fffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x6800) [ 257.069969][T11381] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/203/file0 supports timestamps until 2107 (0x10391447e) 06:31:35 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x6800) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ftruncate(r0, 0x4) chdir(&(0x7f00000004c0)='./file0\x00') 06:31:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1}, 0x700) 06:31:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 257.169176][T11413] loop0: detected capacity change from 0 to 131456 [ 257.178883][T11413] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 257.189219][T11413] EXT4-fs (loop0): group descriptors corrupted! 06:31:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x0) [ 257.221165][T11422] loop2: detected capacity change from 0 to 16 [ 257.248838][T11422] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/204/file0 supports timestamps until 2107 (0x10391447e) [ 257.263767][T11428] loop1: detected capacity change from 0 to 16 06:31:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000000040), 0x0, 0x800}], 0x0, &(0x7f0000013800)) 06:31:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 257.293014][T11428] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/288/file0 supports timestamps until 2107 (0x10391447e) 06:31:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x0) 06:31:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:36 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x6800) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ftruncate(r0, 0x4) chdir(&(0x7f00000004c0)='./file0\x00') 06:31:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 257.375161][T11448] loop0: detected capacity change from 0 to 131456 06:31:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x0) 06:31:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 257.427996][T11448] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 257.438862][T11448] EXT4-fs (loop0): group descriptors corrupted! [ 257.443512][T11464] loop1: detected capacity change from 0 to 16 [ 257.456001][T11464] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/289/file0 supports timestamps until 2107 (0x10391447e) 06:31:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 06:31:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 257.478113][T11471] loop2: detected capacity change from 0 to 16 06:31:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000000040), 0x0, 0x800}], 0x0, &(0x7f0000013800)) 06:31:36 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x79, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) creat(&(0x7f0000000000)='./file0\x00', 0x143) 06:31:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 257.524594][T11471] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/205/file0 supports timestamps until 2107 (0x10391447e) 06:31:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:36 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x6800) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ftruncate(r0, 0x4) [ 257.571882][T11485] loop1: detected capacity change from 0 to 16 [ 257.584098][T11485] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/290/file0 supports timestamps until 2107 (0x10391447e) 06:31:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 257.639873][T11500] loop0: detected capacity change from 0 to 131456 [ 257.661386][T11500] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 257.671712][T11500] EXT4-fs (loop0): group descriptors corrupted! 06:31:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000000040)='.', 0x1}], 0x0, &(0x7f0000013800)) [ 257.690178][T11512] loop2: detected capacity change from 0 to 16 [ 257.708540][T11515] loop1: detected capacity change from 0 to 16 [ 257.722160][T11512] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/206/file0 supports timestamps until 2107 (0x10391447e) 06:31:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x6800) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) 06:31:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 257.754871][T11515] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/291/file0 supports timestamps until 2107 (0x10391447e) [ 257.781218][T11528] loop0: detected capacity change from 0 to 131456 [ 257.822171][T11538] loop2: detected capacity change from 0 to 16 [ 257.842085][T11538] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/207/file0 supports timestamps until 2107 (0x10391447e) [ 257.852153][T11528] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 257.867823][T11528] EXT4-fs (loop0): group descriptors corrupted! 06:31:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x6800) 06:31:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000000040)='.', 0x1}], 0x0, &(0x7f0000013800)) 06:31:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 258.456492][T11555] loop1: detected capacity change from 0 to 16 [ 258.464969][T11559] loop2: detected capacity change from 0 to 16 [ 258.472114][T11555] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/292/file0 supports timestamps until 2107 (0x10391447e) [ 258.472800][T11560] loop0: detected capacity change from 0 to 131456 06:31:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 06:31:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x4, @local}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="b0dabb74acb7"}, 0x10) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r6 = dup2(r3, r3) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x4, @local}, 0x10) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @random="b0dabb74acb7"}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a00)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@empty}}, &(0x7f0000002b00)=0xe8) sendmmsg$inet(r0, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="8ed09f3fa849ee7ca968a2570110c2f208a1aa45d18fc222d29419f85ab9fc734f8d8f483eda79a425792c1686b54764310b457af01ecd2471161fe32b5c67e7494a87cb8ae9c84100a7a464c3eed7d5872536", 0x53}], 0x1, &(0x7f0000002b40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x400}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffffe}}, @ip_retopts={{0x50, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0xf3, 0x1, 0x2, [{@loopback, 0x40}, {@empty, 0x6}]}, @noop, @lsrr={0x83, 0xf, 0x32, [@private=0xa010102, @empty, @empty]}, @rr={0x7, 0xb, 0xa5, [@multicast1, @loopback]}, @rr={0x7, 0x7, 0x72, [@broadcast]}, @end, @generic={0x17, 0x6, "252b0f9a"}]}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@rr={0x7, 0xf, 0x7f, [@multicast1, @private=0xa010101, @rand_addr=0x64010102]}, @ssrr={0x89, 0x2b, 0x78, [@rand_addr=0x64010100, @empty, @loopback, @remote, @empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1]}, @timestamp_addr={0x44, 0x14, 0xc, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x10}, 0x5}, {@remote, 0x800}]}, @timestamp_addr={0x44, 0x24, 0xf5, 0x1, 0x6, [{@loopback, 0x800}, {@private=0xa010102, 0x3}, {@dev={0xac, 0x14, 0x14, 0xd}, 0x8b0}, {@dev={0xac, 0x14, 0x14, 0x19}, 0x1000}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @rand_addr=0x64010102, @local}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffffd}}], 0x188}}, {{&(0x7f00000001c0)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000280)="26dd4371cdccd9e39e4f6d3a8e2e2a7844a279cf62f75edd", 0x18}], 0x1, &(0x7f0000000300)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x100}}, @ip_retopts={{0x54, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xf3, [@multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @private=0xa010102, @multicast2, @loopback]}, @ra={0x94, 0x4}, @lsrr={0x83, 0xb, 0x73, [@remote, @multicast1]}, @timestamp_prespec={0x44, 0xc, 0x74, 0x3, 0x3, [{@multicast2, 0x80000001}]}, @noop, @ssrr={0x89, 0xb, 0x3a, [@loopback, @remote]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x200}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @local, @local}}}], 0xa8}}, {{&(0x7f0000000580)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000002940)=[{&(0x7f0000003640)="dc3eb59ba166a210b9cde49b06066cfe39ac3e6194811cfb6b67058b0da7d0cf62cf179023f98756c949a1e40dc4366e7081254d3381948cc6ac10dbb748b8bd328f9e3f6ed333c56896e4e6f26d3486a25edb1cd45c0acb93c4ee9bcdc5d0e5ef09657fd6b1", 0x66}, {&(0x7f0000000600)="4c2bb7a91a661f4cb43be5949e0d5d5c12f43ec725162b37fc548a5ddecca3fefea329bc7a9077c9127a6b38a0d298ae206170b5080d9653639f97dd4a4cc096fed1a1f97c0666b32639a00ab3c5a98f12", 0x51}, {&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000001680)="a52774a072d8f3b90f662cf86d38c692e8dd9e13ede28614535180765d0fca82fc89c8c3840bdb665eabfe32bf6ef080d37804740e29b8eea7cb0f6135acdb86a59c58b6791deea9ebfbe1df1afc898af15d87cf3f9e5f7fb718e881f595135c20c6393e1b6e5daca1f5478091d246f98003cc55ea117667d6e28592c46cd25d2167cc7ffa95bcf94f2ebe392790869b36dac559cc02", 0x96}, {&(0x7f0000001740)="24d2d4641053cf470b4b3e0b36976f50497834093ea100a4f9d43bd19e36ce1977a661a4debd2d06baf571249afce53502f943e8bd9cef84ea50f9699ef3ff03732668dccc61bbd32c04ba0d27e0ed2d92700035bfc4d3f84932e41f10746d1826c42dfc7c6affc5e88b4bc5b41e9ed77126fa3fc3c7dbce45272069627ea255fe595445776ba0e923be2c39e8d3cd82871de12a60591a8624e06982dfd277dc12cb9a2c91c3bbdd4273353f099c7bd64426cf6b30ae804cf38dd46a4e410d900bfda2641aa8ff2a48df4ca579dd", 0xce}, {&(0x7f0000001840)="d2d13f4289390d02e0e5290f7da7c048e43d6a67163481f6567fbcb168c9d521e1", 0x21}, {&(0x7f0000001880)="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", 0x1000}, {&(0x7f0000002880)="e21025402b6dd010d56960d40e152c47089641e0", 0x14}, {&(0x7f00000028c0)="b3d7061dfece6aaab16a610c1bef28fa40c178697fb71f48eda507e1e7c38781a4318f8e46c4bc06e853ffbffc6d5b3f691b504415b62135ffa4a2a3146eca35e0ed4b6cb301f6d0c8ba955ce736ae724a1c730cdaebd194521a7271f3fc80ef748a134b1ed5b25033a5445f3678512e0d9ecc93bd6538aa4c59", 0x7a}], 0x9, &(0x7f00000036c0)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x1c, 0x10, 0x3, 0x0, [{@loopback, 0x3}, {@remote, 0x2}, {@local, 0x5}]}, @timestamp_prespec={0x44, 0x44, 0xc6, 0x3, 0x1, [{@empty, 0x7f}, {@local, 0x5}, {@dev={0xac, 0x14, 0x14, 0x3d}, 0x10000}, {@remote, 0x3}, {@dev={0xac, 0x14, 0x14, 0x1f}, 0x3f}, {@loopback, 0x1}, {@empty, 0x156b}, {@loopback, 0x7}]}, @end, @timestamp={0x44, 0x10, 0xa3, 0x0, 0x7, [0x4, 0x9, 0x17e]}, @cipso={0x86, 0x32, 0x0, [{0x0, 0xd, "8d44d30e97ed3dec8f6068"}, {0x7, 0x5, "a6197f"}, {0x6, 0xa, "88644c01c19738e4"}, {0x0, 0x10, "2eea35132f8eaadfb4ee0bafc0d3"}]}]}}}, @ip_retopts={{0x108, 0x0, 0x7, {[@cipso={0x86, 0x3c, 0x0, [{0x1, 0x9, "11e64ccb6cff2f"}, {0x5, 0x2}, {0x5, 0xc, "c355dbb822ad3b8233d9"}, {0x0, 0x9, "f4fac3f6d0965a"}, {0x6, 0xb, "59baf22870565df136"}, {0x5, 0xb, "0e25e38e6c4175ab96"}]}, @ssrr={0x89, 0x13, 0x19, [@initdev={0xac, 0x1e, 0x1, 0x0}, @local, @dev={0xac, 0x14, 0x14, 0x2b}, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp_addr={0x44, 0x4c, 0x8e, 0x1, 0x2, [{@multicast1}, {@multicast1, 0xaa}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@private=0xa010100, 0x1}, {@remote, 0x3ff}, {@multicast2, 0x80000000}, {@local, 0x6}, {@multicast2, 0x97ce}, {@local, 0x80000001}]}, @timestamp_addr={0x44, 0x54, 0x51, 0x1, 0x0, [{@rand_addr=0x64010100, 0x486}, {@dev={0xac, 0x14, 0x14, 0x26}}, {@loopback, 0x5}, {@private=0xa010102, 0x6}, {@private=0xa010102, 0x7fff}, {@loopback, 0x7}, {@remote, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7}, {@loopback, 0x1ff}, {@loopback, 0x6}]}, @generic={0x83, 0x8, "68230952e421"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1ff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @empty}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @broadcast, @loopback}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1ff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xff}}], 0x260}}, {{&(0x7f0000002dc0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x40}}, 0x10, &(0x7f00000030c0), 0x0, &(0x7f0000003100)=ANY=[@ANYBLOB="140000000000000000000000020000002fd600000000000034000000000000000000000007000000440c2971ffffffff0000000589172de0000001ac1414410a010101ffffffffac1414aa000000000054000000000000000000000007000000863200000000060f89746a2b0e75d8cd315ce42c64050e356576068060c0c5620c47280002020388070af7ccda6e9ead9cd0890be40a010101ffffffff9404010007038f00000000140000000000000000000000010000000700000000000000000800000000000000010000010000000000010000000000140000000000020000000000020000008100000000000000"], 0xf0}}, {{0x0, 0x0, &(0x7f0000003340)=[{&(0x7f0000003200)="ee6eeb6ec452a0b088406c7b38d12a81c167a3f7c0ac36470377b52cb03f2ad21bb990319192eda64b1ce06a6c103b6f318ab0072973ae2ecb1d4d2f278cfaec25fe2fea592f17656e27159b7b83993a3eed4604dfbd331e125520b0183e700b8681e7147d234b5cc2569cd96166323300bfd83ea1eb309759ada1fba940abb56421d17b79fe5e95ff371d11d94f1c58860570aa4d5c5f1942c160f247202bae7255b5da92eccc20563ba056698179d162e4", 0xb2}, {&(0x7f00000032c0)="b7bb20aaca75be89ff3448898b5d066f0ad888eb2e5356b2620f5e83e3c01b764f6643072aade6665f5981e544c421b3d30009cf3197ed929ab3c5a9a384da61fa21cbf110ec401e0ab3f09901ff4fe6a1cb770bfcd1d2888c3a4bda6760b60be1fe4c360b", 0x65}], 0x2, &(0x7f0000003380)=ANY=[@ANYBLOB="4c000000000000000000000007000000831f72000000007f000001e00000017f000001ac1414aaac141414ffffffff441cd181ac1e010100000006ac1414aa000000b2e000000200000000000000000014000000000000000000000001000000070000000000000014000000000000000000000002000000ff7fffff000000001400000000000000000000000100000006000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="000020000a01010200000000"], 0xb8}}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000003440)="c298265659348f4e91b2aa5f1ea286acb6247f1a25c331d9ce4e8c1e3db094a41e592a2169b30048645d5e", 0x2b}], 0x1}}], 0x6, 0x8000080) sendmmsg$sock(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@in6={0x2, 0x6e23, 0x0, @empty}, 0x80, 0x0}}], 0x1, 0x20008100) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r8, 0x0) preadv(r8, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(r0, &(0x7f0000000200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @loopback={0x0, 0x3}}, 0x80, 0x0}}], 0x2, 0x0) 06:31:37 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 258.499856][T11559] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/208/file0 supports timestamps until 2107 (0x10391447e) [ 258.531953][T11560] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 258.542526][T11560] EXT4-fs (loop0): group descriptors corrupted! 06:31:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000000040)='.', 0x1}], 0x0, &(0x7f0000013800)) [ 258.592474][T11577] device lo entered promiscuous mode [ 258.608323][T11578] loop2: detected capacity change from 0 to 16 [ 258.611613][T11573] device lo left promiscuous mode [ 258.623976][T11578] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/209/file0 supports timestamps until 2107 (0x10391447e) 06:31:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 06:31:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 258.658369][T11592] loop0: detected capacity change from 0 to 131456 [ 258.670337][T11577] device lo entered promiscuous mode [ 258.680524][T11592] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 258.682137][T11594] loop1: detected capacity change from 0 to 16 [ 258.691217][T11592] EXT4-fs (loop0): group descriptors corrupted! 06:31:37 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)="39000000130003475fae7cdac52541300600000001000000450000002500000004001a00040037000200000000000006040000000000000000", 0x39}], 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(0xffffffffffffffff, 0xee01, r1) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x36) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0xee00) r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r5, 0xee01, r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r9, 0xee00) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)=[{&(0x7f0000000200)={0x27c, 0x39, 0x300, 0x70bd2d, 0x25dfdbfc, "", [@generic="9b1ef58990aecd5f02c52048eccd8a91f5874a8096ce5b316802823cca74179662ab8ddc2e1e011ec316598ca8f376b7605a7ae80d68aa9d123b2f6526da865ccee722ab24cc6cccf8e462bbbc110261ad7cc293cffb5625383f7fbcafa9f72f67bad331a6545584e5c3867b83bfd25c9e9534740e5e5d201658882fd4ce30ffc67ce4b795b9590cf1662e36ddf7a105cfdebeeb4a76415b5e43c39c42a71a81adec9cb1cb52d6bc24e86f19", @typed={0x8, 0x45, 0x0, 0x0, @fd}, @typed={0xc, 0x49, 0x0, 0x0, @u64=0x8}, @nested={0xa9, 0x19, 0x0, 0x1, [@generic="bd84bbdeb41b4178b386a5e255112131b2519da8b226f58dd383d0bfa9d539ac08aba070eeef873c7c15bd0023e4543f33fa86a6ab079d0ba563b4f630c76939d3ccf9e619a53517322378e64b4b1cdc174cfb4993e8802debb19abaffec19fa2b394186b436c5bcfaaaf82cba762094b50ae05a9acdf8d1593734a92c1f77905fe698316129fcd79889701249589195e2eaa32a01d20da131238b9ecfdaf173f5bf6022ab"]}, @typed={0x4, 0x5}, @nested={0xf9, 0x77, 0x0, 0x1, [@typed={0x8, 0x7c, 0x0, 0x0, @ipv4=@rand_addr=0x64010100}, @typed={0x14, 0x7d, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}, @generic="413c05a2c2fcc4ef32c440e8c891eca914dbd8c08a19ffea3b8bd15728af1e727e0c30b07ee889dadfd1ba9c90bca4baabdc1d0fced0be9e2e1c9c6763cbf57803fc41baa2cde89cb59afbcca0ac5598bdfbc73a6a19b9944ff7e095ebb339853593d43804c0a07463fb1e7deaaf79e26675c5fa575962cba0df409fbecd73466ff26dec2f76005b16862172119dcf618056459f526731559e7654e89362bc06d2529eb6af255dbfe95d51aa16c962297ff85dc9ef5ff01353a6ad3e9c81b9c886372bac090f741482777c37aac604cb55c2b3c3e15e8311b6"]}]}, 0x27c}, {&(0x7f0000000480)={0x1550, 0x12, 0x200, 0x70bd26, 0x25dfdbfe, "", [@nested={0x193, 0x77, 0x0, 0x1, [@typed={0x8, 0x66, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x55, 0x0, 0x0, @ipv4=@multicast2}, @generic="bf8f5543720bdca1ba07341f5124425dcb1bfaf529e439239557df37d726689879cfda21a67ac3168cb54cae56997a05a8d68009125596d21fadda2030dfc6b2448b65c1ee7e49d42751d745262dedb66cbbddc2455b52181660f59d361ec4bb86e72c09aa00735205352c9251440619c7a6983722a1cc0576a9ae8db28c62a33b99df8562b7fb4a7ef1f338c671fc02", @generic="83f256a5020386c248ecdb10ca4379a606aceb5ce78e2d6b88335482862444a73449b69a36ad41f4a470fcf70f39d3579768646b50b829bf4aec926f8bbf1e67e3a518dab10964844c7165e36aeb9a16db92410a1133abb7b1dc8f55d8cbac4a5c9a15a9f0c6eecc2c74116653ab675225c40ae58f56284626287a729cf0b1a3329b6d11cd9991f9a493686b30867662b4cc4a0392f3a46367d80d0e0f58ff2ddd81a71085ac4d8b1e8897d57fa86ad344f9451ad6bbe73ec7ca45ba9f73cea464ac290a1a2c4f00f6b8a5391d66eaa3679c252d0db5a61d9a58e2fbe2ca55b7eba8d91c0fba6901210a544047d469"]}, @generic="d1175504266f8829dea6b3981ab2aedbdf69a42dbefb04d13a1ec88ff75652c47fed363b2b5351d5c59ad308d14dcb9c874dfadecea246ef7253bba8905f3dbca9bedec306f0533daf8b3b88ec07dbbf394b8c7c50bee40d416f44c4a28e762c5c1f2ee676f05e4033dafa07eee6e7b750d02d717a62c78085d4bcbf701c8c262870b4d1f8cad419168dc6d6367af6167d47dda5ed871a1973736f23dcec4d7a7a4d79ee75b4fb74b2801e0094dcaca2a8745d671ee1fec9e6bfdae164c76b2cc3c6cd344c006e", @typed={0x4, 0x1}, @nested={0x116b, 0x17, 0x0, 0x1, [@generic="1afa02043961dfcd4bd648c26495def4c0c17a74b1a5775e666bf0a8c4061758ba845ae91d547385d66aaa5a74ab3786e3ed22ccb54368a1166387d62db7aecb5aabb2708c18e00dea4a6e6824758b6c59ef", @typed={0x1004, 0x44, 0x0, 0x0, @binary="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"}, @typed={0x8, 0x7e, 0x0, 0x0, @pid}, @generic="d5dbc5685e482a290d", @generic="878d71d1896286287c0db2248875c66b8440732febd70647cff8736f20ccc217d2e03d8b61507a1029f17d8a2f68bf8254f79cdabc11c4fa8bb8ff79ac8a68abf401a466a24d3136ce6fab3a8ea8a1d862c617", @generic="abab440577114d7ed6752e1181c4560685c08b6127374ba3b48c84fc8151d4cc83cc5f5f2c09540a933eb2e0a9603e74432c3ff5a67eb59741a4c2d53f5fba5339185652049f23f73ba60bc1b791f37a4b1bb059294ed1af20eb5daa7891a1aa32389b9dc914ee4eeca205f248906bb99a115f86cccdd0898bd7f340b90959aebed9adc98f7a7f2446184ed9b5be709441f87889be5742ccd3395c3c8eb85b2809753d9b40dbed4946585b7423"]}, @typed={0x4, 0x94}, @nested={0xec, 0x65, 0x0, 0x1, [@generic="b9660c1e0de6a98624dcad5601b7342f06f42ece11bc5af2ba4e20beb0e4311c411daf069e3ebb9a22bc834404bb222efb866c789e4ef1979774ed6fc20d563e1614dd36252d020cb836bd6e7111c79bf2e21ee9dffbb1b3544acc21a993738bb976b8e7a17431f3c7a3d05756eeba37352acfff6e98274eeb0fbc062b37fd3a8c5fd320b464decd6d665de5a2808bc909ba5d18caeb9f938e839141c5bfd773763579eac712a260756b8be4189ac157e10080a27b865f9be3158424828df53f85fe8bfa2bbc98fa0d867e0cc64362504df777e3c026c2fc565da992e873029a", @typed={0x8, 0x18, 0x0, 0x0, @fd}]}, @typed={0x8, 0x88, 0x0, 0x0, @pid}, @generic="d25f8fe481b68d05906fb6c11876f7e495844178af8846d36cb79d996b741384a476c1209beb2a9494c01b978bfa95463bb73eddd97d9c07723b9dcdd3b2ad1f56b5ee6c7095793a5007ef224f6475e24616cced605f7b246ea6f68dda762725cc80ef2c57cc885c08cb4fecbb3a6f7bb85e18708b80edeb4c8ec043fc"]}, 0x1550}], 0x2, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, r1}}}, @cred={{0x1c, 0x1, 0x2, {r2, r4, r7}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r9, 0xee01}}}], 0x88, 0x40941}, 0x810) [ 258.729239][T11573] device lo left promiscuous mode 06:31:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 258.797976][T11605] loop2: detected capacity change from 0 to 16 [ 258.812300][T11605] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/210/file0 supports timestamps until 2107 (0x10391447e) 06:31:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:31:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:37 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 258.846259][T11622] loop0: detected capacity change from 0 to 131456 [ 258.850913][T11620] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.4'. [ 258.871096][T11622] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 258.889322][T11627] loop1: detected capacity change from 0 to 16 [ 258.929228][T11635] loop2: detected capacity change from 0 to 16 [ 258.940218][T11635] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/211/file0 supports timestamps until 2107 (0x10391447e) [ 258.995527][T11643] loop1: detected capacity change from 0 to 16 06:31:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2c, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:38 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000005a0001000000000000000000000000000c0005"], 0x20}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001280)={0x24, 0x2, 0x2, 0x201, 0x0, 0x0, {0x2}, [@CTA_EXPECT_HELP_NAME={0xf, 0x6, 'sane-20000\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004854}, 0x0) r2 = syz_open_dev$char_raw(&(0x7f0000000080), 0x1, 0x80400) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0xfffffc7b) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7fffffff}, 0x10) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x40, 0x2, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x40}}, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r4, 