695365][T13264] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.703080][T13261] EXT4-fs (loop2): group descriptors corrupted! [ 133.716232][T13264] CPU: 0 PID: 13264 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 133.731570][T13264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.741795][T13264] Call Trace: [ 133.745084][T13264] dump_stack+0x137/0x19