0x50009418, &(0x7f0000000280)={{r3}, 0x0, 0x6, @inherit={0x98, &(0x7f00000000c0)={0x1, 0xa, 0x6bb300000000000, 0x1ff, {0x8, 0x6, 0x1ff, 0x6}, [0x3ec61c49, 0x7, 0x8, 0x2, 0x771d, 0x2, 0x7, 0x80000000, 0x169c, 0x8]}}, @subvolid=0xfff}) 06:31:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 259.547494][T11667] loop0: detected capacity change from 0 to 131456 [ 259.548575][T11661] loop1: detected capacity change from 0 to 16 [ 259.558761][T11667] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 259.568928][T11666] loop2: detected capacity change from 0 to 16 06:31:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 259.605168][T11666] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/212/file0 supports timestamps until 2107 (0x10391447e) 06:31:38 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 259.651472][T11685] loop1: detected capacity change from 0 to 16 [ 259.661590][T11686] loop0: detected capacity change from 0 to 131456 06:31:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{0x0, 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 259.695932][T11686] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 259.730518][T11700] loop1: detected capacity change from 0 to 16 06:31:38 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 259.760776][T11699] loop2: detected capacity change from 0 to 16 [ 259.771985][T11703] loop0: detected capacity change from 0 to 131456 [ 259.781881][T11703] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 259.885638][T11718] loop2: detected capacity change from 0 to 16 06:31:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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"/715, @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmctl$SHM_UNLOCK(r0, 0xc) r2 = shmget(0x2, 0x1000, 0xa18, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) r3 = shmget(0x2, 0x2000, 0x4, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(r3, 0xe, &(0x7f00000000c0)=""/131) shmctl$IPC_RMID(r2, 0x0) shmat(0x0, &(0x7f0000295000/0x4000)=nil, 0x7000) shmctl$SHM_UNLOCK(r2, 0xc) 06:31:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{0x0, 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:39 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x7, 0x4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="4ea64066328f41403bd53bf793402d442c3fa377c761811de7bb3d19880905950bce665e80c74a5afa04b96d361f3901e5c6f45efab9f4f156ed06b15734bc229ae25fe3f8b06169aa4d66dd524f101756df19e6536128eb669cfb18fa86e6bfcbf78018dffe5fdd598a36925fe773818f5b0c6cf349fbe1ecc5e98b1c22c2930541e79ee5fd2ca870f55cbb6b49abf80007ad91e634c68aaaf3a22050e29600f3836f415f6711ff2f128b06d8dbf9edb7eed9079b1625c2d9bd8cc526f5c72aa5ccc4e5caade60cff96aa411efb8e3f012e1b5853d2dbd1ef9ab3b2d538ac98619d763682679ad6e4df0b57844813169ca40297a83a3f4ded664a0552dfa7311aea963bc4b9438204c7a9a7ca513c9758181478573e2084060c578cfe92fecf7535b22884b6d1e0912027f8572553ce8b9487533bbeb8029526290f564a710abe0dc05de8fac7eb55bda12afc148f202bb2231c16b1e55346", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 260.475349][T11741] loop2: detected capacity change from 0 to 16 [ 260.491584][T11746] loop0: detected capacity change from 0 to 131456 [ 260.506600][T11746] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 06:31:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{0x0, 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) [ 260.598627][T11762] loop1: detected capacity change from 0 to 6 [ 260.613935][T11762] FAT-fs (loop1): Directory bread(block 6) failed [ 260.623841][T11768] loop0: detected capacity change from 0 to 131456 [ 260.625142][T11762] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/302/file0 supports timestamps until 2107 (0x10391447e) [ 260.652528][T11771] loop2: detected capacity change from 0 to 16 [ 260.707073][T11768] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 06:31:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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"/715, @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmctl$SHM_UNLOCK(r0, 0xc) r2 = shmget(0x2, 0x1000, 0xa18, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) r3 = shmget(0x2, 0x2000, 0x4, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(r3, 0xe, &(0x7f00000000c0)=""/131) shmctl$IPC_RMID(r2, 0x0) shmat(0x0, &(0x7f0000295000/0x4000)=nil, 0x7000) shmctl$SHM_UNLOCK(r2, 0xc) 06:31:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 260.808569][T11792] loop1: detected capacity change from 0 to 1 [ 260.822119][T11792] FAT-fs (loop1): Directory bread(block 3) failed [ 260.837392][T11792] FAT-fs (loop1): Directory bread(block 4) failed [ 260.853498][T11792] FAT-fs (loop1): Directory bread(block 5) failed [ 260.864761][T11792] FAT-fs (loop1): Directory bread(block 6) failed [ 260.875814][T11792] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/303/file0 supports timestamps until 2107 (0x10391447e) 06:31:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r3, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080), 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:39 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x8800, 0x3) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000013c0)=""/4096) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffb, 0xfffffffffffffffe, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x60000, 0x2, &(0x7f0000000040)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400108001000240000004f801", 0x17, 0x3}, {&(0x7f00000003c0)="773976ae563680d1db39022b8dd806e69973ccf8673fa1c3a23d41da04578b1fbbeaf21189d9a4a4577ad87a0f40deef76c3a795fb10984314ef2245024837a3e01dcd6bdde200487fdb9b63392909d66ed356afa61f9bec02a9e11bc0f085482bea1665156758971f5b6ab9fcbda3c37b49f8c67ce4528226305b6b05744923986caa8b63c0edcba0f1b09c565efd5f676947e1d891ca4a18ae42214b57171c37b683cf3f273a3c5aa6e39caba8a0feea0520fc420046efc6b3bccec7352f2a9a513ee8d80c4b823cb548b6fe8b7822d446a8490cdefc5b935dd1e370335a4232234bd1a6cf64dbdc1d038a7e72bb2712b9f29d65a5e2c8236819c1d5784da648fca7f4c254982145c7a595eb5e27e5703e2f1a2f4541dfc8cda4d108470cb26071ceb5e3aaa6095d2a8c74126b29074cf870c786d786a25da792bf2f8f170b899ae2e086b940d2319563725908398a18652042d1720b60bff0d4d8f8ee04b2afcfd9d11abfde91e374b9321580af55f8d455810fd7abb92cf81384aa2fc920273c8a1e371bf347920d424be537d49fa03202ec698e758c0f5478c3c2bbf48ffd952b09de33f9f9d21c6b5c2591562df2698193addf69e9ed35afa4f9a5835dc2e02d9c2553def2c9ae41f5944bceb424a2ec5e4a737d6386dcfb32d42a45f97aa3ce04c77efd1880b7a7f45b95f383965c5ca4edffb8c3afc49ebc6cb059414c3a976f1b4120e957aae1c3eb2230bae4df021559ccec2d7921a036872bce12c0cae84fc6794954c3fa7af2a6d8ecbd130ba94608f389a4c155d5c775eaa8545b478ab138e2b90984e2987bc972d9c2b78dd893930638a16f930a97a88459b0c48e1477795244e799c21b61b0fed49d267bc74111bc8281ce244fbd89a19f6b3febe6df5bb47b0334047223c4881e40e3ced2862fcf5e0836b45344941ddbb5bd6d9edfcf6ad7f468abb7b2eccc9162635345d1287a1ffca2b4382b4dabda821708cf97fa0676884558eeab629d69ffa7bba7a98077d50523241a476add6f6721cf2d4f1e373e1d5536785190d289ac62c284a69591c915c6c3d9f24b73b12a3a192b9bcb273c136a926049650dae44466d36d9706231e69c1378a8f81a4dca0c23c7db22a44f29e2c1d89ec2ff4da2596914f42dc3d4ddb294ddeb25011a1fe05edc4f156dcf66c1c5df54393112bb0e4ee5f0561baadd719ea36df3161822bf5f819ae82c277e681529f5f5d069caeef3a943bcba310cb43d9424a9bdb1340ff430abebb7c6dfac5b996129b2a8ec63b0b26cb7e157d9aac6c4a1b2dc93a7dbc6ae583f6fa18f9d9927ad4ccda8f31bddb06f52dbca97e53d84afa0f17e40323c256091070b02715ce64eacfc00d3576d8ade6ea6bfa38058dc98db2cbd903c32dadec474be68136570007f3f7c0f9924bc97de94c44e71cefa3b0c856187428ecb63da8f8b9c32311ffe84a2a1a394bcacd97a35112a48193759efe96b712473095b2d4f55fa95de090cf3c7cf726cf882114e9f08d605def4acc907f9c845276ddb732adb5594598938801884b17b3c02c94fcd307e2b60824c0493735ff5a5bd01327704028752618f9024d1fd01c174db66d45aa1a0084cb021c3e32995d74270bc050ff5062f303afc957ac43fb93a399e755b873581220f4cd2070333ee61eb4f70eadcbb42428d148c9f4b35b359425f78101123a731d031a67d6c822f5429c196c26459019e35ae748fa5bcf97e361d1389da27c01a6fef4c683fbe3d4de693eaa9f3a8f37ca121f96da15e0eb809ad237cf51d67a9041d5bf5397d37038b01b5882df92980e7089ee7c5da8760f4ddf98c2e506b5d6daa5e25b8ac6353a7dff1bd568236c59af658e8132ccb1d89d30355781faf2673ea632ef0419a48a0498cbd5d0d7e30847f52b45c8bcace036d3d40a1186d4cd4ac3143becaa6d7cef18ce19b108ca9e75ab3d8b9cc2c7f2d64635da11600fb5aa9deeede21c99d977fb6fd3c6278a70eaf6e663c92a9cc703390e2c28ae41a563b17b55b231c084fa66ddc1d4c15d55c405e8d155118deb807f94e5c7a5fb036a42cae5eaab64e416f86f778264c9d26a19a716c5f2c7210e4f3a376a2ed2547f25fa99f99eda469eee3f33536c02143229738ccef71a904c7eac454ba6c942e7eb4a148670d66f8784fb3198f4514f6d1c54e10162ea65666cb4c6e6a7ed921d987df190200e8f1fbe9fcfd8a36b90969aa317c263742c24e9e953eaf5fcfa0c6b4e8244506aae1fd926c68dd90b0a5b26673c815fe3126350eda2f2b07b93d09e1d9f6ea562da893f8d973d3386cd0774dd5d87a7780520302b629b548e698d0c524fc2dd588ad7db95ef3801f0def2179505bd6a3dbeb37888c031b57257016a937ab640085409a0fe5771b131d9b6fc0c8309726e5581dd7eb087dcf61d9efb3be83ba0f19112f0cfcd6afdcee415a762ab0201e91b516c928978173fdbeea84c40643a29c2e16f4e8a9a5d22721dd6c24e858d42643df4a6a29b658d06e16299b6bba515df875b2c68096fdfaa8ba1d00d6fcc14fc5708960d6c1c015469d4f32d1406a5868ec2830a56f08b38896682c9b138037050584c424bea5a6a855d1eaf0b9741ed5acf7923e312b01f09a34554732fe1057057a878acf8794cd00a79ff0ff198933dcbe3bd458acefc1dbf1a6b47d4b4b0ba21f262ade30a5162e9c06823ccd1e5f44c15939607ae2ddf1b9d951c84a5f5bb1d2327ea3a692f752506a92f51e442578f4e599814bdba5c3ca05c2753203f27ddbb0fde468e8c9ccb27e93d76ff4d6e5fe72fc9427b6bb8dc76d8aaf3a3d7d748dad12d7aa36981f49544b79bdb5116b14068b102882ac2d50c157b01013d0bff8b6738ec028633892c847046123cdb0bc67b73e8bb411cda33eec84990964f2c30e40df47349fd5697baa8d4a03bf4c670287235fe7b7e10fbb91fdb27b3c5c8f9fd2939450a5e83f08c589b8ea25e8f9b9fae4e0e9c83f8e9dda626378e5c0704b4daac6597fa53c7dbc5498f688a6b89316cfe47e66934fb8b61ea66ff0ff282ca55332cdc848bb0ba8b5663d46f59e1db160973a0ec060192cba7e906dfed9ff08982f1ba991d9dd1e58722b5dee1d3a100e534b455dc5187f9027457933522311a03b88e5869dc0f019a3db96eb574e843650386016a28af90a57c2f8d99c2827447ac08781b2c49a6038e7ba37d3802d31e499581170a42bee55a8ed99f71821e23699985664fc25573550aedfa470d287ab5b972301c3606deab941a49cc4e586a065a4c48b27f9fc9eaa3870ee9abe1dce888e1600199bc81fff198874ff83fa201ed23ba515ff349ae19131443945a4bab62e120c286099affbc96f53237053b44efff2dbfa582bbf5cee9886f0e24aa56f149ca512797ea45e6612068f55d7e52a1bb5c521f821760e5b192fce9bae06ba643174571f28ec6b42cbb9c3db56074090e0ab51d3a1d8543c64901731339920b6dde6200f1c68ca31d775a80a97a3214cedfdb617981a5a21376e277cbd90fd64d72c523e3b64af7db612822cb5db6667fd1c24c6c729b707b933d589a22757b2405a038de4c093998c695123d4c4dbeca87c039a4a327a20e17f909a6cbedb5c635b2772585a27ce8990a2543a6f75284aa1949bd062c19e3f1799580d3d5cf26b3216d734391c1fc51e0171685367a8d86a4b93597e316b2e8eff0fac7ccd4b23fcfcc60f476aa08ae7b8c705cd1eeec1da542dc1bd7cab85d70b61fb08c51ba231c87ff234234fb1a7c7d02a7e44457d184fa0c48163abce148eb2b4be9c0c2a71571eab9cb36aeab9016230ffaca2a3393ae0d71212543c85b4a7bb3fd0801e7e85b33719bd14adb0ddc2f88d19c5f25aa375a812f170e96b8c77ee1609b59ca5b4d4be070a594a64137aaf8b58461fe3d407a578aaa41cd4c3e2c4f0ea27c81649de455796b5e1b93b6eb8bed0e88b1d795c00101d81b7c67a5f77200a39b1c0fb93c190abad73059031d5f5a361fa244b401633f11326d714d8a573cf8bcad59b9ff3925b9b3b683fded2cec5dda530cd770f1cf354f2464c325602ab79187c963ae8026bcb6246b0e146461523b01f2254fb60f54a45faba3f73616441f0853bc2177bfe214849bd910161ac8aa7ca2bc41d9c6d933d4c65e49fb30d5a4596b418bfc49aec1fce9888d3d390d8b240708cb88c2de4af24fea61de62dbfafcb99d490d2dc82a75ff5075c0a3ec25b19d6b1729307569b9e93286767a2b66a05d421190779037778c1645d1931bf7bbd9ed54bcd6324891900c18169ef89bb7602fdf410bb765ddfaf1aea0480cad319eaeab69a94fb46f9eb6f08d974aecfac2d95c4ca41f5f75fd01202986cf73767d893ae1cb2e31c9b824ec1d3597b8e4c6386a4c5b0a825a804cab40cdbcda7ee9c62c8aa9915ce10f1e1052a800538a9beb137a3b57fbe436920f732ee54f51b17e16c63234d4af3e01ca021a3797ed8927aaf222e7fdae84ef4afe889aee384210b25d81a3e38e1a2cacf5e5418bdbda15ffd3abc32b23fbecd38065be5c5912a0d97f02fc97b1fde4405a01fb4d4af0680d4232db7cc68ec04733bd5ef9a03f95b910d7e615ab2c1f10f2225e1f32398c8e695e2b9fd626fbda6acad1fceb9a599a27db24817052b7622fa255c30d2dc4971ff384edd8b7c30c12d0c93c3f656da0f0764f7fb12876b5aba849f4958cc210474ae41ac24bbe3fd219e66097221d5a8b63b2b6084d7bf280c4e099deb3c979bb976fd472f1631d91a1a785e635308ff4f69cc7ce98bc9ba9e34a3e3f1cce1b95f607acf097ea9a0d5120c23b105bec255256c4538a3e140016c9f15f0afd87118119652db25b61243839d9dca18a8ada1365557efc1f4687e7453847e24149d807455a677bf7599943cf9488a35b07bf08eaf78fe7114cfe47f74625ccb120f02bc920f2b01248a1bc4d0d3f60302e0ca6d72b186a76065d77cc574d5c510d6902ec6ab1744c352bcadcdab1fe7b5655329200662470e70b407f2b683d1655d3d69d216af8efe49b3d2d79da15f94d59ee4e872db319917eeecbb5f5dcae7aceb890c57f019e475997cdfb81f0a3eb40cca4ae03f4c234b9fd7086bdd943bdc22b9b2a421e834d95accc9c63bc08864feddff1747f1979ac8a4d5ef61604818bac5c7ac2c0375ce3b6907bccedb837b4d5aa773ba7986821483e2b85147c989044a1ccb164aa67aadf9a307ee845ef423fc2d32d529e78a6bbf12e90051bd6d5e495bfd5cb97500434c1c4120e1ecbf379542659759c59f199a74a2063c6c54306f4df2e21e6846be387490793d387532500685f048a1462d9442a86571b2250e49485b007b5648ef86604a96e0ebe9f0ce67a84ee21321a6d46b8b4d7ee4f02286db5fc4307f15cc99cc83e09069568c06e4f2f4f4939f6867a686a42134b80356b0505ee0a4d4ecde86be58b85cf42b4de4be18e129069b7a700350e8f0d497c6c7ad4ffcf3d0f8bea6c2117737b88f6ad1b8cf970b2effb7fd9ca28532889c4cbb8a9378b2c4a75b67cb463b6f4f7db1c1d933975e2f52dab26088efdff72a8f06cb2f9e76a8217b8d55da26f080c42faba1a2d672b3c8b6968f44851f176b20445d48060302a4e31e753d09500dd62ac6448925741434e6300d0e029a4c20b2644ce441f99bb226bd26a7c5fec2799db58596c45f6ab25d4e654051ae5187c9a3e2aba65ae5cacb310dc00e1e535b64a1371cf4e3d5bd420adf6eab7e6b5d4574de68c37ca85da01cf5c0fef9", 0x1000, 0x80000001}], 0x201020, &(0x7f0000000200)=ANY=[@ANYBLOB="003b9d706001fe25750836f8be467c5102000000688fec22f2f9fb03db34e5b468268fea064e43fdb7cc29f45e6da7d7eb75299477d4742161818146cee1bf00d6549efb375ad16c84bf97bb2c8fa1b162bac4962de85bd98908b1f3170df7ac3293461853ea15d26ac7a4", @ANYRES32, @ANYRESHEX=r0, @ANYRESHEX=r0, @ANYBLOB="a3d981e3dd5abd279d584956abef98a6253a01e26309baee071aaadfa0878d9bc7d205689a81e421587883ad33d832035082a5ff13820e1a34e8aee74a75e00c5caad79dcac8fbcb8837a86e1466bc37d83976ec2db7bc3f45d229cfd785bd0d75c893", @ANYRES16, @ANYRESHEX=r0]) open(&(0x7f00000001c0)='./file0\x00', 0x2840, 0x1) 06:31:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 261.346722][T11813] FAT-fs (loop1): bogus number of reserved sectors [ 261.353834][T11813] FAT-fs (loop1): Can't find a valid FAT filesystem [ 261.372723][T11809] loop4: detected capacity change from 0 to 264192 [ 261.383616][T11818] loop2: detected capacity change from 0 to 16 06:31:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) [ 261.390839][T11819] loop0: detected capacity change from 0 to 131456 [ 261.413428][T11819] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 06:31:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080), 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) [ 261.453424][T11835] loop4: detected capacity change from 0 to 264192 [ 261.495596][T11844] FAT-fs (loop1): bogus number of reserved sectors [ 261.502509][T11844] FAT-fs (loop1): Can't find a valid FAT filesystem [ 261.518076][T11850] loop2: detected capacity change from 0 to 16 [ 261.553712][T11858] loop0: detected capacity change from 0 to 131456 [ 261.562016][T11858] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 06:31:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x111, 0x0, 0x0, 0x0, 0x44, &(0x7f0000000380), 0xffffffffffff7a2f, 0x0, 0x7}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r2, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x1031c2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x40, 0x2, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x40}}, 0x0) dup2(r1, r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ftruncate(r1, 0x8000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x40046629, &(0x7f0000000040)) 06:31:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080), 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 262.261199][T11878] FAT-fs (loop1): bogus number of reserved sectors [ 262.268440][T11878] FAT-fs (loop1): Can't find a valid FAT filesystem [ 262.295774][T11874] loop0: detected capacity change from 0 to 131456 06:31:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:41 executing program 4: writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)="31492b5fc4dc81ec40364b94992da034b8", 0x11}, {&(0x7f0000000040)="e52df6581a641282d940b72c58f15f645717f6b84413c66bdaf863d1ec557f88de0eca71ab43f3006c58d8127653cced515972aa3ddbf7df7364c9f9b91f2607c77389e93f6e920d1bad7e7550cd33726f04e137", 0x54}], 0x2) r0 = syz_open_dev$vcsu(&(0x7f0000000100), 0x100000000, 0x40000) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000140)=""/56, 0x38}, {&(0x7f0000000180)=""/134, 0x86}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f00000002c0)=""/142, 0x8e}], 0x4) r1 = accept4$inet(r0, 0x0, &(0x7f00000003c0), 0x0) write$binfmt_misc(r1, &(0x7f0000000400)={'syz1', "48e90fadf244c3ed03082a886e4c23b2c807237eded38fd8b6cecde4333b4e2ef77d853b475cdffc3bf76c616893"}, 0x32) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000440)=@tipc=@id={0x1e, 0x3, 0x3, {0x4e22, 0x2}}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000004c0)="81c245e4bf3f08d7be275053067e593106291cd510b72b2675d967eec7c0d494a881a91971b839b072854c7ffbb1e269a1dd0445e00507ccadc1fc932e58a4c83066b678b5a1c26ada6c48f867eb5498a957869b8d23810c45f6ca26a8408ea65c043ceeac22b378d86b07fdf629f15c72fcce514a0fac131107712e9224e0270dd09f8d5cad24fa2b574a66a6a4afda6f28d871fb733de5039c357ed1b0ee66a2026547cc1a32383cbbd4d91e2ad6da89828922d0d6459037dfec0d5bdfd7f7dfc1019b9374e78cb38060c3e9ed3aa91d41e427c5a18e25331a", 0xda}], 0x1, &(0x7f0000000600)=[@txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x2}}], 0x30}, 0x20000080) ptrace$setregs(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000680)="3d958b88848492ec2dff2b5e6e96ad2b66bc998c9950fd4d311678f46cbc18d8d30cf7d9ffef0bd4950eb2797627fc105de76a8b960c896af39e0ace2a60996f346ae3fc66c56d9c739139eb33531cbd") r2 = clone3(&(0x7f0000000980)={0x100010000, &(0x7f0000000700)=0xffffffffffffffff, &(0x7f0000000740)=0x0, &(0x7f0000000780)=0x0, {0x2}, &(0x7f00000007c0)=""/146, 0x92, &(0x7f0000000880)=""/146, &(0x7f0000000940)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x3, {r0}}, 0x58) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x20010, r3, 0x823f5000) sendmsg(r1, &(0x7f0000004080)={&(0x7f0000000a00)=@vsock={0x28, 0x0, 0x2711, @local}, 0x80, &(0x7f0000003d40)=[{&(0x7f0000000a80)="c779195532351e74a5", 0x9}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f0000001ac0)="e174d2e0", 0x4}, {&(0x7f0000001b00)="a673e7bebff4773c84beffa238ce011e3ffd0d1a019c374cf9a858502eca6a1eb89767adedb740f6190b0f8b58750771204c411cfd01a93ceca205f207bbf04be4ebfd777adb5974d8afe06908035277e1b2d19ca68aca7d187f2d8dca8a6faf17bb1eefb1ca05397ec94635cf422ca4e430ddab1be5dcdeaa3784a22a405e74115feb5e64ffca6237d5889e7a76bfbc", 0x90}, {&(0x7f0000001bc0)="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", 0x1000}, {&(0x7f0000002bc0)="0e5a3f39ed57700c25d66e61def587d16752949d57cffd8ff676d1a92c3b6050c92a2d814af777ace292ddacbb6c585824d4b1e8e1c6cf2b1dc3aef3105dbe", 0x3f}, {&(0x7f0000002c00)="dbfebab4dfeea37dbef07dfe0a27d7c91d80b4fd549228a9adff9afe17f5dfd7f3018de092c9e6c6e9cf48042046237a80894247b0646c9b9e58df8f56454d1a1f7d513acdd62916625cbdbbfd281c0ab15fd96b2b33a1db1568316828241ec3e28bcec1822567bdd78290b41d2e4f3c237ef68ce3de9c411b4b247e30e789059948fa64e681d317ae8c8a7e8926980d478e437afc6e51b08d7755daa18669adbdd194c879533e0f1d2619742c577ceed5fc2013c0e259b3f5ea9917a11c6b7d83fe9fa9ee1fbc3d713179cc3e309fb4", 0xd0}, {&(0x7f0000002d00)="2bdaa8ed88774978f10d3535d6dfc242ae4c69d2a351241f0ed6c07e885f66e341db99b39fabff321a5d27477556c48232c9a1cdd51d4fe24eb1d0e06c21f6b2c5243b07ff2d8f395435b9ecab3e4c2cad758b03b108dbcbc3f1bdc67d05d9c87634aedf1f90a657de418c4366b76bfc736ae1c8819b0f828c45de3dab37a93fb4557f73d44fb9393ef3506181074eeee12dc252180bfe865d01a62411cc5574ee55f1fa86fb99eeb13a5819f4f956e3859fbab3493f9247d3ffa78a144f773128f4135580611f4f9902d654e19f4a383396552ee706795d4e47b10e506ddd34abba3616e425ba984a66d04834c76bdab32ecbddc54d441133c4a4779d5806969d9003666d9ccfd401b5ada23556a41ea2e4e54234646a6ca269be6dfb1324fe13a58b6c6776533169178f9fb42170f6b9ec5274d7d3b5e3b01d67cddf72df6635dde7097ce3997d1b8ec02b20a60f4e22d24a1175610b85c0259d0c8148961c2a3c6b01d55b35172c14bae7f3fe50d03f231740bdcc4b13af376560f54f9832cb9f87a57675ab6c41f3a5ae18a9f25d1fa2f8fc31c4cdb84365ca1a7e02bb4b4273566c0018a5fd9d52e17e17125a3507b73cb8e455439d0ff75ed39a7d3b9d93ea0b5651a21e219e194dc2a991a0b1fefe1e2ab7dc1edb4dc21ee1054178b663673831434f38e285736574f0dc3b9eb6d122f3ee67b66eb578b60d6bb2bef8bd92cb0cf81172c3411b4eaa10e5526a7c1f641a14f9264d5e284dbbeac39a1e1a113696d0abba450d28d36b2acca7ec7867e49a898d8fc75dc1947d74b14183b79c45056ac26ccc84cd88e550dd1189545499247aad5c66bc4c2e7406d5983a28cbbfd389bed9fd92f55b74eb438a4468940e0f53fa7a43eded9243465ae291acd9d7b7ecbcfe6670d67fdbb7b9d2cafc6d6c5dc2c657fa1e11d412d00f5cb8825ba9f829c0fd21edfd527559cb2f69c0ce770774dbe469ee5b195e84f0dbd16ab5975c488bad22df9b3bc58a057aaf0875b28cf16025ab677c56f8f953d155067d72f27a71165cce9e23a0e8532f5ae425ba513c41d595e32c97774046502af4a7cca8ee885668a80e91aa06c29544987845144c8b5846c3e8a562f988177a5f9074e57b3449c04f347d2e5a34fbcdb5703f1d9c4a09098dbe3624d8080053a7ae7dc8c04425d92d2e09c845e08bf5b182790b53afd39f912944253d5773af1958bb07c149825e1b6aef63caaaf33b1f0e0df437f42b7c675163568710429eeaf4007685a62be45b7c8d4764b6519b7dfe4eaf8aa19faf83d8a45e4e971f07a8e476e8405c447388de3cf4b8df5d7e8acd6d1f593545be478b09d3beefe759a62cd04c62a9f2117da9420d5dd4c11af482f65528949f5d5a45fc31142238464e901a29019dcd669e0c2b6fa2ebb1f0f7ff7aa3b7472959c298b8a2a2a49f72cd3a91ba69e23e73e8c5aaaf8a9b7b58e23160b0fe3226656007e12c284260292fa3ce97b76aacf65f10aa4ff49a3916797dbb2cc29a0f96836e168370d3eb5e35eda2826dd52c8e7cf233270014a7b624c9a26c2f77b2db52e43b757a03d949877c8f711cc67314bae0d3550b8fc2f0cf7e72cf01e897e0876825d92765c90e4c56a5de9ff23a39a43bbc8d222ffdba05ce8e8a04156d89a5effa02f8a63a0938c304b971f66d247c0cbef43b5f20745c4109f1969dc300bfb75243ca5119864949a0f7de3332d8b4a2fff416493450edb53b2346dcede0ff10ed89683f666df4cc39e21127fa1034d920b3eae6ed35b3bbedddf05997eb78731ffb7ffea4334ba1f7a463b5681756140e126dd10e6040444106964e4c2dce01232ea0656ce60d7a8ea83cab5505019bcc6c31a3f2689fe130c0f8dc161473b609a4a2c5ef3f94eb70359dd8f7de34a60effd79f2dcf84ef3edfc4426b10bb1369736d513f9c5ef07291f486df5ae9e48e4237104772c1cd91dbfc750c36fd6042ccdd220a21804363ee044aa9e6150597800e23327e7e8b744228a9fbc8f8da5f95962282a46983964fce29ef9bb8aeb73fe3849beb8bb1cf57684496ff4dc131fc4bae0f3acc1749ca3b18fcde6baf1a1deebe8c3994573dd8eb09af992917f8870558e71e44ee2bc1c972c1485d8c575140b9dbe46b427bc484b1d67de8d8376e4a0aed96192aa42d3a34cd20c9b567d8dbdc7d2e00b8c051d9a973afa360e7cd01542bb58d1191a4b0885fc9d7110e80036180616804cfb63cdb08af4afdcce18f6ae940f8ba0b325dc542b5219f26ab9053b6e63f0e8e287cc631b977ed48b1a37612fb0916a9a8c103b654d565c3f30fe9a921cdbea170c41beb3f62cb10b7849739771590644945a96b6c46a7b037661638839f3c6f258914e12c552b880754f982676c210ee117553877ba2b0260a93dd9a76e0befc6c68005417ff4233142bccd23681a23eb1edb5951df20163d8c0d9edfb83fe74bb3d2f8844791884282b7ccd98f3a36ddca264253d5e6a51bb60213edecd2792fd637fb6637578e50f87ac313a770fbedbbf1d55289a7cd72ce6a7f49d8221b3acbfd358dd71cf83129f462c778a1af9e840c822752a254fe1636a4196ac934d8819d695edac49b76c069cf742ea2e6e1de37ec3d886ab0b7c77d9f9dfbe697fb8cf5b1bb28409ba5aa3487018836b2f2dde4de88cd86ffb683b2d753404b1d40f60d308555f99463597bcfb79c5b66de1c1920ecdb2e37425a7600d95946515d255bbddf23504b53fd5656cd6f0f710dfe80f215d2632a5fa781c80657ab00d3248265f38b249f6fb1e9d93898e19de44ca5dbef260e365b428a2e8ff0faf520602b1256b222edf460962f1f221c2eeb965cb90d89df119665b5364b65037c5e87c5ee3a2e347c3b3e39a77c7183214859c5d3b415ef9671d493664ec577c7643252f12214bba31921dea44c6121ed5652c7dca03cf23ae7f0b62ef71fb6799ba834a6ac3f4b2a5a56fe54e907968afd4a42e6c6ea3215dc309b4d3bb7a9676a92b4b4d415c0d9fac2b513b8c79f13d22f59157b7090187681286288ba48888c9b519481e8b553010bae676464d1efcdc855d70796647a98c5d9dd37bb6b12a3ba25c96be9a80fc7ac44b7f9936479af226811de7e49fbdca6b33d95dbfd37eed42f3969031b15ced6ba7dd21d0154c1d6dad63b594e18ae585b0aa7f6395161ff38e53eba36c5bbf27b02441f55433bcacc9858fe6259540b991ace5b9242b7ff77880e3811e7668fe71da36c73e593b3bf3da9653195267917e11588614ae8c95e0753a83921d92ea2b7cf69e862e6408ba3d0422bf92f27bfbd5d8b486ca0284b4b2431c535bd9ebc8fbe31559443c2ea887b92e466e15c6aec40bc81c6613546a81e1d79820d56f3aff5abb297225c67073e7ce233a76541ffebdbe3dadfcf65e7ed9768c2426be4efda296ae70c981e78e7243db36937b0c7d22e98a9706a31b4b2cb32db3b01944d0bdaa24df0daa66252d69a60d7444be2b3df2a5f05a4d423391f1aefa6102eb5c5cc8eef15d3b2b707f002d29880ad0dbd1d3a414bcf06602c35edb2712a2712a6035d176e7b2024c16cf2792032f2545b8b71b3699788abbba84ab557aa626689decd9f4038f28d5b7163708fe758ee744f6c47091619b2c8ce04a0460f525079f72545978ea54e2e61de9463645d31a8c95f09c31152e255f22f1f59c656dfdf7aba3402fce159d503435b9a72d508f4c1adb31b09b125b7b00f20a41a03e65dc4dec91f2708fabd0db4eb57a1bd42746c7317c9754e891bfa1ffc54860a8e600cc8392da6ac0523dfd24fb2f899dc0e91a2058f413fcab8324e970a688c99cf68b896f4b251f79fe4e10e0cd64fcf04b5410ddfa58f7b7712af94228d5704a953f3fd8f5fba4f93c9379070ce73b6700e541b8b666733a0bc4304dd46e812718f0d070aa1a70ef791b086774b075fce121601d293448b0e6a7cba2564e9ebe8bf0420d6d1a8662a05a4265c0ae7f7428716bb7370725c907787314649652a0c75a32e1de4ec550b17e6b3f9a219fa47b2498745cf74e30864279a86df66a251fd0c9bd390a9aae0b84c832bf2e1253b72bd72347a85ef91e6eba9eb8290787468a64167da465a8be8453599bcfb196fbe0ec6927e2e5ba2f62e8e19f9598cac5dcf595754181ecc46f34f231443671aa979686178f2d037e9148fee6e88570e6425e6c87ac9ba5d9c982ff37454cc55502e19cb3a5b6f151867ef650086457bb74c636a46accef75a4557fa648c42df8d2dd2cdf446a7e7fc8b79fb55be4ee0daf661b4a9df4f57dd70ad3b8e0eba4009397e723b5559da296deb880b981339705f07db78f69661a8ca54fe71469dcb131f0ac4aaf5e28645f44b368ac0adc4d0762b8e2628794c93491fb1f456224846b7eefe2444198af9c958dd21b5c0fea4cab70266f43550fbdd48cc7934c12dc2b075325b3c65532a6da32e8d586a030912fdaa2607e061f4577a91447104c8e1afb057818d0f288f888c44eb0c75109504a55438cc5dbd818b92f2772a01550b67926aa9376e11fc664c1679f423e1d4dd7c6543d1c7d37a45af02c3767d19bb1840ef799f806a6cbd3d4af75bb191331a4e40d435197cc904be912243fbb1eece16d9b8d0c8c817569add04f3ed4fa8c65a7979fa6a87b94c3d729531cddf82e086a2f3739781a5757a15c827dd22f8a02d31c333f43dbc3879c1d7db9dc97b7d3eac6bf36da9113dede15576f0f0be10ae6a7ef989acbdd56519a94130bb18eb0292f65ac836909827669906c7b2554ec18fa5323caa3a7f40a3e58083d314a69c4b46f1039fccb503acb6651c8132e28647dbc2666af850caae16849af11ac4866e1c829857e8269ec3f66e7d7a6c10cd9544d699260f43822e5ee65327591c4a75c81bd5c1e51c127159197bff62a63b22145417275d80913ef79f2f959e4611f6ea3363aebe243032923cebe5c0fd7f1b35d32a69b0a156f94511cb709ffaadcd6f30d810ab571db8eaafef598048256af1d69c0fbc6779af206b0d97c81128d26b4931549c493aacfaed3f310468a8006cadd13419d568ef6a957d2e51126c688c33490da5ab9d7a481c575415dfe7855939eac8ee6837526e97567d1d90dda3b126e0853737d1bbd7f7210bb27a9fab7145b1a6a73dd4b5745347d1ebd3c0fde5fe0d651725084c3cf9baf3321c811541dd53ab6921b475f353302fa03ca7313cbd48ab5f4386556fc3496b684653ac9696cf2ba108d7931a19b6c3315a0ef1da5d6192ef6721a3e31ee4f8f2111fb069fe6bd19f2de88ba51b473eb0d7d9965e79a8429401ae1e9761a238a89cf038fdcb94580539b575a39705cd95715400a945fcbaf13ce54206bb226074454ee59accee599b3d4a94e2eb04fbc013b2cfa260e89975097df3a3434de17444766ca4331dac994b4bfe237706fb49455722a0ed183df1571f604b1b26b1489f53419da6af1211643dbfbd43ce45232bb8a0562202021f89453b455ce7fe447809569d1cad9ad175aa67eca4d6a4ec381d931f09c7571b22539cdd5276407119058431da3cc99d91e7e028d9c2357171c9ec08af8664e9570209ebe443ef3f4fa7262ac5690681c45d3096a07f62566ad84a065fcc5fc4c86e7199e1cb0c12f3eab32416079b12300b062366f1f99e8f5c66a16c9d3887a3da9ff1c29c7921371eb459c5e3a0925fb0c4a33253bdfd2e0a0cbb96237d7ea4fcace3201171de630698d7426b0bfe736b44285ae37c7dbeba17006f8ed475adafa4ae5eeb66", 0x1000}, {&(0x7f0000003d00)="c723b987461906487592d2d9ec27863b619f07e1dbd0ca7ddd3b0f5dc7f8c9618df5cb56c8de47506572168cc6abf56dc37175b65b6a", 0x36}], 0x9, &(0x7f0000003e00)=[{0xc0, 0x191, 0x7f, "0f6c4a759fcf7049e40c22a4542cd6db0c95398941f03de12c8411bd315a81c752de8191b77ae8e1753b0b2ffc7f2ed81459f72326f37775cc20a971a1416261801df2584c0b4ba13e527f3528b8ab31dcf6164990b805749d987ee3c5e1b3b7e0d3f0d0b2317c1fc11b7c4700de5a241520a49d43f51807593b18cef222f13db6c8685b72a27142e319b41f88ec9dbb0351dba1a38ac1c485563716c59ae443ccec54e0f538d55b731f174f620d52"}, {0x50, 0x111, 0xff, "55bff59d9b3e7c929540ccfb1c47c824dfd7350b818918be392c345fe714863f217440ddf3384dca0ad2f2864805c48957209577000bf9da07"}, {0x70, 0x1, 0x100000, "624118390a5f8ba6c8e68ddba9f53468f486d8efa8bc7b09952f0b461c5b281f2164b7da77592e2f384ce55dd9570bca67a61f1f38678cf945b2fbc973cbc55104ccf94d4528f597fe125cefcd883fa7d989739074f9a61d17e8b96c"}, {0x30, 0x112, 0x7f, "96f0345b363c2125d1e55721aaeefa1ab0a9fba420c314cc96de0dac4cc95901"}, {0xa8, 0x0, 0xa742, "21dca9f207414a4abf074ef426db9be2006fea868df4c8d1f891a6f636b7a078f7fdd4e88b7e263ab65406f164ea031090b3a5c8d2ddfd2b175c6fbed25d31eb5a236c8e7cf88cc8112af308b0942579cf4fb1dd8b1132224186b2bb563ee6a14d3efd84bc7008b2b10311f5bfc611db761e3445ff4758725efeda4c5898083cf392a5a5ad105b1fae83e25cee2fe778f68998"}], 0x258}, 0x810) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000004240)=0x0) r7 = getpgid(r2) clone3(&(0x7f00000042c0)={0x8000000, &(0x7f00000040c0)=0xffffffffffffffff, &(0x7f0000004100), &(0x7f0000004140), {0x25}, &(0x7f0000004180)=""/106, 0x6a, &(0x7f0000004200)=""/26, &(0x7f0000004280)=[r5, r4, r2, r6, r4, r2, r5, r7, r2, r5], 0xa, {r0}}, 0x58) pipe2(&(0x7f0000004340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$PIO_CMAP(r10, 0x4b71, &(0x7f0000004380)={0x3ff, 0x10000, 0xf7d, 0x5, 0x6, 0x5}) r11 = open_tree(0xffffffffffffffff, &(0x7f00000043c0)='./file0\x00', 0x9100) tee(r8, r11, 0x6, 0x8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000004400)={0x0}, &(0x7f0000004440)=0xc) wait4(r12, 0x0, 0x8, &(0x7f0000004480)) preadv(0xffffffffffffffff, &(0x7f0000004780)=[{&(0x7f0000004540)=""/72, 0x48}, {&(0x7f00000045c0)=""/175, 0xaf}, {&(0x7f0000004680)=""/210, 0xd2}], 0x3, 0x10000, 0x3) 06:31:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 262.322649][T11874] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 262.411563][T11905] loop1: detected capacity change from 0 to 1 [ 262.426498][T11908] loop2: detected capacity change from 0 to 6 [ 262.441012][T11905] FAT-fs (loop1): Directory bread(block 3) failed [ 262.450317][T11908] FAT-fs (loop2): Directory bread(block 6) failed [ 262.456059][T11905] FAT-fs (loop1): Directory bread(block 4) failed [ 262.465985][T11908] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/222/file0 supports timestamps until 2107 (0x10391447e) [ 262.466556][T11905] FAT-fs (loop1): Directory bread(block 5) failed [ 262.487833][T11905] FAT-fs (loop1): Directory bread(block 6) failed [ 262.497008][T11905] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/307/file0 supports timestamps until 2107 (0x10391447e) 06:31:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r2, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7", 0x2d, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:41 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x180, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_TAIL={0x164, 0xf, [@random={0x7, 0x7d, "2b1528d100e0d1eceb6629b09bdbf9f164405babed61eede1f6c7d94b4d481cfcb1eb045bd1222f976292cd5ed13a7cfdbedd9ba3580a969c2d0fccee47dfb2454bf71898a0587bcc1826b1a2272af76288c152250854cc3e9a1a0f51fda475c955b3d387ff89b6f85bd711bc2102a34458995d0fff350715f03a32474"}, @challenge={0x10, 0x1, 0x8f}, @dsss={0x3, 0x1, 0x78}, @supported_rates={0x1, 0x3, [{0x16, 0x1}, {0x7f}, {0x24}]}, @prep={0x83, 0x1f, @not_ext={{}, 0x3, 0x0, @device_a, 0xfff, "", 0x8001, 0x7, @broadcast, 0x2a3a}}, @ext_channel_switch={0x3c, 0x4, {0x0, 0x80, 0x88, 0x6}}, @ibss={0x6, 0x2, 0x1}, @random_vendor={0xdd, 0x62, "5d34fdbf043576083aeec2995555da049dafd298dab391d4fee026efc176521826aa3fa30360bfecb86cc4159df0c7137471cbc0a1ddc0a5dbd2175cbd650a316828c1edc77cd5228be3b97ec09123c8476136fa3ae279edda78423f83b4079d391f"}, @measure_req={0x26, 0x3d, {0x7f, 0x0, 0xb9, "5ca7d5d1951ad5700e78d0b3ce5d0d8c004cc83047a83f9908bce9cc2225b71dc6cd47d46ce230e4c41015e38917f6d0368556039cfd5356994e"}}, @gcr_ga={0xbd, 0x6, @broadcast}]}]]}, 0x180}}, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0)="a2e699f9", 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="04030200adfded9d844161d9d5cb6c182c"], 0xfdef) 06:31:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000440)="00000000000000000000000000000000000000000000002c0679e300000055aaf8ff", 0x22, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 263.172994][T11934] loop2: detected capacity change from 0 to 1 [ 263.177391][T11938] FAT-fs (loop1): bogus number of reserved sectors [ 263.186406][T11938] FAT-fs (loop1): Can't find a valid FAT filesystem [ 263.200548][T11940] loop0: detected capacity change from 0 to 131456 [ 263.200948][T11934] FAT-fs (loop2): Directory bread(block 3) failed [ 263.216528][T11934] FAT-fs (loop2): Directory bread(block 4) failed 06:31:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:41 executing program 4: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x7ff}, {&(0x7f0000000140)="ed417f00000000000010645f29c4645f29c4645f00000500000002d2eaec28bd9bce8af6430d2db4f0278639e3074711dd442494eb850ac092b1bd0efd40a8279d6354", 0x43, 0x4000}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x9400}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x40010, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xd9f, 0xe2c00000) unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x200) setxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x2, 0x3) [ 263.223279][T11934] FAT-fs (loop2): Directory bread(block 5) failed [ 263.231041][T11934] FAT-fs (loop2): Directory bread(block 6) failed [ 263.238620][T11934] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/223/file0 supports timestamps until 2107 (0x10391447e) [ 263.261878][T11940] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 06:31:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7", 0x2d, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 263.306657][T11958] loop4: detected capacity change from 0 to 1020 [ 263.344851][T11958] EXT4-fs (loop4): Unrecognized mount option "íA" or missing value [ 263.386821][T11977] loop0: detected capacity change from 0 to 131456 [ 263.400039][T11971] FAT-fs (loop1): bogus number of reserved sectors [ 263.407101][T11971] FAT-fs (loop1): Can't find a valid FAT filesystem [ 263.425085][T11958] loop4: detected capacity change from 0 to 1020 [ 263.439543][T11977] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 263.442515][T11989] FAT-fs (loop2): bogus number of reserved sectors [ 263.454429][T11989] FAT-fs (loop2): Can't find a valid FAT filesystem 06:31:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r2, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7", 0x2d, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:42 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x85) unlink(&(0x7f0000000000)='./file0\x00') chown(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180)='tracefs\x00', 0x1000008, 0x0) 06:31:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) [ 264.061344][T12012] FAT-fs (loop1): bogus number of reserved sectors [ 264.068383][T12012] FAT-fs (loop1): Can't find a valid FAT filesystem [ 264.086815][T12015] FAT-fs (loop2): bogus number of reserved sectors [ 264.093874][T12015] FAT-fs (loop2): Can't find a valid FAT filesystem [ 264.103696][T12016] loop0: detected capacity change from 0 to 131456 06:31:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) [ 264.115235][T12016] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 06:31:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f465", 0x43, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) [ 264.237193][T12042] loop1: detected capacity change from 0 to 1 [ 264.254989][T12044] loop0: detected capacity change from 0 to 131456 [ 264.264131][T12047] FAT-fs (loop2): bogus number of reserved sectors [ 264.265925][T12042] FAT-fs (loop1): bogus number of reserved sectors [ 264.271056][T12047] FAT-fs (loop2): Can't find a valid FAT filesystem [ 264.277868][T12042] FAT-fs (loop1): Can't find a valid FAT filesystem [ 264.320868][T12044] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 264.331723][T12044] EXT4-fs (loop0): group descriptors corrupted! 06:31:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7", 0x2d, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) write(r2, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r2, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r2, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 06:31:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r2, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 264.920064][T12078] loop0: detected capacity change from 0 to 131456 [ 264.932488][T12078] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 264.935363][T12075] loop2: detected capacity change from 0 to 1 [ 264.947327][T12081] loop1: detected capacity change from 0 to 1 06:31:43 executing program 4: unshare(0x20400) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f00000005c0)=""/204, &(0x7f00000003c0)=0xcc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="40000000020201040000100099e0000002000000acbc823fffbe2c0002800600034000000000140001a008000100000000000800020069b0a9"], 0x40}}, 0x0) sendmmsg$inet(r1, &(0x7f0000000000), 0x0, 0x40000) 06:31:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7", 0x2d, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 265.007136][T12081] FAT-fs (loop1): bogus number of reserved sectors [ 265.013788][T12081] FAT-fs (loop1): Can't find a valid FAT filesystem [ 265.021118][T12075] FAT-fs (loop2): Directory bread(block 3) failed [ 265.038347][T12075] FAT-fs (loop2): Directory bread(block 4) failed [ 265.046353][T12075] FAT-fs (loop2): Directory bread(block 5) failed 06:31:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) [ 265.054404][T12075] FAT-fs (loop2): Directory bread(block 6) failed [ 265.062146][T12075] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/227/file0 supports timestamps until 2107 (0x10391447e) [ 265.080289][T12105] loop0: detected capacity change from 0 to 131456 [ 265.092817][T12108] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. 06:31:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:43 executing program 4: unshare(0x20400) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f00000005c0)=""/204, &(0x7f00000003c0)=0xcc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="40000000020201040000100099e0000002000000acbc823fffbe2c0002800600034000000000140001a008000100000000000800020069b0a9"], 0x40}}, 0x0) sendmmsg$inet(r1, &(0x7f0000000000), 0x0, 0x40000) 06:31:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, 0x0, 0x0) [ 265.112010][T12105] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 265.150097][T12118] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 265.182389][T12125] FAT-fs (loop2): bogus number of reserved sectors [ 265.189585][T12125] FAT-fs (loop2): Can't find a valid FAT filesystem [ 265.197577][T12126] loop1: detected capacity change from 0 to 1 [ 265.208906][T12126] FAT-fs (loop1): bogus number of reserved sectors [ 265.216295][T12126] FAT-fs (loop1): Can't find a valid FAT filesystem 06:31:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(r2, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7", 0x2d, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:44 executing program 4: unshare(0x20400) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f00000005c0)=""/204, &(0x7f00000003c0)=0xcc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="40000000020201040000100099e0000002000000acbc823fffbe2c0002800600034000000000140001a008000100000000000800020069b0a9"], 0x40}}, 0x0) sendmmsg$inet(r1, &(0x7f0000000000), 0x0, 0x40000) 06:31:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, 0x0, 0x0) 06:31:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 265.808274][T12146] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 265.822153][T12150] loop1: detected capacity change from 0 to 1 [ 265.829133][T12152] loop0: detected capacity change from 0 to 131456 [ 265.838272][T12152] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 265.845590][T12151] FAT-fs (loop2): bogus number of reserved sectors 06:31:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:44 executing program 4: unshare(0x20400) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f00000005c0)=""/204, &(0x7f00000003c0)=0xcc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="40000000020201040000100099e0000002000000acbc823fffbe2c0002800600034000000000140001a008000100000000000800020069b0a9"], 0x40}}, 0x0) sendmmsg$inet(r1, &(0x7f0000000000), 0x0, 0x40000) 06:31:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, 0x0, 0x0) [ 265.853026][T12151] FAT-fs (loop2): Can't find a valid FAT filesystem [ 265.860275][T12150] FAT-fs (loop1): bogus number of reserved sectors [ 265.867073][T12150] FAT-fs (loop1): Can't find a valid FAT filesystem 06:31:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x0) [ 265.950074][T12175] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 265.958012][T12167] loop0: detected capacity change from 0 to 131456 [ 265.966503][T12178] FAT-fs (loop2): bogus number of reserved sectors [ 265.973425][T12178] FAT-fs (loop2): Can't find a valid FAT filesystem [ 265.996134][T12167] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 266.005448][T12184] loop1: detected capacity change from 0 to 1 [ 266.026895][T12184] FAT-fs (loop1): bogus number of reserved sectors [ 266.034014][T12184] FAT-fs (loop1): Can't find a valid FAT filesystem 06:31:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000001740)="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", 0x159) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:45 executing program 4: unshare(0x20400) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f00000005c0)=""/204, &(0x7f00000003c0)=0xcc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(r1, &(0x7f0000000000), 0x0, 0x40000) 06:31:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x0) 06:31:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x0) 06:31:45 executing program 4: unshare(0x20400) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f00000005c0)=""/204, &(0x7f00000003c0)=0xcc) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x40000) [ 266.707493][T12218] loop0: detected capacity change from 0 to 131456 [ 266.707538][T12216] loop1: detected capacity change from 0 to 1 [ 266.724509][T12219] loop2: detected capacity change from 0 to 1 [ 266.727865][T12216] FAT-fs (loop1): bogus number of reserved sectors [ 266.737605][T12216] FAT-fs (loop1): Can't find a valid FAT filesystem 06:31:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 266.752137][T12218] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 266.760099][T12219] FAT-fs (loop2): bogus number of reserved sectors [ 266.766972][T12219] FAT-fs (loop2): Can't find a valid FAT filesystem 06:31:45 executing program 4: unshare(0x20400) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f00000005c0)=""/204, &(0x7f00000003c0)=0xcc) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x40000) 06:31:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 266.861303][T12244] loop0: detected capacity change from 0 to 131456 [ 266.869274][T12245] loop1: detected capacity change from 0 to 1 [ 266.881261][T12252] loop2: detected capacity change from 0 to 1 [ 266.896657][T12245] FAT-fs (loop1): bogus number of reserved sectors [ 266.903301][T12245] FAT-fs (loop1): Can't find a valid FAT filesystem [ 266.909518][T12252] FAT-fs (loop2): bogus number of reserved sectors [ 266.913837][T12244] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 266.917600][T12252] FAT-fs (loop2): Can't find a valid FAT filesystem 06:31:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)}, 0x0) 06:31:46 executing program 4: unshare(0x20400) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f00000005c0)=""/204, &(0x7f00000003c0)=0xcc) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x40000) 06:31:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 267.573915][T12275] loop0: detected capacity change from 0 to 131456 [ 267.582997][T12270] loop2: detected capacity change from 0 to 1 [ 267.593849][T12270] FAT-fs (loop2): bogus number of reserved sectors [ 267.594077][T12275] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 267.600722][T12270] FAT-fs (loop2): Can't find a valid FAT filesystem [ 267.603048][T12277] loop1: detected capacity change from 0 to 1 06:31:46 executing program 4: unshare(0x20400) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(r0, &(0x7f0000000000), 0x0, 0x40000) 06:31:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)}, 0x0) [ 267.611376][T12275] EXT4-fs (loop0): group descriptors corrupted! 06:31:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 267.670892][T12277] FAT-fs (loop1): bogus number of reserved sectors [ 267.677698][T12277] FAT-fs (loop1): Can't find a valid FAT filesystem 06:31:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)}, 0x0) [ 267.744192][T12299] loop1: detected capacity change from 0 to 1 [ 267.756375][T12298] loop0: detected capacity change from 0 to 131456 [ 267.767401][T12298] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 267.776298][T12299] FAT-fs (loop1): bogus number of reserved sectors [ 267.783986][T12299] FAT-fs (loop1): Can't find a valid FAT filesystem [ 267.790669][T12305] loop2: detected capacity change from 0 to 1 [ 267.825790][T12305] FAT-fs (loop2): bogus number of reserved sectors [ 267.832928][T12305] FAT-fs (loop2): Can't find a valid FAT filesystem 06:31:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:47 executing program 4: unshare(0x20400) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(r0, &(0x7f0000000000), 0x0, 0x40000) 06:31:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}, 0x0) 06:31:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(r0, &(0x7f0000000000), 0x0, 0x40000) 06:31:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}, 0x0) 06:31:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(r0, &(0x7f0000000000), 0x0, 0x40000) [ 268.509730][T12334] loop2: detected capacity change from 0 to 1 [ 268.516462][T12335] loop1: detected capacity change from 0 to 1 [ 268.517063][T12333] loop0: detected capacity change from 0 to 131456 06:31:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(r0, &(0x7f0000000000), 0x0, 0x40000) 06:31:47 executing program 4: unshare(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(r0, &(0x7f0000000000), 0x0, 0x40000) 06:31:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 268.552599][T12333] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 268.560578][T12335] FAT-fs (loop1): bogus number of reserved sectors [ 268.567770][T12335] FAT-fs (loop1): Can't find a valid FAT filesystem [ 268.578069][T12334] FAT-fs (loop2): bogus number of reserved sectors [ 268.585347][T12334] FAT-fs (loop2): Can't find a valid FAT filesystem [ 268.673602][T12367] loop0: detected capacity change from 0 to 131456 [ 268.684544][T12367] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 06:31:48 executing program 4: unshare(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(r0, &(0x7f0000000000), 0x0, 0x40000) 06:31:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}, 0x0) 06:31:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef0100", 0x3c, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:48 executing program 4: unshare(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(r0, &(0x7f0000000000), 0x0, 0x40000) 06:31:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)}], 0x1}, 0x0) [ 269.397002][T12383] loop2: detected capacity change from 0 to 1 [ 269.397983][T12384] loop0: detected capacity change from 0 to 131456 [ 269.405558][T12385] loop1: detected capacity change from 0 to 1 [ 269.426048][T12384] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 269.436501][T12384] EXT4-fs (loop0): group descriptors corrupted! 06:31:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 269.447499][T12383] FAT-fs (loop2): bogus number of reserved sectors [ 269.454396][T12383] FAT-fs (loop2): Can't find a valid FAT filesystem 06:31:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)}], 0x1}, 0x0) 06:31:48 executing program 4: unshare(0x20400) socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x40000) 06:31:48 executing program 4: unshare(0x20400) socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x40000) 06:31:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)}], 0x1}, 0x0) [ 269.512499][T12385] FAT-fs (loop1): bogus number of reserved sectors [ 269.519490][T12385] FAT-fs (loop1): Can't find a valid FAT filesystem 06:31:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 269.574127][T12404] loop0: detected capacity change from 0 to 131456 [ 269.587413][T12404] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 269.598436][T12404] EXT4-fs (loop0): group descriptors corrupted! 06:31:48 executing program 4: unshare(0x20400) socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x40000) 06:31:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 269.679179][T12435] loop0: detected capacity change from 0 to 131456 [ 269.698592][T12436] loop2: detected capacity change from 0 to 1 [ 269.705631][T12442] loop1: detected capacity change from 0 to 1 [ 269.716499][T12435] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 06:31:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:48 executing program 4: unshare(0x20400) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(r0, 0x0, 0x0, 0x40000) [ 269.742244][T12442] FAT-fs (loop1): bogus number of reserved sectors [ 269.749278][T12442] FAT-fs (loop1): Can't find a valid FAT filesystem [ 269.759475][T12436] FAT-fs (loop2): bogus number of reserved sectors [ 269.766343][T12436] FAT-fs (loop2): Can't find a valid FAT filesystem [ 269.772282][T12454] loop3: detected capacity change from 0 to 131456 06:31:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:48 executing program 4: unshare(0x20400) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 06:31:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240", 0x12}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 269.783683][T12454] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 269.794379][T12454] EXT4-fs (loop3): group descriptors corrupted! 06:31:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 269.845852][T12457] loop0: detected capacity change from 0 to 131456 06:31:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 269.918517][T12457] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 269.928048][T12479] loop1: detected capacity change from 0 to 1 [ 269.943562][T12479] FAT-fs (loop1): invalid media value (0x00) [ 269.950204][T12479] FAT-fs (loop1): Can't find a valid FAT filesystem [ 269.954147][T12484] loop3: detected capacity change from 0 to 131456 06:31:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 269.989033][T12489] loop4: detected capacity change from 0 to 131456 [ 269.996296][T12487] loop2: detected capacity change from 0 to 1 [ 270.012150][T12487] FAT-fs (loop2): bogus number of reserved sectors [ 270.019673][T12487] FAT-fs (loop2): Can't find a valid FAT filesystem [ 270.028496][T12484] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! 06:31:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240", 0x12}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 270.039441][T12484] EXT4-fs (loop3): group descriptors corrupted! [ 270.041714][T12489] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 270.058248][T12489] EXT4-fs (loop4): group descriptors corrupted! 06:31:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 270.141217][T12513] loop0: detected capacity change from 0 to 131456 [ 270.150985][T12513] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 06:31:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 270.193714][T12523] loop4: detected capacity change from 0 to 131456 [ 270.194774][T12514] loop2: detected capacity change from 0 to 1 [ 270.207345][T12522] loop1: detected capacity change from 0 to 1 [ 270.224463][T12523] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 270.235723][T12523] EXT4-fs (loop4): group descriptors corrupted! 06:31:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 270.244706][T12522] FAT-fs (loop1): invalid media value (0x00) [ 270.251974][T12522] FAT-fs (loop1): Can't find a valid FAT filesystem [ 270.255974][T12529] loop3: detected capacity change from 0 to 131456 [ 270.268133][T12536] loop0: detected capacity change from 0 to 131456 [ 270.276639][T12529] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 270.287591][T12529] EXT4-fs (loop3): group descriptors corrupted! 06:31:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240", 0x12}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 270.303258][T12514] FAT-fs (loop2): bogus number of reserved sectors [ 270.310414][T12514] FAT-fs (loop2): Can't find a valid FAT filesystem [ 270.318291][T12536] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 06:31:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 270.401409][T12556] loop1: detected capacity change from 0 to 1 [ 270.419216][T12556] FAT-fs (loop1): invalid media value (0x00) [ 270.424386][T12558] loop4: detected capacity change from 0 to 131456 [ 270.425485][T12556] FAT-fs (loop1): Can't find a valid FAT filesystem [ 270.436823][T12565] loop2: detected capacity change from 0 to 1 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000", 0x15}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 270.488960][T12565] FAT-fs (loop2): bogus number of reserved sectors [ 270.493414][T12569] loop3: detected capacity change from 0 to 131456 [ 270.496270][T12565] FAT-fs (loop2): Can't find a valid FAT filesystem [ 270.509602][T12577] loop0: detected capacity change from 0 to 131456 [ 270.523858][T12558] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! 06:31:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 270.535682][T12558] EXT4-fs (loop4): group descriptors corrupted! [ 270.545598][T12577] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 06:31:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 270.589940][T12589] loop1: detected capacity change from 0 to 1 [ 270.614002][T12597] loop2: detected capacity change from 0 to 1 [ 270.623767][T12589] FAT-fs (loop1): invalid media value (0x00) [ 270.630300][T12589] FAT-fs (loop1): Can't find a valid FAT filesystem 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 270.666603][T12597] FAT-fs (loop2): bogus number of reserved sectors [ 270.667841][T12609] loop4: detected capacity change from 0 to 131456 [ 270.673251][T12597] FAT-fs (loop2): Can't find a valid FAT filesystem [ 270.698131][T12602] loop0: detected capacity change from 0 to 131456 06:31:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000", 0x15}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 270.729554][T12617] loop3: detected capacity change from 0 to 131456 [ 270.761764][T12602] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 270.807911][T12633] loop1: detected capacity change from 0 to 1 [ 270.814605][T12632] loop2: detected capacity change from 0 to 1 [ 270.817897][T12633] FAT-fs (loop1): invalid media value (0x00) [ 270.829863][T12633] FAT-fs (loop1): Can't find a valid FAT filesystem [ 270.840868][T12632] FAT-fs (loop2): bogus number of reserved sectors [ 270.847837][T12632] FAT-fs (loop2): Can't find a valid FAT filesystem 06:31:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240", 0x12}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000", 0x15}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, 0x0, 0x700) [ 270.943983][T12656] loop3: detected capacity change from 0 to 131456 [ 270.956784][T12657] loop0: detected capacity change from 0 to 131456 [ 270.964880][T12663] loop4: detected capacity change from 0 to 131456 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, 0x0, 0x700) [ 270.989576][T12657] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 270.993283][T12661] loop2: detected capacity change from 0 to 1 [ 271.018474][T12667] loop1: detected capacity change from 0 to 1 [ 271.019923][T12661] FAT-fs (loop2): invalid media value (0x00) [ 271.031095][T12661] FAT-fs (loop2): Can't find a valid FAT filesystem 06:31:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, 0x0, 0x700) [ 271.044567][T12667] FAT-fs (loop1): invalid media value (0x00) [ 271.051340][T12667] FAT-fs (loop1): Can't find a valid FAT filesystem 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x700) 06:31:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240", 0x12}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 271.116034][T12689] loop3: detected capacity change from 0 to 131456 [ 271.155417][T12691] loop0: detected capacity change from 0 to 131456 06:31:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f8", 0x16}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 271.165705][T12691] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 271.194986][T12696] loop4: detected capacity change from 0 to 131456 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x700) 06:31:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 271.218736][T12711] loop1: detected capacity change from 0 to 1 [ 271.225891][T12708] loop3: detected capacity change from 0 to 131456 [ 271.255240][T12711] FAT-fs (loop1): bogus number of FAT sectors [ 271.261854][T12711] FAT-fs (loop1): Can't find a valid FAT filesystem 06:31:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x700) 06:31:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 271.271672][T12715] loop2: detected capacity change from 0 to 1 [ 271.299811][T12715] FAT-fs (loop2): invalid media value (0x00) [ 271.306230][T12715] FAT-fs (loop2): Can't find a valid FAT filesystem 06:31:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)}, 0x700) 06:31:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f8", 0x16}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 271.331302][T12731] loop0: detected capacity change from 0 to 131456 [ 271.337068][T12737] loop4: detected capacity change from 0 to 131456 [ 271.342813][T12731] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 271.347008][T12739] loop3: detected capacity change from 0 to 131456 06:31:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240", 0x12}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, 0x0) 06:31:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)}, 0x700) [ 271.499072][T12760] loop2: detected capacity change from 0 to 1 [ 271.506914][T12759] loop0: detected capacity change from 0 to 131456 [ 271.506963][T12765] loop4: detected capacity change from 0 to 131456 [ 271.522317][T12766] loop3: detected capacity change from 0 to 8 [ 271.526841][T12760] FAT-fs (loop2): invalid media value (0x00) [ 271.529084][T12757] loop1: detected capacity change from 0 to 1 [ 271.534961][T12760] FAT-fs (loop2): Can't find a valid FAT filesystem 06:31:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)}, 0x700) 06:31:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, 0x0) 06:31:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1}, 0x700) 06:31:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000", 0x15}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 271.546785][T12757] FAT-fs (loop1): bogus number of FAT sectors [ 271.554398][T12757] FAT-fs (loop1): Can't find a valid FAT filesystem [ 271.562219][T12766] EXT4-fs (loop3): bad geometry: block count 288 exceeds size of device (4 blocks) 06:31:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f8", 0x16}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1}, 0x700) 06:31:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1}, 0x700) [ 271.656144][T12788] loop3: detected capacity change from 0 to 8 [ 271.670350][T12790] loop2: detected capacity change from 0 to 1 [ 271.680899][T12792] loop4: detected capacity change from 0 to 131456 06:31:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 271.738352][T12788] EXT4-fs (loop3): bad geometry: block count 288 exceeds size of device (4 blocks) [ 271.748986][T12790] FAT-fs (loop2): invalid media value (0x00) [ 271.753009][T12805] loop0: detected capacity change from 0 to 131456 [ 271.755319][T12790] FAT-fs (loop2): Can't find a valid FAT filesystem [ 271.755669][T12798] loop1: detected capacity change from 0 to 1 06:31:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x0) 06:31:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000", 0x15}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, 0x0) 06:31:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:31:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 271.797190][T12798] FAT-fs (loop1): bogus number of FAT sectors [ 271.803670][T12798] FAT-fs (loop1): Can't find a valid FAT filesystem [ 271.814848][T12819] loop4: detected capacity change from 0 to 8 [ 271.824670][T12819] EXT4-fs (loop4): bad geometry: block count 288 exceeds size of device (4 blocks) 06:31:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x0) 06:31:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x0) [ 271.914269][T12835] loop3: detected capacity change from 0 to 8 [ 271.923476][T12828] loop2: detected capacity change from 0 to 1 [ 271.934861][T12828] FAT-fs (loop2): invalid media value (0x00) [ 271.940933][T12828] FAT-fs (loop2): Can't find a valid FAT filesystem [ 271.958656][T12838] loop1: detected capacity change from 0 to 1 [ 271.972992][T12835] EXT4-fs (loop3): bad geometry: block count 288 exceeds size of device (4 blocks) [ 271.995303][T12838] FAT-fs (loop1): Directory bread(block 3) failed [ 272.004989][T12849] loop4: detected capacity change from 0 to 8 06:31:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 272.005781][T12838] FAT-fs (loop1): Directory bread(block 4) failed [ 272.018489][T12838] FAT-fs (loop1): Directory bread(block 5) failed [ 272.025688][T12838] FAT-fs (loop1): Directory bread(block 6) failed [ 272.033003][T12838] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/332/file0 supports timestamps until 2107 (0x10391447e) [ 272.054855][T12853] loop0: detected capacity change from 0 to 131456 06:31:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000", 0x15}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x0, 0x0, 0x0, &(0x7f0000013800)) [ 272.074620][T12849] EXT4-fs (loop4): bad geometry: block count 288 exceeds size of device (4 blocks) 06:31:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, 0x0) 06:31:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x0, 0x0, 0x0, &(0x7f0000013800)) 06:31:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240", 0x12}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 272.124195][T12865] loop2: detected capacity change from 0 to 1 [ 272.133732][T12867] loop5: detected capacity change from 0 to 131456 [ 272.142812][T12865] FAT-fs (loop2): invalid media value (0x00) [ 272.149585][T12865] FAT-fs (loop2): Can't find a valid FAT filesystem 06:31:50 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x0, 0x0, 0x0, &(0x7f0000013800)) 06:31:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f8", 0x16}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 272.177626][T12876] loop4: detected capacity change from 0 to 8 [ 272.207438][T12876] EXT4-fs (loop4): bad geometry: block count 288 exceeds size of device (4 blocks) 06:31:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 272.252779][T12891] FAULT_INJECTION: forcing a failure. [ 272.252779][T12891] name failslab, interval 1, probability 0, space 0, times 1 [ 272.266032][T12891] CPU: 1 PID: 12891 Comm: syz-executor.5 Not tainted 5.13.0-rc2-syzkaller #0 [ 272.275670][T12891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.287166][T12891] Call Trace: [ 272.290698][T12891] dump_stack+0x137/0x19d [ 272.295756][T12891] should_fail+0x23c/0x250 [ 272.300457][T12891] ? __se_sys_memfd_create+0xfb/0x390 [ 272.306254][T12891] __should_failslab+0x81/0x90 [ 272.311592][T12891] should_failslab+0x5/0x20 [ 272.316410][T12891] __kmalloc+0x66/0x340 [ 272.320816][T12891] ? strnlen_user+0x137/0x1c0 [ 272.325882][T12891] __se_sys_memfd_create+0xfb/0x390 [ 272.331311][T12891] __x64_sys_memfd_create+0x2d/0x40 [ 272.337285][T12891] do_syscall_64+0x4a/0x90 [ 272.342193][T12891] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 272.349294][T12891] RIP: 0033:0x4665d9 [ 272.354063][T12891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 272.375355][T12891] RSP: 002b:00007f6bc32dbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 272.383921][T12891] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 272.393122][T12891] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 272.402696][T12891] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 272.412728][T12891] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 272.421494][T12891] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 06:31:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x0, 0x0, 0x0, &(0x7f0000013800)) 06:31:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x0, 0x0, 0x0, &(0x7f0000013800)) [ 272.456376][T12890] loop1: detected capacity change from 0 to 1 [ 272.456432][T12889] loop0: detected capacity change from 0 to 1 [ 272.486700][T12901] loop3: detected capacity change from 0 to 131456 [ 272.494229][T12893] loop2: detected capacity change from 0 to 1 06:31:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, 0x0) 06:31:51 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 272.510547][T12889] FAT-fs (loop0): invalid media value (0x00) [ 272.516984][T12889] FAT-fs (loop0): Can't find a valid FAT filesystem [ 272.526749][T12893] FAT-fs (loop2): bogus number of FAT sectors [ 272.533332][T12893] FAT-fs (loop2): Can't find a valid FAT filesystem [ 272.561069][T12918] FAULT_INJECTION: forcing a failure. [ 272.561069][T12918] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 272.575111][T12918] CPU: 0 PID: 12918 Comm: syz-executor.5 Not tainted 5.13.0-rc2-syzkaller #0 [ 272.580525][T12901] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 272.584689][T12918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:31:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x0, 0x0, 0x0, &(0x7f0000013800)) [ 272.596039][T12901] EXT4-fs (loop3): group descriptors corrupted! [ 272.606545][T12918] Call Trace: [ 272.606557][T12918] dump_stack+0x137/0x19d [ 272.606582][T12918] should_fail+0x23c/0x250 [ 272.625688][T12918] should_fail_usercopy+0x16/0x20 [ 272.631132][T12918] _copy_from_user+0x1c/0xd0 [ 272.636231][T12918] __se_sys_memfd_create+0x137/0x390 [ 272.641763][T12918] __x64_sys_memfd_create+0x2d/0x40 [ 272.647156][T12918] do_syscall_64+0x4a/0x90 [ 272.652308][T12918] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 272.658842][T12918] RIP: 0033:0x4665d9 [ 272.663274][T12918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 272.684297][T12918] RSP: 002b:00007f6bc32dbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 272.693067][T12918] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 272.701255][T12918] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 06:31:51 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:51 executing program 0 (fault-call:19 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 272.709643][T12918] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 272.718318][T12918] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 272.726728][T12918] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 06:31:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}], 0x0, &(0x7f0000013800)) 06:31:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f8", 0x16}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) 06:31:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 272.774173][T12916] loop1: detected capacity change from 0 to 1 06:31:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, 0x0) [ 272.831786][T12932] FAULT_INJECTION: forcing a failure. [ 272.831786][T12932] name failslab, interval 1, probability 0, space 0, times 0 [ 272.847141][T12932] CPU: 1 PID: 12932 Comm: syz-executor.5 Not tainted 5.13.0-rc2-syzkaller #0 [ 272.856504][T12932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.868198][T12932] Call Trace: [ 272.872323][T12932] dump_stack+0x137/0x19d [ 272.877696][T12932] should_fail+0x23c/0x250 [ 272.882693][T12932] ? shmem_alloc_inode+0x22/0x30 [ 272.888205][T12932] __should_failslab+0x81/0x90 [ 272.889176][T12939] FAULT_INJECTION: forcing a failure. [ 272.889176][T12939] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 272.893246][T12932] ? shmem_match+0xa0/0xa0 [ 272.912032][T12932] should_failslab+0x5/0x20 [ 272.917243][T12932] kmem_cache_alloc+0x46/0x2f0 [ 272.922543][T12932] ? do_anonymous_page+0x411/0x8b0 [ 272.927911][T12932] ? fsnotify_perm+0x59/0x2e0 [ 272.932835][T12932] ? shmem_match+0xa0/0xa0 [ 272.937419][T12932] shmem_alloc_inode+0x22/0x30 [ 272.942500][T12932] new_inode_pseudo+0x38/0x1c0 [ 272.947667][T12932] new_inode+0x21/0x120 [ 272.952135][T12932] shmem_get_inode+0xa1/0x480 [ 272.957614][T12932] __shmem_file_setup+0xf1/0x1d0 [ 272.962565][T12932] shmem_file_setup+0x37/0x40 [ 272.967334][T12932] __se_sys_memfd_create+0x1eb/0x390 [ 272.973164][T12932] __x64_sys_memfd_create+0x2d/0x40 [ 272.978827][T12932] do_syscall_64+0x4a/0x90 [ 272.983246][T12932] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 272.989352][T12932] RIP: 0033:0x4665d9 [ 272.994001][T12932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 273.015336][T12932] RSP: 002b:00007f6bc32dbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 273.024549][T12932] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 273.032967][T12932] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 273.041288][T12932] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 273.049439][T12932] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 273.057759][T12932] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 273.066464][T12939] CPU: 0 PID: 12939 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 06:31:51 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 273.076056][T12939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.086857][T12939] Call Trace: [ 273.090542][T12939] dump_stack+0x137/0x19d [ 273.096130][T12939] should_fail+0x23c/0x250 [ 273.101208][T12939] should_fail_usercopy+0x16/0x20 [ 273.106781][T12939] _copy_from_user+0x1c/0xd0 [ 273.111643][T12939] __sys_recvmsg+0x133/0x3a0 [ 273.116598][T12939] ? vfs_write+0x50c/0x770 [ 273.121838][T12939] ? __fget_light+0x21b/0x260 [ 273.129840][T12939] ? __cond_resched+0x11/0x40 [ 273.135283][T12939] ? fput+0x2d/0x130 [ 273.139360][T12939] ? ksys_write+0x157/0x180 [ 273.143994][T12939] __x64_sys_recvmsg+0x42/0x50 [ 273.149492][T12939] do_syscall_64+0x4a/0x90 [ 273.154491][T12939] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 273.161454][T12939] RIP: 0033:0x4665d9 [ 273.165970][T12939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 273.187706][T12939] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 273.196935][T12939] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 273.205887][T12939] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 273.214760][T12939] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 273.223182][T12939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 273.232187][T12939] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 [ 273.247515][T12934] loop4: detected capacity change from 0 to 131456 [ 273.254322][T12935] loop3: detected capacity change from 0 to 131456 [ 273.268912][T12934] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 273.280143][T12934] EXT4-fs (loop4): group descriptors corrupted! [ 273.287738][T12935] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 273.298106][T12938] loop2: detected capacity change from 0 to 1 [ 273.298829][T12935] EXT4-fs (loop3): group descriptors corrupted! [ 273.308953][T12944] loop1: detected capacity change from 0 to 1 [ 273.318757][T12952] FAULT_INJECTION: forcing a failure. [ 273.318757][T12952] name failslab, interval 1, probability 0, space 0, times 0 06:31:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}], 0x0, &(0x7f0000013800)) [ 273.333185][T12952] CPU: 0 PID: 12952 Comm: syz-executor.5 Not tainted 5.13.0-rc2-syzkaller #0 [ 273.342819][T12952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.354401][T12952] Call Trace: [ 273.357945][T12952] dump_stack+0x137/0x19d [ 273.362322][T12952] should_fail+0x23c/0x250 [ 273.367615][T12952] ? security_inode_alloc+0x30/0x180 [ 273.373231][T12952] __should_failslab+0x81/0x90 [ 273.378280][T12952] should_failslab+0x5/0x20 [ 273.383001][T12952] kmem_cache_alloc+0x46/0x2f0 [ 273.389177][T12952] security_inode_alloc+0x30/0x180 [ 273.394501][T12952] inode_init_always+0x20b/0x420 [ 273.399795][T12952] ? shmem_match+0xa0/0xa0 [ 273.404389][T12952] new_inode_pseudo+0x73/0x1c0 [ 273.409399][T12952] new_inode+0x21/0x120 [ 273.413713][T12952] shmem_get_inode+0xa1/0x480 [ 273.418513][T12952] __shmem_file_setup+0xf1/0x1d0 [ 273.423578][T12952] shmem_file_setup+0x37/0x40 [ 273.428423][T12952] __se_sys_memfd_create+0x1eb/0x390 [ 273.434116][T12952] __x64_sys_memfd_create+0x2d/0x40 [ 273.439777][T12952] do_syscall_64+0x4a/0x90 [ 273.444435][T12952] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 273.451240][T12952] RIP: 0033:0x4665d9 [ 273.455277][T12952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 273.475288][T12952] RSP: 002b:00007f6bc32dbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 273.484799][T12952] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 273.492857][T12952] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 273.502106][T12952] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 273.510392][T12952] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 273.519166][T12952] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 273.528083][T12938] FAT-fs (loop2): bogus number of FAT sectors 06:31:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 06:31:52 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 273.534353][T12938] FAT-fs (loop2): Can't find a valid FAT filesystem 06:31:52 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 273.566966][T12960] FAULT_INJECTION: forcing a failure. [ 273.566966][T12960] name failslab, interval 1, probability 0, space 0, times 0 [ 273.581116][T12960] CPU: 1 PID: 12960 Comm: syz-executor.5 Not tainted 5.13.0-rc2-syzkaller #0 [ 273.591561][T12960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.603661][T12960] Call Trace: [ 273.607492][T12960] dump_stack+0x137/0x19d [ 273.612446][T12960] should_fail+0x23c/0x250 [ 273.617110][T12960] ? __d_alloc+0x36/0x370 [ 273.621696][T12960] __should_failslab+0x81/0x90 [ 273.627394][T12960] should_failslab+0x5/0x20 [ 273.633139][T12960] kmem_cache_alloc+0x46/0x2f0 [ 273.638558][T12960] ? __init_rwsem+0x59/0x70 [ 273.643790][T12960] __d_alloc+0x36/0x370 [ 273.649758][T12960] ? current_time+0xdb/0x190 [ 273.655536][T12960] d_alloc_pseudo+0x1a/0x50 [ 273.660494][T12960] alloc_file_pseudo+0x63/0x130 06:31:52 executing program 0 (fault-call:19 fault-nth:1): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 273.666140][T12960] __shmem_file_setup+0x14c/0x1d0 [ 273.671563][T12960] shmem_file_setup+0x37/0x40 [ 273.676578][T12960] __se_sys_memfd_create+0x1eb/0x390 [ 273.682067][T12960] __x64_sys_memfd_create+0x2d/0x40 [ 273.687655][T12960] do_syscall_64+0x4a/0x90 [ 273.692549][T12960] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 273.698455][T12960] RIP: 0033:0x4665d9 [ 273.703187][T12960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 273.724885][T12960] RSP: 002b:00007f6bc32dbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 273.734319][T12960] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 273.743493][T12960] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 273.745222][T12964] FAULT_INJECTION: forcing a failure. [ 273.745222][T12964] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 273.752786][T12960] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 273.752803][T12960] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 273.752814][T12960] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 273.792346][T12964] CPU: 0 PID: 12964 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 273.801465][T12964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.813396][T12964] Call Trace: [ 273.816671][T12964] dump_stack+0x137/0x19d [ 273.821277][T12964] should_fail+0x23c/0x250 [ 273.825786][T12964] should_fail_usercopy+0x16/0x20 [ 273.831173][T12964] _copy_from_user+0x1c/0xd0 [ 273.836284][T12964] iovec_from_user+0xc4/0x2d0 [ 273.841573][T12964] __import_iovec+0x49/0x270 [ 273.846692][T12964] ? kstrtoull+0x30e/0x350 [ 273.851103][T12964] import_iovec+0x69/0x80 [ 273.855679][T12964] __sys_recvmsg+0x36e/0x3a0 [ 273.861663][T12964] ? sysvec_apic_timer_interrupt+0x3e/0x80 [ 273.868005][T12964] ? kcsan_setup_watchpoint+0x436/0x470 [ 273.874104][T12964] ? kcsan_setup_watchpoint+0x26e/0x470 [ 273.880375][T12964] __x64_sys_recvmsg+0x42/0x50 [ 273.885356][T12964] do_syscall_64+0x4a/0x90 [ 273.890025][T12964] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 273.896472][T12964] RIP: 0033:0x4665d9 [ 273.900910][T12964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 273.922010][T12964] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 273.930625][T12964] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 273.939378][T12964] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 273.947634][T12964] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 273.956381][T12964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 06:31:52 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f8", 0x16}, {0x0, 0x0, 0x1e4}], 0x10, &(0x7f00000004c0)=ANY=[]) [ 273.965118][T12964] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 [ 273.983422][T12961] loop3: detected capacity change from 0 to 131456 [ 273.992253][T12957] loop4: detected capacity change from 0 to 131456 [ 274.013144][T12961] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 274.023602][T12961] EXT4-fs (loop3): group descriptors corrupted! [ 274.038143][T12957] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 274.048590][T12957] EXT4-fs (loop4): group descriptors corrupted! [ 274.091023][T12985] FAULT_INJECTION: forcing a failure. [ 274.091023][T12985] name failslab, interval 1, probability 0, space 0, times 0 [ 274.092320][T12983] loop2: detected capacity change from 0 to 1 [ 274.104741][T12985] CPU: 1 PID: 12985 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 274.120052][T12985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.134328][T12985] Call Trace: [ 274.137606][T12985] dump_stack+0x137/0x19d [ 274.142152][T12985] should_fail+0x23c/0x250 [ 274.146899][T12985] ? __se_sys_memfd_create+0xfb/0x390 [ 274.152497][T12985] __should_failslab+0x81/0x90 [ 274.157709][T12985] should_failslab+0x5/0x20 [ 274.162326][T12985] __kmalloc+0x66/0x340 [ 274.166848][T12985] ? strnlen_user+0x137/0x1c0 [ 274.172133][T12985] __se_sys_memfd_create+0xfb/0x390 [ 274.177337][T12985] __x64_sys_memfd_create+0x2d/0x40 [ 274.183298][T12985] do_syscall_64+0x4a/0x90 [ 274.188201][T12985] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 274.194260][T12985] RIP: 0033:0x4665d9 [ 274.198605][T12985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 274.218666][T12985] RSP: 002b:00007f79e044ef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 274.227703][T12985] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 274.236581][T12985] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 [ 274.245534][T12985] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff [ 274.254119][T12985] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 274.262523][T12985] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 [ 274.273207][T12986] FAULT_INJECTION: forcing a failure. [ 274.273207][T12986] name failslab, interval 1, probability 0, space 0, times 0 06:31:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}], 0x0, &(0x7f0000013800)) 06:31:53 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 274.286399][T12986] CPU: 0 PID: 12986 Comm: syz-executor.5 Not tainted 5.13.0-rc2-syzkaller #0 [ 274.287799][T12983] FAT-fs (loop2): bogus number of FAT sectors [ 274.295638][T12986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.295654][T12986] Call Trace: [ 274.295661][T12986] dump_stack+0x137/0x19d [ 274.301846][T12983] FAT-fs (loop2): Can't find a valid FAT filesystem [ 274.312017][T12986] should_fail+0x23c/0x250 [ 274.312044][T12986] ? __alloc_file+0x2e/0x1a0 [ 274.312061][T12986] __should_failslab+0x81/0x90 [ 274.312084][T12986] should_failslab+0x5/0x20 [ 274.348268][T12986] kmem_cache_alloc+0x46/0x2f0 [ 274.353515][T12986] ? inode_doinit_with_dentry+0x382/0x950 [ 274.359290][T12986] __alloc_file+0x2e/0x1a0 [ 274.363691][T12986] alloc_empty_file+0xcd/0x1c0 [ 274.369043][T12986] alloc_file+0x3a/0x280 [ 274.373288][T12986] alloc_file_pseudo+0xe2/0x130 [ 274.378641][T12986] __shmem_file_setup+0x14c/0x1d0 [ 274.384019][T12986] shmem_file_setup+0x37/0x40 [ 274.389230][T12986] __se_sys_memfd_create+0x1eb/0x390 [ 274.394814][T12986] __x64_sys_memfd_create+0x2d/0x40 [ 274.400784][T12986] do_syscall_64+0x4a/0x90 [ 274.405656][T12986] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 274.411610][T12986] RIP: 0033:0x4665d9 [ 274.415860][T12986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:31:53 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013800)) [ 274.436835][T12986] RSP: 002b:00007f6bc32dbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 274.445629][T12986] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 274.454165][T12986] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 274.462705][T12986] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 274.471478][T12986] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 274.480259][T12986] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 06:31:53 executing program 0 (fault-call:19 fault-nth:2): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 274.571730][T12998] FAULT_INJECTION: forcing a failure. [ 274.571730][T12998] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 274.585695][T12998] CPU: 1 PID: 12998 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 274.593965][T13004] FAULT_INJECTION: forcing a failure. [ 274.593965][T13004] name failslab, interval 1, probability 0, space 0, times 0 [ 274.596112][T12998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.596125][T12998] Call Trace: [ 274.596132][T12998] dump_stack+0x137/0x19d [ 274.596153][T12998] should_fail+0x23c/0x250 [ 274.596169][T12998] should_fail_usercopy+0x16/0x20 [ 274.638680][T12998] _copy_from_user+0x1c/0xd0 [ 274.643583][T12998] __se_sys_memfd_create+0x137/0x390 [ 274.649273][T12998] __x64_sys_memfd_create+0x2d/0x40 [ 274.654831][T12998] do_syscall_64+0x4a/0x90 [ 274.659239][T12998] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 274.665883][T12998] RIP: 0033:0x4665d9 [ 274.670677][T12998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 274.691848][T12998] RSP: 002b:00007f79e044ef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 274.700691][T12998] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 274.709287][T12998] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 [ 274.718217][T12998] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff [ 274.726636][T12998] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 274.735365][T12998] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 [ 274.745010][T13004] CPU: 0 PID: 13004 Comm: syz-executor.5 Not tainted 5.13.0-rc2-syzkaller #0 [ 274.745988][T12997] loop4: detected capacity change from 0 to 131456 [ 274.755625][T13004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.755639][T13004] Call Trace: [ 274.755646][T13004] dump_stack+0x137/0x19d [ 274.755670][T13004] should_fail+0x23c/0x250 [ 274.755725][T13004] ? security_file_alloc+0x30/0x190 [ 274.755740][T13004] __should_failslab+0x81/0x90 [ 274.798776][T13004] should_failslab+0x5/0x20 [ 274.803847][T13004] kmem_cache_alloc+0x46/0x2f0 [ 274.809104][T13004] security_file_alloc+0x30/0x190 [ 274.814404][T13004] __alloc_file+0x83/0x1a0 [ 274.819281][T13004] alloc_empty_file+0xcd/0x1c0 [ 274.824559][T13004] alloc_file+0x3a/0x280 [ 274.828873][T13004] alloc_file_pseudo+0xe2/0x130 [ 274.833812][T13004] __shmem_file_setup+0x14c/0x1d0 [ 274.839234][T13004] shmem_file_setup+0x37/0x40 [ 274.844724][T13004] __se_sys_memfd_create+0x1eb/0x390 [ 274.850437][T13004] __x64_sys_memfd_create+0x2d/0x40 [ 274.855821][T13004] do_syscall_64+0x4a/0x90 [ 274.860328][T13004] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 274.866643][T13004] RIP: 0033:0x4665d9 [ 274.870651][T13004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 274.891773][T13004] RSP: 002b:00007f6bc32dbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 274.900547][T13004] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 274.910068][T13004] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 274.918179][T13004] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 274.926571][T13004] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 274.935184][T13004] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 274.957582][T13003] loop3: detected capacity change from 0 to 131456 06:31:53 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:31:53 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 274.969037][T13008] loop2: detected capacity change from 0 to 1 [ 274.974494][T12997] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 274.987077][T12997] EXT4-fs (loop4): group descriptors corrupted! [ 274.996042][T13003] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 275.006622][T13003] EXT4-fs (loop3): group descriptors corrupted! [ 275.017315][T13016] FAULT_INJECTION: forcing a failure. [ 275.017315][T13016] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 275.022350][T13017] FAULT_INJECTION: forcing a failure. [ 275.022350][T13017] name failslab, interval 1, probability 0, space 0, times 0 [ 275.032151][T13016] CPU: 0 PID: 13016 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 275.055577][T13016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.066319][T13016] Call Trace: [ 275.070148][T13016] dump_stack+0x137/0x19d [ 275.074737][T13016] should_fail+0x23c/0x250 [ 275.079602][T13016] should_fail_usercopy+0x16/0x20 [ 275.085376][T13016] _copy_to_iter+0x17c/0xdd0 [ 275.090139][T13016] ? check_stack_object+0x61/0x70 [ 275.095749][T13016] ? __virt_addr_valid+0x15a/0x1a0 [ 275.101136][T13016] ? __check_object_size+0x253/0x310 [ 275.107343][T13016] simple_copy_to_iter+0x4c/0x60 [ 275.112586][T13016] __skb_datagram_iter+0x23c/0x520 [ 275.117686][T13016] ? skb_copy_datagram_iter+0xc0/0xc0 [ 275.123433][T13016] skb_copy_datagram_iter+0x39/0xc0 [ 275.131346][T13016] tcp_recvmsg_locked+0xa9c/0x1700 [ 275.136899][T13016] tcp_recvmsg+0x145/0x430 [ 275.141416][T13016] ? mntput+0x45/0x70 [ 275.145593][T13016] inet_recvmsg+0xa3/0x200 [ 275.150323][T13016] ? inet_sendpage+0xc0/0xc0 [ 275.155334][T13016] ____sys_recvmsg+0x15d/0x310 [ 275.160422][T13016] ? __import_iovec+0x1ff/0x270 [ 275.165360][T13016] ? import_iovec+0x69/0x80 [ 275.170204][T13016] __sys_recvmsg+0x1d2/0x3a0 [ 275.174874][T13016] ? __cond_resched+0x11/0x40 [ 275.179863][T13016] ? fput+0x2d/0x130 [ 275.183883][T13016] ? ksys_write+0x157/0x180 [ 275.188711][T13016] __x64_sys_recvmsg+0x42/0x50 [ 275.193591][T13016] do_syscall_64+0x4a/0x90 [ 275.198100][T13016] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 275.204504][T13016] RIP: 0033:0x4665d9 [ 275.208555][T13016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 275.228777][T13016] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 275.237374][T13016] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 275.245785][T13016] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 275.253976][T13016] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 275.262196][T13016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 275.270308][T13016] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 [ 275.278441][T13017] CPU: 1 PID: 13017 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 275.287382][T13017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.297608][T13017] Call Trace: [ 275.301025][T13017] dump_stack+0x137/0x19d [ 275.305449][T13017] should_fail+0x23c/0x250 [ 275.310111][T13017] ? shmem_alloc_inode+0x22/0x30 [ 275.315503][T13017] __should_failslab+0x81/0x90 [ 275.320437][T13017] ? shmem_match+0xa0/0xa0 [ 275.324944][T13017] should_failslab+0x5/0x20 [ 275.329434][T13017] kmem_cache_alloc+0x46/0x2f0 [ 275.334501][T13017] ? do_anonymous_page+0x411/0x8b0 [ 275.339688][T13017] ? fsnotify_perm+0x59/0x2e0 [ 275.344591][T13017] ? shmem_match+0xa0/0xa0 [ 275.349188][T13017] shmem_alloc_inode+0x22/0x30 [ 275.354225][T13017] new_inode_pseudo+0x38/0x1c0 [ 275.358971][T13017] new_inode+0x21/0x120 [ 275.363292][T13017] shmem_get_inode+0xa1/0x480 [ 275.368325][T13017] __shmem_file_setup+0xf1/0x1d0 [ 275.373250][T13017] shmem_file_setup+0x37/0x40 [ 275.378237][T13017] __se_sys_memfd_create+0x1eb/0x390 [ 275.384042][T13017] __x64_sys_memfd_create+0x2d/0x40 [ 275.389598][T13017] do_syscall_64+0x4a/0x90 [ 275.394527][T13017] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 275.401106][T13017] RIP: 0033:0x4665d9 [ 275.405283][T13017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 275.425772][T13017] RSP: 002b:00007f79e044ef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 275.434809][T13017] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 275.442946][T13017] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 [ 275.451430][T13017] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff [ 275.459649][T13017] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 275.467866][T13017] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 06:31:54 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 275.488302][T13008] FAT-fs (loop2): Directory bread(block 3) failed [ 275.511298][T13023] FAULT_INJECTION: forcing a failure. [ 275.511298][T13023] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 275.518993][T13008] FAT-fs (loop2): Directory bread(block 4) failed [ 275.524918][T13023] CPU: 1 PID: 13023 Comm: syz-executor.5 Not tainted 5.13.0-rc2-syzkaller #0 [ 275.540494][T13023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.549849][T13008] FAT-fs (loop2): Directory bread(block 5) failed [ 275.551083][T13023] Call Trace: [ 275.551091][T13023] dump_stack+0x137/0x19d [ 275.551113][T13023] should_fail+0x23c/0x250 [ 275.551128][T13023] __alloc_pages+0x102/0x320 [ 275.551142][T13023] alloc_pages_vma+0x391/0x660 [ 275.559017][T13024] FAULT_INJECTION: forcing a failure. [ 275.559017][T13024] name failslab, interval 1, probability 0, space 0, times 0 [ 275.561038][T13023] shmem_getpage_gfp+0x980/0x1410 [ 275.598645][T13023] ? mls_context_isvalid+0x76/0x1e0 [ 275.604098][T13023] shmem_write_begin+0x7e/0x100 [ 275.609080][T13023] generic_perform_write+0x196/0x3a0 [ 275.614440][T13023] ? file_update_time+0x1bd/0x3e0 [ 275.619886][T13023] __generic_file_write_iter+0x161/0x300 [ 275.625682][T13023] ? generic_write_checks+0x250/0x290 [ 275.631044][T13023] generic_file_write_iter+0x75/0x130 [ 275.636871][T13023] vfs_write+0x69d/0x770 [ 275.641116][T13023] __x64_sys_pwrite64+0xf5/0x150 [ 275.646213][T13023] do_syscall_64+0x4a/0x90 [ 275.650800][T13023] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 275.656987][T13023] RIP: 0033:0x419777 [ 275.661047][T13023] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 275.682037][T13023] RSP: 002b:00007f6bc32dbf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 275.691086][T13023] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 275.699200][T13023] RDX: 000000000000003a RSI: 0000000020000080 RDI: 0000000000000004 [ 275.707361][T13023] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 275.715419][T13023] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 275.723726][T13023] R13: 0000000000000004 R14: 0000000020000300 R15: 0000000000000000 06:31:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013800)) 06:31:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013800)) [ 275.731772][T13024] CPU: 0 PID: 13024 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 275.740652][T13024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.751069][T13024] Call Trace: [ 275.754349][T13024] dump_stack+0x137/0x19d [ 275.759043][T13024] should_fail+0x23c/0x250 [ 275.762062][T13008] FAT-fs (loop2): Directory bread(block 6) failed [ 275.764238][T13024] ? security_inode_alloc+0x30/0x180 [ 275.776351][T13024] __should_failslab+0x81/0x90 [ 275.781158][T13024] should_failslab+0x5/0x20 [ 275.781523][T13008] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/252/file0 supports timestamps until 2107 (0x10391447e) [ 275.785856][T13024] kmem_cache_alloc+0x46/0x2f0 [ 275.785883][T13024] security_inode_alloc+0x30/0x180 [ 275.785907][T13024] inode_init_always+0x20b/0x420 [ 275.803571][T13028] loop3: detected capacity change from 0 to 131456 [ 275.805579][T13024] ? shmem_match+0xa0/0xa0 [ 275.805607][T13024] new_inode_pseudo+0x73/0x1c0 [ 275.805625][T13024] new_inode+0x21/0x120 [ 275.836932][T13024] shmem_get_inode+0xa1/0x480 [ 275.842136][T13024] __shmem_file_setup+0xf1/0x1d0 [ 275.847247][T13024] shmem_file_setup+0x37/0x40 [ 275.852074][T13024] __se_sys_memfd_create+0x1eb/0x390 [ 275.857468][T13024] __x64_sys_memfd_create+0x2d/0x40 [ 275.863117][T13024] do_syscall_64+0x4a/0x90 [ 275.867730][T13024] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 275.873962][T13024] RIP: 0033:0x4665d9 [ 275.878035][T13024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 275.898424][T13024] RSP: 002b:00007f79e044ef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 275.907167][T13024] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 275.915309][T13024] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 [ 275.923423][T13024] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff [ 275.931712][T13024] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 06:31:54 executing program 0 (fault-call:19 fault-nth:3): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:31:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 275.940878][T13024] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 [ 275.962046][T13023] loop5: detected capacity change from 0 to 131456 [ 275.978055][T13032] loop4: detected capacity change from 0 to 131456 06:31:54 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 275.985618][T13028] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 275.996150][T13028] EXT4-fs (loop3): group descriptors corrupted! [ 276.008531][T13023] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 276.023739][T13032] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 276.033986][T13032] EXT4-fs (loop4): group descriptors corrupted! [ 276.048772][T13041] loop2: detected capacity change from 0 to 1 [ 276.057564][T13041] FAT-fs (loop2): Directory bread(block 3) failed [ 276.064611][T13041] FAT-fs (loop2): Directory bread(block 4) failed [ 276.071407][T13041] FAT-fs (loop2): Directory bread(block 5) failed [ 276.078796][T13041] FAT-fs (loop2): Directory bread(block 6) failed 06:31:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013800)) [ 276.085843][T13041] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/253/file0 supports timestamps until 2107 (0x10391447e) [ 276.102060][T13051] FAULT_INJECTION: forcing a failure. [ 276.102060][T13051] name failslab, interval 1, probability 0, space 0, times 0 [ 276.115738][T13051] CPU: 1 PID: 13051 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 276.121215][T13050] FAULT_INJECTION: forcing a failure. [ 276.121215][T13050] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 276.125976][T13051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.125991][T13051] Call Trace: [ 276.125998][T13051] dump_stack+0x137/0x19d [ 276.126022][T13051] should_fail+0x23c/0x250 [ 276.126044][T13051] ? __d_alloc+0x36/0x370 [ 276.126060][T13051] __should_failslab+0x81/0x90 [ 276.173578][T13051] should_failslab+0x5/0x20 [ 276.178428][T13051] kmem_cache_alloc+0x46/0x2f0 [ 276.183384][T13051] ? __init_rwsem+0x59/0x70 [ 276.189007][T13051] __d_alloc+0x36/0x370 [ 276.193351][T13051] ? current_time+0xdb/0x190 [ 276.197931][T13051] d_alloc_pseudo+0x1a/0x50 [ 276.203140][T13051] alloc_file_pseudo+0x63/0x130 [ 276.208051][T13051] __shmem_file_setup+0x14c/0x1d0 [ 276.213453][T13051] shmem_file_setup+0x37/0x40 [ 276.218737][T13051] __se_sys_memfd_create+0x1eb/0x390 [ 276.224523][T13051] __x64_sys_memfd_create+0x2d/0x40 [ 276.230718][T13051] do_syscall_64+0x4a/0x90 [ 276.235662][T13051] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 276.242003][T13051] RIP: 0033:0x4665d9 [ 276.245994][T13051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 276.266756][T13051] RSP: 002b:00007f79e044ef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 276.275323][T13051] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 276.283279][T13051] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 06:31:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013800)) 06:31:54 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 276.292218][T13051] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff [ 276.300452][T13051] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 276.308878][T13051] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 [ 276.317153][T13050] CPU: 0 PID: 13050 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 276.326392][T13050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.336888][T13050] Call Trace: [ 276.340810][T13050] dump_stack+0x137/0x19d [ 276.345532][T13050] should_fail+0x23c/0x250 [ 276.346322][T13058] FAULT_INJECTION: forcing a failure. [ 276.346322][T13058] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 276.350294][T13050] __alloc_pages+0x102/0x320 [ 276.368008][T13050] alloc_pages_vma+0x391/0x660 [ 276.372869][T13050] wp_page_copy+0x121/0x10c0 [ 276.377555][T13050] do_wp_page+0x5a8/0xba0 [ 276.382052][T13050] handle_mm_fault+0xb31/0x1a70 [ 276.387014][T13050] do_user_addr_fault+0x60c/0xc00 [ 276.392037][T13050] exc_page_fault+0x94/0x230 [ 276.397100][T13050] asm_exc_page_fault+0x1e/0x30 [ 276.401991][T13050] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 276.408931][T13050] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 276.429757][T13050] RSP: 0018:ffffc9000198f860 EFLAGS: 00010206 [ 276.436202][T13050] RAX: ffff888155895a68 RBX: 0000000020000740 RCX: 0000000000005f1c [ 276.444429][T13050] RDX: 00000000000077dc RSI: ffff888131a998c0 RDI: 0000000020002000 [ 276.452831][T13050] RBP: ffff888131a98000 R08: 0000000000000000 R09: 0001ffffffffffff [ 276.460999][T13050] R10: 0001888131a9f7db R11: ffff888155895080 R12: ffffc9000198fe30 [ 276.469326][T13050] R13: 00007ffffffff000 R14: 00000000000077dc R15: 0000000000000000 [ 276.477793][T13050] _copy_to_iter+0x1f2/0xdd0 [ 276.482459][T13050] ? check_stack_object+0x61/0x70 [ 276.487645][T13050] ? __virt_addr_valid+0x15a/0x1a0 [ 276.492869][T13050] ? __check_object_size+0x253/0x310 [ 276.498226][T13050] simple_copy_to_iter+0x4c/0x60 [ 276.503586][T13050] __skb_datagram_iter+0x23c/0x520 [ 276.508685][T13050] ? skb_copy_datagram_iter+0xc0/0xc0 [ 276.514488][T13050] skb_copy_datagram_iter+0x39/0xc0 [ 276.520122][T13050] tcp_recvmsg_locked+0xa9c/0x1700 [ 276.525230][T13050] tcp_recvmsg+0x145/0x430 [ 276.529645][T13050] ? mntput+0x45/0x70 [ 276.533655][T13050] inet_recvmsg+0xa3/0x200 [ 276.538256][T13050] ? inet_sendpage+0xc0/0xc0 [ 276.542896][T13050] ____sys_recvmsg+0x15d/0x310 [ 276.547642][T13050] ? __import_iovec+0x1ff/0x270 [ 276.552496][T13050] ? import_iovec+0x69/0x80 [ 276.557072][T13050] __sys_recvmsg+0x1d2/0x3a0 [ 276.561733][T13050] ? __cond_resched+0x11/0x40 [ 276.566518][T13050] ? fput+0x2d/0x130 [ 276.570678][T13050] ? ksys_write+0x157/0x180 [ 276.575327][T13050] __x64_sys_recvmsg+0x42/0x50 [ 276.580264][T13050] do_syscall_64+0x4a/0x90 [ 276.584754][T13050] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 276.590928][T13050] RIP: 0033:0x4665d9 [ 276.595290][T13050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 276.617348][T13050] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 276.625921][T13050] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 276.633887][T13050] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 276.642429][T13050] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 276.650931][T13050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.659283][T13050] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 [ 276.667423][T13058] CPU: 1 PID: 13058 Comm: syz-executor.5 Not tainted 5.13.0-rc2-syzkaller #0 [ 276.676362][T13058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.686700][T13058] Call Trace: [ 276.690044][T13058] dump_stack+0x137/0x19d [ 276.694583][T13058] should_fail+0x23c/0x250 [ 276.699368][T13058] should_fail_usercopy+0x16/0x20 [ 276.704796][T13058] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 276.711216][T13058] ? shmem_write_begin+0x7e/0x100 [ 276.716466][T13058] generic_perform_write+0x1e4/0x3a0 [ 276.721795][T13058] ? file_update_time+0x1bd/0x3e0 [ 276.727179][T13058] __generic_file_write_iter+0x161/0x300 [ 276.733087][T13058] ? generic_write_checks+0x250/0x290 [ 276.738671][T13058] generic_file_write_iter+0x75/0x130 [ 276.740163][T13056] loop3: detected capacity change from 0 to 131456 06:31:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, 0x0) 06:31:55 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 276.744526][T13058] vfs_write+0x69d/0x770 [ 276.744555][T13058] __x64_sys_pwrite64+0xf5/0x150 [ 276.744569][T13058] do_syscall_64+0x4a/0x90 [ 276.744586][T13058] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 276.744606][T13058] RIP: 0033:0x419777 [ 276.744620][T13058] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 276.751988][T13059] loop4: detected capacity change from 0 to 131456 [ 276.756188][T13058] RSP: 002b:00007f6bc32dbf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 276.756209][T13058] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 276.756220][T13058] RDX: 000000000000003a RSI: 0000000020000080 RDI: 0000000000000004 [ 276.756232][T13058] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 276.777666][T13059] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 276.795824][T13058] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 276.795842][T13058] R13: 0000000000000004 R14: 0000000020000300 R15: 0000000000000000 [ 276.813930][T13058] loop5: detected capacity change from 0 to 131456 [ 276.820232][T13059] EXT4-fs (loop4): group descriptors corrupted! [ 276.830072][T13069] FAULT_INJECTION: forcing a failure. [ 276.830072][T13069] name failslab, interval 1, probability 0, space 0, times 0 [ 276.892613][T13069] CPU: 0 PID: 13069 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 276.902123][T13069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.912731][T13069] Call Trace: [ 276.916503][T13069] dump_stack+0x137/0x19d [ 276.921433][T13069] should_fail+0x23c/0x250 [ 276.926247][T13069] ? __alloc_file+0x2e/0x1a0 [ 276.931197][T13069] __should_failslab+0x81/0x90 [ 276.936161][T13069] should_failslab+0x5/0x20 [ 276.941237][T13069] kmem_cache_alloc+0x46/0x2f0 [ 276.946115][T13069] ? inode_doinit_with_dentry+0x382/0x950 [ 276.951944][T13069] __alloc_file+0x2e/0x1a0 [ 276.955662][T13058] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 276.956707][T13069] alloc_empty_file+0xcd/0x1c0 [ 276.956730][T13069] alloc_file+0x3a/0x280 [ 276.967536][T13058] EXT4-fs (loop5): group descriptors corrupted! [ 276.972654][T13069] alloc_file_pseudo+0xe2/0x130 [ 276.981649][T13056] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 06:31:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013800)) 06:31:55 executing program 0 (fault-call:19 fault-nth:4): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 276.983239][T13069] __shmem_file_setup+0x14c/0x1d0 [ 276.988422][T13056] EXT4-fs (loop3): group descriptors corrupted! [ 276.998941][T13069] shmem_file_setup+0x37/0x40 [ 276.998970][T13069] __se_sys_memfd_create+0x1eb/0x390 [ 277.020927][T13069] __x64_sys_memfd_create+0x2d/0x40 [ 277.026171][T13069] do_syscall_64+0x4a/0x90 [ 277.030811][T13069] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 277.036893][T13069] RIP: 0033:0x4665d9 [ 277.041153][T13069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 277.061939][T13069] RSP: 002b:00007f79e044ef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 277.070446][T13069] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 277.080393][T13069] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 [ 277.089686][T13069] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff [ 277.098904][T13069] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 277.105213][T13076] FAULT_INJECTION: forcing a failure. [ 277.105213][T13076] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 277.107490][T13069] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 [ 277.130329][T13076] CPU: 1 PID: 13076 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 277.139095][T13076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.141962][T13078] FAULT_INJECTION: forcing a failure. [ 277.141962][T13078] name failslab, interval 1, probability 0, space 0, times 0 [ 277.149907][T13076] Call Trace: [ 277.149918][T13076] dump_stack+0x137/0x19d [ 277.149943][T13076] should_fail+0x23c/0x250 [ 277.174751][T13076] __alloc_pages+0x102/0x320 [ 277.179509][T13076] alloc_pages_vma+0x391/0x660 [ 277.184345][T13076] ? page_add_new_anon_rmap+0x26d/0x2c0 [ 277.190008][T13076] wp_page_copy+0x121/0x10c0 [ 277.194763][T13076] do_wp_page+0x5a8/0xba0 [ 277.199273][T13076] handle_mm_fault+0xb31/0x1a70 [ 277.204422][T13076] do_user_addr_fault+0x60c/0xc00 [ 277.209940][T13076] exc_page_fault+0x94/0x230 [ 277.214646][T13076] asm_exc_page_fault+0x1e/0x30 [ 277.219949][T13076] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 277.226617][T13076] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 277.248322][T13076] RSP: 0018:ffffc90001a0b860 EFLAGS: 00010206 [ 277.254806][T13076] RAX: ffff88815a9e4a28 RBX: 0000000020000740 RCX: 0000000000004f1c [ 277.263108][T13076] RDX: 00000000000077dc RSI: ffff8881300a28c0 RDI: 0000000020003000 [ 277.271321][T13076] RBP: ffff8881300a0000 R08: 0000000000000000 R09: 0001ffffffffffff [ 277.279380][T13076] R10: 00018881300a77db R11: ffff88815a9e4040 R12: ffffc90001a0be30 [ 277.288003][T13076] R13: 00007ffffffff000 R14: 00000000000077dc R15: 0000000000000000 [ 277.297202][T13076] _copy_to_iter+0x1f2/0xdd0 [ 277.302087][T13076] ? check_stack_object+0x61/0x70 [ 277.307851][T13076] ? __virt_addr_valid+0x15a/0x1a0 [ 277.313610][T13076] ? __check_object_size+0x253/0x310 [ 277.319075][T13076] simple_copy_to_iter+0x4c/0x60 [ 277.324146][T13076] __skb_datagram_iter+0x23c/0x520 [ 277.329951][T13076] ? skb_copy_datagram_iter+0xc0/0xc0 [ 277.335436][T13076] skb_copy_datagram_iter+0x39/0xc0 [ 277.340796][T13076] tcp_recvmsg_locked+0xa9c/0x1700 [ 277.345899][T13076] tcp_recvmsg+0x145/0x430 [ 277.350574][T13076] ? mntput+0x45/0x70 [ 277.354979][T13076] inet_recvmsg+0xa3/0x200 [ 277.359680][T13076] ? inet_sendpage+0xc0/0xc0 [ 277.364256][T13076] ____sys_recvmsg+0x15d/0x310 [ 277.369108][T13076] ? __import_iovec+0x1ff/0x270 [ 277.374034][T13076] ? import_iovec+0x69/0x80 [ 277.378695][T13076] __sys_recvmsg+0x1d2/0x3a0 [ 277.383514][T13076] ? __cond_resched+0x11/0x40 [ 277.388756][T13076] ? fput+0x2d/0x130 [ 277.392638][T13076] ? ksys_write+0x157/0x180 [ 277.397200][T13076] __x64_sys_recvmsg+0x42/0x50 [ 277.402297][T13076] do_syscall_64+0x4a/0x90 [ 277.406974][T13076] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 277.413361][T13076] RIP: 0033:0x4665d9 [ 277.417526][T13076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 277.438702][T13076] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 277.447187][T13076] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 06:31:55 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 277.455668][T13076] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 277.463764][T13076] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 277.471996][T13076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 277.479965][T13076] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 [ 277.488059][T13078] CPU: 0 PID: 13078 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 277.497176][T13078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.508686][T13078] Call Trace: [ 277.512087][T13078] dump_stack+0x137/0x19d [ 277.516597][T13078] should_fail+0x23c/0x250 [ 277.521106][T13078] ? security_file_alloc+0x30/0x190 [ 277.526584][T13078] __should_failslab+0x81/0x90 [ 277.531663][T13078] should_failslab+0x5/0x20 [ 277.536398][T13078] kmem_cache_alloc+0x46/0x2f0 [ 277.542023][T13078] security_file_alloc+0x30/0x190 [ 277.547252][T13078] __alloc_file+0x83/0x1a0 [ 277.551982][T13078] alloc_empty_file+0xcd/0x1c0 [ 277.557115][T13078] alloc_file+0x3a/0x280 [ 277.561677][T13078] alloc_file_pseudo+0xe2/0x130 [ 277.566719][T13078] __shmem_file_setup+0x14c/0x1d0 [ 277.572496][T13078] shmem_file_setup+0x37/0x40 [ 277.577627][T13078] __se_sys_memfd_create+0x1eb/0x390 [ 277.583776][T13078] __x64_sys_memfd_create+0x2d/0x40 [ 277.589847][T13078] do_syscall_64+0x4a/0x90 [ 277.595243][T13078] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 277.601497][T13078] RIP: 0033:0x4665d9 [ 277.605680][T13078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 277.626207][T13078] RSP: 002b:00007f79e044ef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 277.635155][T13078] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 277.643375][T13078] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 06:31:56 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 277.652447][T13078] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff [ 277.661188][T13078] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 277.669539][T13078] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 06:31:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040), 0x0, 0x800}], 0x0, &(0x7f0000013800)) 06:31:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 277.713017][T13088] loop2: detected capacity change from 0 to 1 [ 277.730541][T13086] FAULT_INJECTION: forcing a failure. [ 277.730541][T13086] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 277.744140][T13086] CPU: 1 PID: 13086 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 277.751623][T13092] loop4: detected capacity change from 0 to 131456 [ 277.753027][T13086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.753039][T13086] Call Trace: [ 277.753047][T13086] dump_stack+0x137/0x19d [ 277.767109][T13092] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 277.770391][T13086] should_fail+0x23c/0x250 [ 277.770416][T13086] __alloc_pages+0x102/0x320 [ 277.773769][T13092] EXT4-fs (loop4): group descriptors corrupted! [ 277.778177][T13086] alloc_pages_vma+0x391/0x660 [ 277.778200][T13086] shmem_getpage_gfp+0x980/0x1410 [ 277.792226][T13096] loop3: detected capacity change from 0 to 131456 [ 277.792818][T13086] ? mls_context_isvalid+0x76/0x1e0 [ 277.801229][T13096] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 277.804090][T13086] shmem_write_begin+0x7e/0x100 [ 277.809046][T13096] EXT4-fs (loop3): group descriptors corrupted! [ 277.814145][T13086] generic_perform_write+0x196/0x3a0 [ 277.824737][T13099] loop5: detected capacity change from 0 to 131456 06:31:56 executing program 0 (fault-call:19 fault-nth:5): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 277.826153][T13086] ? file_update_time+0x1bd/0x3e0 [ 277.826179][T13086] __generic_file_write_iter+0x161/0x300 [ 277.840437][T13099] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 277.841467][T13086] ? generic_write_checks+0x250/0x290 [ 277.841489][T13086] generic_file_write_iter+0x75/0x130 [ 277.848123][T13099] EXT4-fs (loop5): group descriptors corrupted! [ 277.899826][T13086] vfs_write+0x69d/0x770 [ 277.904084][T13086] __x64_sys_pwrite64+0xf5/0x150 [ 277.909290][T13086] do_syscall_64+0x4a/0x90 [ 277.914031][T13086] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 277.920457][T13086] RIP: 0033:0x419777 [ 277.924553][T13086] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 277.945936][T13086] RSP: 002b:00007f79e044ef20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 277.955594][T13086] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 277.961051][T13105] FAULT_INJECTION: forcing a failure. [ 277.961051][T13105] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 277.963940][T13086] RDX: 0000000000000017 RSI: 0000000020000080 RDI: 0000000000000004 [ 277.963956][T13086] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 277.963968][T13086] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 277.963980][T13086] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 06:31:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, 0x0) [ 277.980593][T13086] loop1: detected capacity change from 0 to 1 [ 277.986789][T13105] CPU: 0 PID: 13105 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 277.997879][T13086] FAT-fs (loop1): bogus number of reserved sectors [ 278.003502][T13105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.003514][T13105] Call Trace: [ 278.003521][T13105] dump_stack+0x137/0x19d [ 278.011530][T13086] FAT-fs (loop1): Can't find a valid FAT filesystem [ 278.017846][T13105] should_fail+0x23c/0x250 [ 278.064337][T13105] __alloc_pages+0x102/0x320 [ 278.068914][T13105] alloc_pages_vma+0x391/0x660 [ 278.073720][T13105] ? page_add_new_anon_rmap+0x26d/0x2c0 [ 278.079806][T13105] wp_page_copy+0x121/0x10c0 [ 278.084385][T13105] do_wp_page+0x5a8/0xba0 [ 278.088836][T13105] handle_mm_fault+0xb31/0x1a70 [ 278.093861][T13105] do_user_addr_fault+0x60c/0xc00 [ 278.099338][T13105] exc_page_fault+0x94/0x230 [ 278.104364][T13105] asm_exc_page_fault+0x1e/0x30 [ 278.109614][T13105] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 278.116503][T13105] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 278.138709][T13105] RSP: 0018:ffffc90001a9f860 EFLAGS: 00010206 [ 278.144950][T13105] RAX: ffff88815669a9e8 RBX: 0000000020000740 RCX: 0000000000003f1c [ 278.153405][T13105] RDX: 00000000000077dc RSI: ffff8881091ab8c0 RDI: 0000000020004000 [ 278.161541][T13105] RBP: ffff8881091a8000 R08: 0000000000000000 R09: 0001ffffffffffff [ 278.169795][T13105] R10: 00018881091af7db R11: ffff88815669a000 R12: ffffc90001a9fe30 [ 278.178904][T13105] R13: 00007ffffffff000 R14: 00000000000077dc R15: 0000000000000000 [ 278.187353][T13105] _copy_to_iter+0x1f2/0xdd0 [ 278.192395][T13105] ? check_stack_object+0x61/0x70 [ 278.197555][T13105] ? __virt_addr_valid+0x15a/0x1a0 [ 278.203149][T13105] ? __check_object_size+0x253/0x310 [ 278.208435][T13105] simple_copy_to_iter+0x4c/0x60 [ 278.213713][T13105] __skb_datagram_iter+0x23c/0x520 [ 278.219353][T13105] ? skb_copy_datagram_iter+0xc0/0xc0 [ 278.224865][T13105] skb_copy_datagram_iter+0x39/0xc0 [ 278.230395][T13105] tcp_recvmsg_locked+0xa9c/0x1700 [ 278.236130][T13105] tcp_recvmsg+0x145/0x430 [ 278.241036][T13105] ? mntput+0x45/0x70 [ 278.245153][T13105] inet_recvmsg+0xa3/0x200 [ 278.249606][T13105] ? inet_sendpage+0xc0/0xc0 [ 278.254844][T13105] ____sys_recvmsg+0x15d/0x310 [ 278.259745][T13105] ? __import_iovec+0x1ff/0x270 [ 278.265476][T13105] ? import_iovec+0x69/0x80 [ 278.271031][T13105] __sys_recvmsg+0x1d2/0x3a0 [ 278.276273][T13105] ? __cond_resched+0x11/0x40 [ 278.281617][T13105] ? fput+0x2d/0x130 [ 278.286130][T13105] ? ksys_write+0x157/0x180 [ 278.290815][T13105] __x64_sys_recvmsg+0x42/0x50 [ 278.295668][T13105] do_syscall_64+0x4a/0x90 [ 278.300839][T13105] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 278.306866][T13105] RIP: 0033:0x4665d9 [ 278.312184][T13105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 278.333670][T13105] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 278.343078][T13105] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 278.351526][T13105] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 06:31:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040), 0x0, 0x800}], 0x0, &(0x7f0000013800)) [ 278.359955][T13105] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 278.368143][T13105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.377088][T13105] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 06:31:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030002, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:57 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:31:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040), 0x0, 0x800}], 0x0, &(0x7f0000013800)) [ 278.460992][T13118] loop5: detected capacity change from 0 to 131456 [ 278.468812][T13115] loop3: detected capacity change from 0 to 131456 [ 278.480327][T13124] loop4: detected capacity change from 0 to 131456 [ 278.484690][T13115] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 278.490869][T13124] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 278.497347][T13115] EXT4-fs (loop3): group descriptors corrupted! [ 278.507553][T13131] FAULT_INJECTION: forcing a failure. [ 278.507553][T13131] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 278.507792][T13124] EXT4-fs (loop4): group descriptors corrupted! [ 278.514382][T13131] CPU: 0 PID: 13131 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 278.528568][T13127] loop2: detected capacity change from 0 to 1 [ 278.534645][T13131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:31:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, 0x0) [ 278.559992][T13131] Call Trace: [ 278.563632][T13131] dump_stack+0x137/0x19d [ 278.567270][T13118] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 278.568059][T13131] should_fail+0x23c/0x250 [ 278.578678][T13118] EXT4-fs (loop5): group descriptors corrupted! [ 278.583122][T13131] should_fail_usercopy+0x16/0x20 [ 278.594810][T13131] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 278.601354][T13131] ? shmem_write_begin+0x7e/0x100 [ 278.607229][T13131] generic_perform_write+0x1e4/0x3a0 [ 278.612960][T13131] ? file_update_time+0x1bd/0x3e0 [ 278.618100][T13131] __generic_file_write_iter+0x161/0x300 [ 278.624123][T13131] ? generic_write_checks+0x250/0x290 [ 278.629788][T13131] generic_file_write_iter+0x75/0x130 [ 278.635995][T13131] vfs_write+0x69d/0x770 [ 278.641305][T13131] __x64_sys_pwrite64+0xf5/0x150 [ 278.648207][T13131] do_syscall_64+0x4a/0x90 [ 278.652835][T13131] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 278.659245][T13131] RIP: 0033:0x419777 [ 278.663145][T13131] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 278.684305][T13131] RSP: 002b:00007f79e044ef20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 278.693446][T13131] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 278.701695][T13131] RDX: 0000000000000017 RSI: 0000000020000080 RDI: 0000000000000004 06:31:57 executing program 0 (fault-call:19 fault-nth:6): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 278.710344][T13131] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 278.718952][T13131] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 278.727796][T13131] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 278.737729][T13131] loop1: detected capacity change from 0 to 1 [ 278.747563][T13131] FAT-fs (loop1): Directory bread(block 3) failed 06:31:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040), 0x0, 0x800}], 0x0, &(0x7f0000013800)) 06:31:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040), 0x0, 0x800}], 0x0, &(0x7f0000013800)) [ 278.757939][T13131] FAT-fs (loop1): Directory bread(block 4) failed [ 278.768305][T13131] FAT-fs (loop1): Directory bread(block 5) failed [ 278.774710][T13135] loop2: detected capacity change from 0 to 1 [ 278.789962][T13118] loop5: detected capacity change from 0 to 131456 [ 278.803312][T13118] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 278.814429][T13118] EXT4-fs (loop5): group descriptors corrupted! [ 278.822072][T13131] FAT-fs (loop1): Directory bread(block 6) failed [ 278.828393][T13152] FAULT_INJECTION: forcing a failure. [ 278.828393][T13152] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 278.829598][T13131] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/344/file0 supports timestamps until 2107 (0x10391447e) [ 278.843013][T13152] CPU: 1 PID: 13152 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 278.867283][T13152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.878032][T13152] Call Trace: [ 278.882333][T13152] dump_stack+0x137/0x19d [ 278.887025][T13152] should_fail+0x23c/0x250 [ 278.891856][T13152] __alloc_pages+0x102/0x320 [ 278.897163][T13152] alloc_pages_vma+0x391/0x660 [ 278.902228][T13152] ? page_add_new_anon_rmap+0x26d/0x2c0 [ 278.908433][T13152] wp_page_copy+0x121/0x10c0 [ 278.913385][T13152] do_wp_page+0x5a8/0xba0 [ 278.917993][T13152] handle_mm_fault+0xb31/0x1a70 [ 278.923063][T13152] do_user_addr_fault+0x60c/0xc00 [ 278.928248][T13152] exc_page_fault+0x94/0x230 [ 278.933575][T13152] asm_exc_page_fault+0x1e/0x30 [ 278.938867][T13152] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 278.945561][T13152] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 278.967160][T13152] RSP: 0018:ffffc90001b83860 EFLAGS: 00010206 [ 278.973531][T13152] RAX: ffff88812df74a68 RBX: 0000000020000740 RCX: 0000000000002f1c [ 278.981620][T13152] RDX: 00000000000077dc RSI: ffff8881301f48c0 RDI: 0000000020005000 [ 278.990018][T13152] RBP: ffff8881301f0000 R08: 0000000000000000 R09: 0001ffffffffffff [ 278.998985][T13152] R10: 00018881301f77db R11: ffff88812df74080 R12: ffffc90001b83e30 [ 279.007049][T13152] R13: 00007ffffffff000 R14: 00000000000077dc R15: 0000000000000000 [ 279.015622][T13152] _copy_to_iter+0x1f2/0xdd0 [ 279.020540][T13152] ? check_stack_object+0x61/0x70 [ 279.025788][T13152] ? __virt_addr_valid+0x15a/0x1a0 [ 279.031207][T13152] ? __check_object_size+0x253/0x310 [ 279.038043][T13152] simple_copy_to_iter+0x4c/0x60 [ 279.042968][T13152] __skb_datagram_iter+0x23c/0x520 [ 279.048543][T13152] ? skb_copy_datagram_iter+0xc0/0xc0 [ 279.054162][T13152] skb_copy_datagram_iter+0x39/0xc0 [ 279.059722][T13152] tcp_recvmsg_locked+0xa9c/0x1700 [ 279.065506][T13152] tcp_recvmsg+0x145/0x430 [ 279.070811][T13152] ? mntput+0x45/0x70 [ 279.074793][T13152] inet_recvmsg+0xa3/0x200 [ 279.079372][T13152] ? inet_sendpage+0xc0/0xc0 [ 279.084278][T13152] ____sys_recvmsg+0x15d/0x310 [ 279.089320][T13152] ? __import_iovec+0x1ff/0x270 [ 279.094351][T13152] ? import_iovec+0x69/0x80 [ 279.099029][T13152] __sys_recvmsg+0x1d2/0x3a0 [ 279.103614][T13152] ? __cond_resched+0x11/0x40 [ 279.108320][T13152] ? fput+0x2d/0x130 [ 279.112383][T13152] ? ksys_write+0x157/0x180 [ 279.117242][T13152] __x64_sys_recvmsg+0x42/0x50 [ 279.123031][T13152] do_syscall_64+0x4a/0x90 [ 279.130494][T13152] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 279.137014][T13152] RIP: 0033:0x4665d9 [ 279.141171][T13152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:31:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403000a, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:31:57 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:31:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030002, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 279.162117][T13152] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 279.170950][T13152] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 279.179136][T13152] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 279.187442][T13152] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 279.196606][T13152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.205432][T13152] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 [ 279.235959][T13154] loop4: detected capacity change from 0 to 131456 [ 279.243435][T13155] loop3: detected capacity change from 0 to 131456 [ 279.278527][T13162] loop5: detected capacity change from 0 to 131456 [ 279.285853][T13154] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 279.296154][T13154] EXT4-fs (loop4): group descriptors corrupted! [ 279.303917][T13170] loop2: detected capacity change from 0 to 131456 [ 279.308881][T13174] FAULT_INJECTION: forcing a failure. [ 279.308881][T13174] name failslab, interval 1, probability 0, space 0, times 0 [ 279.323991][T13174] CPU: 1 PID: 13174 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 279.332987][T13174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.344778][T13174] Call Trace: [ 279.348053][T13174] dump_stack+0x137/0x19d [ 279.352602][T13174] should_fail+0x23c/0x250 [ 279.357250][T13174] ? getname_flags+0x84/0x3d0 [ 279.362083][T13174] __should_failslab+0x81/0x90 [ 279.367094][T13174] should_failslab+0x5/0x20 [ 279.371967][T13174] kmem_cache_alloc+0x46/0x2f0 [ 279.377252][T13174] getname_flags+0x84/0x3d0 [ 279.381922][T13174] ? vfs_write+0x50c/0x770 [ 279.386676][T13174] getname+0x15/0x20 [ 279.390553][T13174] do_sys_openat2+0x5b/0x250 [ 279.395151][T13174] __x64_sys_openat+0xef/0x110 [ 279.400466][T13174] do_syscall_64+0x4a/0x90 [ 279.405238][T13174] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 279.411909][T13174] RIP: 0033:0x4196c4 [ 279.415787][T13174] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 279.436046][T13174] RSP: 002b:00007f79e044eed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 279.444787][T13174] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 279.453307][T13174] RDX: 0000000000000002 RSI: 00007f79e044f000 RDI: 00000000ffffff9c [ 279.461369][T13174] RBP: 00007f79e044f000 R08: 0000000000000000 R09: ffffffffffffffff [ 279.469590][T13174] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 06:31:58 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 279.477825][T13174] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 279.496388][T13155] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 279.507428][T13155] EXT4-fs (loop3): group descriptors corrupted! 06:31:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040), 0x0, 0x800}], 0x0, &(0x7f0000013800)) [ 279.535888][T13162] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 279.547294][T13162] EXT4-fs (loop5): group descriptors corrupted! [ 279.570215][T13170] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! 06:31:58 executing program 0 (fault-call:19 fault-nth:7): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 279.580853][T13170] EXT4-fs (loop2): group descriptors corrupted! 06:31:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1}], 0x0, &(0x7f0000013800)) 06:31:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030029, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 279.625106][T13183] loop4: detected capacity change from 0 to 131456 [ 279.627767][T13182] FAULT_INJECTION: forcing a failure. [ 279.627767][T13182] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 279.645310][T13182] CPU: 0 PID: 13182 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 279.654891][T13182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.665292][T13182] Call Trace: [ 279.668645][T13182] dump_stack+0x137/0x19d [ 279.673281][T13182] should_fail+0x23c/0x250 [ 279.678188][T13182] should_fail_usercopy+0x16/0x20 [ 279.683421][T13182] strncpy_from_user+0x21/0x250 [ 279.686070][T13189] FAULT_INJECTION: forcing a failure. [ 279.686070][T13189] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 279.688749][T13182] getname_flags+0xb8/0x3d0 [ 279.688801][T13182] ? vfs_write+0x50c/0x770 [ 279.688814][T13182] getname+0x15/0x20 [ 279.688825][T13182] do_sys_openat2+0x5b/0x250 [ 279.688844][T13182] __x64_sys_openat+0xef/0x110 [ 279.688861][T13182] do_syscall_64+0x4a/0x90 [ 279.730288][T13182] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 279.736783][T13182] RIP: 0033:0x4196c4 [ 279.741076][T13182] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 279.762838][T13182] RSP: 002b:00007f79e044eed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 279.771602][T13182] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 279.780025][T13182] RDX: 0000000000000002 RSI: 00007f79e044f000 RDI: 00000000ffffff9c [ 279.788916][T13182] RBP: 00007f79e044f000 R08: 0000000000000000 R09: ffffffffffffffff [ 279.797175][T13182] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 279.805304][T13182] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 279.813878][T13189] CPU: 1 PID: 13189 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 279.823090][T13189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.833989][T13189] Call Trace: [ 279.837543][T13189] dump_stack+0x137/0x19d [ 279.842152][T13189] should_fail+0x23c/0x250 [ 279.846639][T13189] __alloc_pages+0x102/0x320 [ 279.851450][T13189] alloc_pages_vma+0x391/0x660 [ 279.856205][T13189] ? page_add_new_anon_rmap+0x26d/0x2c0 [ 279.861882][T13189] wp_page_copy+0x121/0x10c0 [ 279.866637][T13189] do_wp_page+0x5a8/0xba0 [ 279.871396][T13189] handle_mm_fault+0xb31/0x1a70 [ 279.876538][T13189] do_user_addr_fault+0x60c/0xc00 [ 279.882259][T13189] exc_page_fault+0x94/0x230 [ 279.886927][T13189] asm_exc_page_fault+0x1e/0x30 [ 279.892599][T13189] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 279.899673][T13189] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 279.920074][T13189] RSP: 0018:ffffc90001b8b860 EFLAGS: 00010206 [ 279.926130][T13189] RAX: ffff88812f8f1a28 RBX: 0000000020000740 RCX: 0000000000001f1c [ 279.934833][T13189] RDX: 00000000000077dc RSI: ffff8881091ad8c0 RDI: 0000000020006000 [ 279.943150][T13189] RBP: ffff8881091a8000 R08: 0000000000000000 R09: 0001ffffffffffff [ 279.951948][T13189] R10: 00018881091af7db R11: ffff88812f8f1040 R12: ffffc90001b8be30 [ 279.960408][T13189] R13: 00007ffffffff000 R14: 00000000000077dc R15: 0000000000000000 [ 279.969527][T13189] _copy_to_iter+0x1f2/0xdd0 [ 279.974370][T13189] ? check_stack_object+0x61/0x70 [ 279.979989][T13189] ? __virt_addr_valid+0x15a/0x1a0 [ 279.985913][T13189] ? __check_object_size+0x253/0x310 [ 279.991787][T13189] simple_copy_to_iter+0x4c/0x60 [ 279.996821][T13189] __skb_datagram_iter+0x23c/0x520 [ 280.002150][T13189] ? skb_copy_datagram_iter+0xc0/0xc0 [ 280.007724][T13189] skb_copy_datagram_iter+0x39/0xc0 [ 280.013297][T13189] tcp_recvmsg_locked+0xa9c/0x1700 [ 280.018856][T13189] tcp_recvmsg+0x145/0x430 [ 280.023465][T13189] ? mntput+0x45/0x70 [ 280.027533][T13189] inet_recvmsg+0xa3/0x200 [ 280.032282][T13189] ? inet_sendpage+0xc0/0xc0 [ 280.037219][T13189] ____sys_recvmsg+0x15d/0x310 [ 280.041965][T13189] ? __import_iovec+0x1ff/0x270 [ 280.046941][T13189] ? import_iovec+0x69/0x80 [ 280.052131][T13189] __sys_recvmsg+0x1d2/0x3a0 [ 280.057028][T13189] ? __cond_resched+0x11/0x40 [ 280.061937][T13189] ? fput+0x2d/0x130 [ 280.066256][T13189] ? ksys_write+0x157/0x180 [ 280.071093][T13189] __x64_sys_recvmsg+0x42/0x50 [ 280.076285][T13189] do_syscall_64+0x4a/0x90 [ 280.080925][T13189] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 280.087163][T13189] RIP: 0033:0x4665d9 [ 280.091128][T13189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 280.112318][T13189] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 06:31:58 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 280.120979][T13189] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 280.130782][T13189] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 280.139326][T13189] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 280.147465][T13189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.155969][T13189] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 06:31:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040), 0x0, 0x800}], 0x0, &(0x7f0000013800)) [ 280.203371][T13183] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 280.213973][T13183] EXT4-fs (loop4): group descriptors corrupted! [ 280.277952][T13200] FAULT_INJECTION: forcing a failure. [ 280.277952][T13200] name failslab, interval 1, probability 0, space 0, times 0 [ 280.291544][T13200] CPU: 0 PID: 13200 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 280.300716][T13200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.307819][T13201] loop2: detected capacity change from 0 to 131456 [ 280.311245][T13200] Call Trace: [ 280.311253][T13200] dump_stack+0x137/0x19d [ 280.325429][T13200] should_fail+0x23c/0x250 [ 280.329573][T13201] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 280.330078][T13200] ? __alloc_file+0x2e/0x1a0 [ 280.340971][T13201] EXT4-fs (loop2): group descriptors corrupted! [ 280.345584][T13200] __should_failslab+0x81/0x90 [ 280.357253][T13200] should_failslab+0x5/0x20 [ 280.361834][T13200] kmem_cache_alloc+0x46/0x2f0 [ 280.367314][T13200] __alloc_file+0x2e/0x1a0 [ 280.371998][T13200] alloc_empty_file+0xcd/0x1c0 06:31:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040), 0x0, 0x800}], 0x0, &(0x7f0000013800)) [ 280.377119][T13200] path_openat+0x6a/0x20b0 [ 280.381767][T13200] ? avc_has_perm_noaudit+0x19a/0x240 [ 280.387505][T13200] ? avc_has_perm+0x59/0x150 [ 280.392755][T13200] ? avc_has_perm+0xc8/0x150 [ 280.397458][T13200] do_filp_open+0xd9/0x1f0 [ 280.402303][T13200] ? __virt_addr_valid+0x15a/0x1a0 [ 280.407700][T13200] ? __check_object_size+0x253/0x310 [ 280.413517][T13200] ? _find_next_bit+0x16a/0x190 [ 280.418506][T13200] ? alloc_fd+0x388/0x3e0 [ 280.423020][T13200] do_sys_openat2+0xa3/0x250 [ 280.427788][T13200] __x64_sys_openat+0xef/0x110 [ 280.432754][T13200] do_syscall_64+0x4a/0x90 [ 280.437644][T13200] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 280.443756][T13200] RIP: 0033:0x4196c4 [ 280.447829][T13200] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 280.468510][T13200] RSP: 002b:00007f79e044eed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 06:31:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1}], 0x0, &(0x7f0000013800)) [ 280.477206][T13200] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 280.486001][T13200] RDX: 0000000000000002 RSI: 00007f79e044f000 RDI: 00000000ffffff9c [ 280.494297][T13200] RBP: 00007f79e044f000 R08: 0000000000000000 R09: ffffffffffffffff [ 280.502487][T13200] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 280.510930][T13200] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 06:31:59 executing program 0 (fault-call:19 fault-nth:8): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 280.523874][T13198] loop5: detected capacity change from 0 to 131456 [ 280.530977][T13197] loop3: detected capacity change from 0 to 131456 06:31:59 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 280.597349][T13197] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 280.607988][T13197] EXT4-fs (loop3): group descriptors corrupted! [ 280.616222][T13207] loop2: detected capacity change from 0 to 131456 [ 280.624350][T13198] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 280.625190][T13217] FAULT_INJECTION: forcing a failure. [ 280.625190][T13217] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 280.634963][T13198] EXT4-fs (loop5): group descriptors corrupted! [ 280.648590][T13217] CPU: 0 PID: 13217 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 280.664008][T13217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.675445][T13217] Call Trace: [ 280.678996][T13217] dump_stack+0x137/0x19d [ 280.684213][T13217] should_fail+0x23c/0x250 [ 280.688959][T13217] __alloc_pages+0x102/0x320 [ 280.694680][T13217] alloc_pages_vma+0x391/0x660 [ 280.699611][T13217] ? page_add_new_anon_rmap+0x26d/0x2c0 [ 280.703759][T13222] FAULT_INJECTION: forcing a failure. [ 280.703759][T13222] name failslab, interval 1, probability 0, space 0, times 0 [ 280.705565][T13217] wp_page_copy+0x121/0x10c0 [ 280.705595][T13217] do_wp_page+0x5a8/0xba0 [ 280.728329][T13217] handle_mm_fault+0xb31/0x1a70 [ 280.733629][T13217] do_user_addr_fault+0x60c/0xc00 [ 280.738976][T13217] exc_page_fault+0x94/0x230 [ 280.743734][T13217] asm_exc_page_fault+0x1e/0x30 [ 280.749195][T13217] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 280.756132][T13217] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 280.776514][T13217] RSP: 0018:ffffc90001e93860 EFLAGS: 00010206 [ 280.782980][T13217] RAX: ffff888131bd6a28 RBX: 0000000020000740 RCX: 0000000000000f1c [ 280.791025][T13217] RDX: 00000000000077dc RSI: ffff888106f4e8c0 RDI: 0000000020007000 [ 280.799242][T13217] RBP: ffff888106f48000 R08: 0000000000000000 R09: 0001ffffffffffff [ 280.807286][T13217] R10: 0001888106f4f7db R11: ffff888131bd6040 R12: ffffc90001e93e30 [ 280.815793][T13217] R13: 00007ffffffff000 R14: 00000000000077dc R15: 0000000000000000 [ 280.824031][T13217] _copy_to_iter+0x1f2/0xdd0 [ 280.829231][T13217] ? check_stack_object+0x61/0x70 [ 280.834528][T13217] ? __virt_addr_valid+0x15a/0x1a0 [ 280.839809][T13217] ? __check_object_size+0x253/0x310 [ 280.845314][T13217] simple_copy_to_iter+0x4c/0x60 [ 280.851034][T13217] __skb_datagram_iter+0x23c/0x520 [ 280.856633][T13217] ? skb_copy_datagram_iter+0xc0/0xc0 [ 280.862435][T13217] skb_copy_datagram_iter+0x39/0xc0 [ 280.867771][T13217] tcp_recvmsg_locked+0xa9c/0x1700 [ 280.872993][T13217] tcp_recvmsg+0x145/0x430 [ 280.877582][T13217] ? mntput+0x45/0x70 [ 280.881740][T13217] inet_recvmsg+0xa3/0x200 [ 280.887109][T13217] ? inet_sendpage+0xc0/0xc0 [ 280.891886][T13217] ____sys_recvmsg+0x15d/0x310 [ 280.897086][T13217] ? __import_iovec+0x1ff/0x270 [ 280.902105][T13217] ? import_iovec+0x69/0x80 [ 280.906796][T13217] __sys_recvmsg+0x1d2/0x3a0 [ 280.911734][T13217] ? __cond_resched+0x11/0x40 [ 280.916887][T13217] ? fput+0x2d/0x130 [ 280.921105][T13217] ? ksys_write+0x157/0x180 [ 280.925681][T13217] __x64_sys_recvmsg+0x42/0x50 [ 280.930521][T13217] do_syscall_64+0x4a/0x90 [ 280.935041][T13217] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 280.941451][T13217] RIP: 0033:0x4665d9 [ 280.945751][T13217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 280.967850][T13217] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 280.976501][T13217] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 280.984465][T13217] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 280.992552][T13217] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 281.000597][T13217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.008862][T13217] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 [ 281.017435][T13222] CPU: 1 PID: 13222 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 281.026753][T13222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.037195][T13222] Call Trace: [ 281.040810][T13222] dump_stack+0x137/0x19d [ 281.046219][T13222] should_fail+0x23c/0x250 [ 281.050897][T13222] ? security_file_alloc+0x30/0x190 [ 281.056548][T13222] __should_failslab+0x81/0x90 [ 281.061547][T13222] should_failslab+0x5/0x20 [ 281.066414][T13222] kmem_cache_alloc+0x46/0x2f0 [ 281.071717][T13222] security_file_alloc+0x30/0x190 [ 281.076897][T13222] __alloc_file+0x83/0x1a0 [ 281.081941][T13222] alloc_empty_file+0xcd/0x1c0 [ 281.083538][T13223] loop4: detected capacity change from 0 to 131456 [ 281.087208][T13222] path_openat+0x6a/0x20b0 [ 281.087233][T13222] ? avc_has_perm_noaudit+0x19a/0x240 [ 281.104303][T13222] ? avc_has_perm+0x59/0x150 [ 281.109570][T13222] ? avc_has_perm+0xc8/0x150 [ 281.114711][T13222] do_filp_open+0xd9/0x1f0 [ 281.119238][T13222] ? __virt_addr_valid+0x15a/0x1a0 [ 281.126302][T13222] ? __check_object_size+0x253/0x310 [ 281.132127][T13222] ? _find_next_bit+0x16a/0x190 [ 281.132480][T13207] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 281.137736][T13222] ? alloc_fd+0x388/0x3e0 [ 281.137771][T13222] do_sys_openat2+0xa3/0x250 [ 281.148713][T13207] EXT4-fs (loop2): group descriptors corrupted! [ 281.153201][T13222] __x64_sys_openat+0xef/0x110 [ 281.171583][T13222] do_syscall_64+0x4a/0x90 [ 281.177402][T13222] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 281.184739][T13222] RIP: 0033:0x4196c4 [ 281.188889][T13222] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 281.211405][T13222] RSP: 002b:00007f79e044eed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 281.220831][T13222] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 281.229150][T13222] RDX: 0000000000000002 RSI: 00007f79e044f000 RDI: 00000000ffffff9c [ 281.238069][T13222] RBP: 00007f79e044f000 R08: 0000000000000000 R09: ffffffffffffffff 06:31:59 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 281.247786][T13222] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 281.257168][T13222] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 06:32:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1}], 0x0, &(0x7f0000013800)) 06:32:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040), 0x0, 0x800}], 0x0, &(0x7f0000013800)) 06:32:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030110, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 281.325088][T13223] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 281.335508][T13223] EXT4-fs (loop4): group descriptors corrupted! [ 281.360511][T13233] loop3: detected capacity change from 0 to 131456 06:32:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1}], 0x0, &(0x7f0000013800)) [ 281.378091][T13236] FAULT_INJECTION: forcing a failure. [ 281.378091][T13236] name failslab, interval 1, probability 0, space 0, times 0 [ 281.391197][T13236] CPU: 0 PID: 13236 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 281.400109][T13236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.411168][T13236] Call Trace: [ 281.414710][T13236] dump_stack+0x137/0x19d [ 281.419280][T13236] should_fail+0x23c/0x250 06:32:00 executing program 0 (fault-call:19 fault-nth:9): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 281.423798][T13236] ? loop_set_status_from_info+0x3a0/0x3a0 [ 281.429892][T13236] __should_failslab+0x81/0x90 [ 281.434718][T13236] ? __kthread_create_on_node+0x7a/0x290 [ 281.440803][T13236] should_failslab+0x5/0x20 [ 281.445414][T13236] kmem_cache_alloc_trace+0x49/0x310 [ 281.450823][T13236] ? wake_up_q+0x46/0x80 [ 281.455079][T13236] ? loop_set_status_from_info+0x3a0/0x3a0 [ 281.460414][T13242] loop5: detected capacity change from 0 to 131456 [ 281.461757][T13236] __kthread_create_on_node+0x7a/0x290 [ 281.474567][T13236] ? __blkdev_get+0x8c/0x6c0 [ 281.479243][T13233] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 281.479395][T13236] ? loop_set_status_from_info+0x3a0/0x3a0 [ 281.490104][T13233] EXT4-fs (loop3): group descriptors corrupted! [ 281.496222][T13236] kthread_create_on_node+0x72/0xa0 [ 281.496251][T13236] loop_configure+0x597/0xcb0 [ 281.513759][T13236] ? mntput+0x45/0x70 [ 281.517960][T13236] lo_ioctl+0x555/0x11f0 [ 281.520865][T13242] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 281.522389][T13236] ? path_openat+0x19ab/0x20b0 [ 281.532992][T13242] EXT4-fs (loop5): group descriptors corrupted! [ 281.537999][T13236] ? putname+0xa5/0xc0 [ 281.538021][T13236] ? ___cache_free+0x3c/0x300 [ 281.553192][T13236] ? blkdev_common_ioctl+0x9c3/0x1040 [ 281.559730][T13236] ? selinux_file_ioctl+0x8e0/0x970 [ 281.565586][T13236] ? lo_release+0x120/0x120 [ 281.570546][T13236] blkdev_ioctl+0x1d0/0x3c0 [ 281.575155][T13236] block_ioctl+0x6d/0x80 [ 281.579652][T13236] ? blkdev_iopoll+0x70/0x70 [ 281.584282][T13236] __se_sys_ioctl+0xcb/0x140 [ 281.589471][T13236] __x64_sys_ioctl+0x3f/0x50 [ 281.594337][T13236] do_syscall_64+0x4a/0x90 [ 281.598900][T13236] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 281.605035][T13236] RIP: 0033:0x466397 06:32:00 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 281.609298][T13236] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 281.625158][T13251] FAULT_INJECTION: forcing a failure. [ 281.625158][T13251] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 281.630424][T13236] RSP: 002b:00007f79e044ef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 281.630448][T13236] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 281.630459][T13236] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 281.630468][T13236] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 281.630477][T13236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 281.630486][T13236] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 281.696676][T13251] CPU: 1 PID: 13251 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 281.706248][T13251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.717418][T13251] Call Trace: [ 281.721394][T13251] dump_stack+0x137/0x19d [ 281.725826][T13251] should_fail+0x23c/0x250 [ 281.730441][T13251] should_fail_usercopy+0x16/0x20 [ 281.736204][T13251] _copy_to_iter+0x17c/0xdd0 [ 281.741146][T13251] ? check_stack_object+0x61/0x70 [ 281.746497][T13251] ? __virt_addr_valid+0x15a/0x1a0 [ 281.752412][T13251] ? __check_object_size+0x253/0x310 [ 281.758542][T13251] simple_copy_to_iter+0x4c/0x60 [ 281.763786][T13251] __skb_datagram_iter+0x23c/0x520 [ 281.769253][T13251] ? skb_copy_datagram_iter+0xc0/0xc0 [ 281.774698][T13251] skb_copy_datagram_iter+0x39/0xc0 [ 281.780125][T13251] tcp_recvmsg_locked+0xa9c/0x1700 [ 281.785416][T13251] tcp_recvmsg+0x145/0x430 [ 281.790041][T13251] ? mntput+0x45/0x70 [ 281.794340][T13251] inet_recvmsg+0xa3/0x200 [ 281.798841][T13251] ? inet_sendpage+0xc0/0xc0 [ 281.803864][T13251] ____sys_recvmsg+0x15d/0x310 [ 281.808879][T13251] ? __import_iovec+0x1ff/0x270 [ 281.814003][T13251] ? import_iovec+0x69/0x80 [ 281.818876][T13251] __sys_recvmsg+0x1d2/0x3a0 [ 281.824670][T13251] ? __cond_resched+0x11/0x40 [ 281.829503][T13251] ? fput+0x2d/0x130 [ 281.833386][T13251] ? ksys_write+0x157/0x180 [ 281.837961][T13251] __x64_sys_recvmsg+0x42/0x50 [ 281.843089][T13251] do_syscall_64+0x4a/0x90 [ 281.847796][T13251] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 281.854348][T13251] RIP: 0033:0x4665d9 [ 281.858693][T13251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 281.879986][T13251] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 281.888906][T13251] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 281.897205][T13251] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 281.905482][T13251] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 281.913710][T13251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 281.922600][T13251] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 [ 281.973021][T13241] loop2: detected capacity change from 0 to 131456 [ 281.980407][T13245] loop4: detected capacity change from 0 to 131456 [ 282.008179][T13241] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 06:32:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1}], 0x0, &(0x7f0000013800)) [ 282.012464][T13245] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 282.018749][T13241] EXT4-fs (loop2): group descriptors corrupted! [ 282.021931][T13242] loop5: detected capacity change from 0 to 131456 [ 282.029666][T13245] EXT4-fs (loop4): group descriptors corrupted! [ 282.054982][T13263] FAULT_INJECTION: forcing a failure. [ 282.054982][T13263] name failslab, interval 1, probability 0, space 0, times 0 [ 282.068262][T13263] CPU: 0 PID: 13263 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 282.078030][T13263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.080017][T13242] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 282.088518][T13263] Call Trace: [ 282.098824][T13242] EXT4-fs (loop5): group descriptors corrupted! [ 282.102273][T13263] dump_stack+0x137/0x19d [ 282.113187][T13263] should_fail+0x23c/0x250 [ 282.117865][T13263] ? __kernfs_new_node+0x6a/0x330 [ 282.124710][T13263] __should_failslab+0x81/0x90 [ 282.130248][T13263] should_failslab+0x5/0x20 [ 282.135029][T13263] kmem_cache_alloc+0x46/0x2f0 [ 282.140425][T13263] ? kvm_sched_clock_read+0xd/0x20 [ 282.145984][T13263] __kernfs_new_node+0x6a/0x330 [ 282.151274][T13263] ? select_task_rq_fair+0x186/0xc00 [ 282.156562][T13263] ? rb_insert_color+0x7e/0x310 [ 282.162136][T13263] kernfs_create_dir_ns+0x5e/0x140 [ 282.167681][T13263] internal_create_group+0x138/0x850 [ 282.174227][T13263] ? check_preempt_wakeup+0x22f/0x360 [ 282.180140][T13263] sysfs_create_group+0x1b/0x20 [ 282.185493][T13263] loop_configure+0xa21/0xcb0 [ 282.190685][T13263] lo_ioctl+0x555/0x11f0 [ 282.195535][T13263] ? path_openat+0x19ab/0x20b0 [ 282.201505][T13263] ? putname+0xa5/0xc0 [ 282.205825][T13263] ? ___cache_free+0x3c/0x300 [ 282.210664][T13263] ? blkdev_common_ioctl+0x9c3/0x1040 [ 282.216478][T13263] ? selinux_file_ioctl+0x8e0/0x970 [ 282.221976][T13263] ? lo_release+0x120/0x120 [ 282.227184][T13263] blkdev_ioctl+0x1d0/0x3c0 [ 282.232031][T13263] block_ioctl+0x6d/0x80 [ 282.237309][T13263] ? blkdev_iopoll+0x70/0x70 [ 282.242023][T13263] __se_sys_ioctl+0xcb/0x140 [ 282.246697][T13263] __x64_sys_ioctl+0x3f/0x50 [ 282.251302][T13263] do_syscall_64+0x4a/0x90 [ 282.256260][T13263] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 282.262344][T13263] RIP: 0033:0x466397 [ 282.266404][T13263] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 282.286758][T13263] RSP: 002b:00007f79e044ef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 282.295421][T13263] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 282.303656][T13263] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 282.312390][T13263] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 282.320713][T13263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 282.328949][T13263] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 282.337143][T13263] loop1: detected capacity change from 0 to 1 [ 282.346250][T13263] FAT-fs (loop1): Directory bread(block 3) failed [ 282.353034][T13263] FAT-fs (loop1): Directory bread(block 4) failed [ 282.360294][T13263] FAT-fs (loop1): Directory bread(block 5) failed [ 282.360423][T13269] loop3: detected capacity change from 0 to 131456 06:32:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1}], 0x0, &(0x7f0000013800)) [ 282.366884][T13263] FAT-fs (loop1): Directory bread(block 6) failed [ 282.380634][T13263] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/350/file0 supports timestamps until 2107 (0x10391447e) 06:32:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040)='.', 0x1}], 0x0, &(0x7f0000013800)) 06:32:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030500, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:01 executing program 0 (fault-call:19 fault-nth:10): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:01 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 282.422440][T13269] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 282.432774][T13269] EXT4-fs (loop3): group descriptors corrupted! [ 282.450384][T13278] loop4: detected capacity change from 0 to 131456 [ 282.549439][T13278] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 282.560266][T13278] EXT4-fs (loop4): group descriptors corrupted! [ 282.567475][T13291] FAULT_INJECTION: forcing a failure. [ 282.567475][T13291] name failslab, interval 1, probability 0, space 0, times 0 [ 282.567546][T13295] loop5: detected capacity change from 0 to 131458 [ 282.580443][T13291] CPU: 0 PID: 13291 Comm: syz-executor.1 Not tainted 5.13.0-rc2-syzkaller #0 [ 282.590792][T13289] loop2: detected capacity change from 0 to 131456 [ 282.595894][T13291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.595906][T13291] Call Trace: [ 282.595913][T13291] dump_stack+0x137/0x19d [ 282.606585][T13292] loop3: detected capacity change from 0 to 131456 [ 282.612972][T13291] should_fail+0x23c/0x250 [ 282.612997][T13291] ? __kernfs_new_node+0x6a/0x330 [ 282.616753][T13302] FAULT_INJECTION: forcing a failure. [ 282.616753][T13302] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 282.620761][T13291] __should_failslab+0x81/0x90 [ 282.620786][T13291] should_failslab+0x5/0x20 [ 282.661657][T13291] kmem_cache_alloc+0x46/0x2f0 [ 282.666489][T13291] ? __cond_resched+0x11/0x40 [ 282.671246][T13291] __kernfs_new_node+0x6a/0x330 [ 282.676266][T13291] ? idr_alloc_cyclic+0x249/0x2d0 [ 282.681278][T13291] ? rb_insert_color+0x7e/0x310 [ 282.686292][T13291] kernfs_new_node+0x5b/0xd0 [ 282.691218][T13291] __kernfs_create_file+0x45/0x1a0 [ 282.696423][T13291] sysfs_add_file_mode_ns+0x1c1/0x250 [ 282.701909][T13291] internal_create_group+0x2e4/0x850 [ 282.707359][T13291] sysfs_create_group+0x1b/0x20 [ 282.712249][T13291] loop_configure+0xa21/0xcb0 [ 282.717098][T13291] lo_ioctl+0x555/0x11f0 [ 282.721526][T13291] ? path_openat+0x19ab/0x20b0 [ 282.726303][T13291] ? putname+0xa5/0xc0 [ 282.730591][T13291] ? ___cache_free+0x3c/0x300 [ 282.735759][T13291] ? blkdev_common_ioctl+0x9c3/0x1040 [ 282.741218][T13291] ? selinux_file_ioctl+0x8e0/0x970 [ 282.746456][T13291] ? lo_release+0x120/0x120 [ 282.750950][T13291] blkdev_ioctl+0x1d0/0x3c0 [ 282.755487][T13291] block_ioctl+0x6d/0x80 [ 282.760260][T13291] ? blkdev_iopoll+0x70/0x70 [ 282.765122][T13291] __se_sys_ioctl+0xcb/0x140 [ 282.769876][T13291] __x64_sys_ioctl+0x3f/0x50 [ 282.774765][T13291] do_syscall_64+0x4a/0x90 [ 282.779420][T13291] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 282.785401][T13291] RIP: 0033:0x466397 [ 282.789302][T13291] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 282.809776][T13291] RSP: 002b:00007f79e044ef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 282.818426][T13291] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 282.827156][T13291] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 282.835396][T13291] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 282.843983][T13291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 282.852395][T13291] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 282.860600][T13302] CPU: 1 PID: 13302 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 282.870449][T13302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.878365][T13291] loop1: detected capacity change from 0 to 1 [ 282.881239][T13302] Call Trace: [ 282.881248][T13302] dump_stack+0x137/0x19d [ 282.895710][T13302] should_fail+0x23c/0x250 [ 282.900743][T13302] __alloc_pages+0x102/0x320 [ 282.905968][T13302] alloc_pages_vma+0x391/0x660 [ 282.911686][T13302] ? page_add_new_anon_rmap+0x26d/0x2c0 [ 282.917513][T13302] wp_page_copy+0x121/0x10c0 [ 282.922325][T13302] do_wp_page+0x5a8/0xba0 [ 282.926819][T13302] handle_mm_fault+0xb31/0x1a70 [ 282.931741][T13302] do_user_addr_fault+0x60c/0xc00 [ 282.936808][T13302] exc_page_fault+0x94/0x230 [ 282.942442][T13302] asm_exc_page_fault+0x1e/0x30 [ 282.947802][T13302] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 282.955298][T13302] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 282.976942][T13302] RSP: 0018:ffffc9000e683860 EFLAGS: 00010206 [ 282.984390][T13302] RAX: ffff88812df74a68 RBX: 0000000020007f1c RCX: 0000000000000740 [ 282.994497][T13302] RDX: 0000000000000824 RSI: ffff88812df878c0 RDI: 0000000020008000 [ 283.002846][T13302] RBP: ffff88812df877dc R08: 0000000000000000 R09: 0001ffffffffffff [ 283.011428][T13302] R10: 000188812df87fff R11: ffff88812df74080 R12: ffffc9000e683e30 [ 283.021098][T13302] R13: 00007ffffffff000 R14: 0000000000000824 R15: 00000000000077dc [ 283.029679][T13302] _copy_to_iter+0x1f2/0xdd0 [ 283.034694][T13302] ? check_stack_object+0x61/0x70 [ 283.040023][T13302] ? __virt_addr_valid+0x15a/0x1a0 [ 283.046083][T13302] ? __check_object_size+0x253/0x310 [ 283.051698][T13302] simple_copy_to_iter+0x4c/0x60 [ 283.057110][T13302] __skb_datagram_iter+0x23c/0x520 [ 283.063698][T13302] ? skb_copy_datagram_iter+0xc0/0xc0 [ 283.069148][T13302] skb_copy_datagram_iter+0x39/0xc0 [ 283.074559][T13302] tcp_recvmsg_locked+0xa9c/0x1700 [ 283.079799][T13302] tcp_recvmsg+0x145/0x430 [ 283.084721][T13302] ? mntput+0x45/0x70 [ 283.089145][T13302] inet_recvmsg+0xa3/0x200 [ 283.093582][T13302] ? inet_sendpage+0xc0/0xc0 [ 283.099035][T13302] ____sys_recvmsg+0x15d/0x310 [ 283.104300][T13302] ? __import_iovec+0x1ff/0x270 [ 283.109242][T13302] ? import_iovec+0x69/0x80 [ 283.114081][T13302] __sys_recvmsg+0x1d2/0x3a0 [ 283.119073][T13302] ? __cond_resched+0x11/0x40 [ 283.125204][T13302] ? fput+0x2d/0x130 [ 283.129803][T13302] ? ksys_write+0x157/0x180 [ 283.134609][T13302] __x64_sys_recvmsg+0x42/0x50 [ 283.139696][T13302] do_syscall_64+0x4a/0x90 [ 283.144492][T13302] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 283.150944][T13302] RIP: 0033:0x4665d9 [ 283.154964][T13302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 283.176020][T13302] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 283.184530][T13302] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 283.193044][T13302] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 283.202273][T13302] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 283.211010][T13302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 283.220945][T13302] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 06:32:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 283.250167][T13292] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 283.257032][T13295] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 283.267532][T13295] EXT4-fs (loop5): group descriptors corrupted! [ 283.276083][T13291] FAT-fs (loop1): Directory bread(block 3) failed [ 283.299954][T13289] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 283.310582][T13289] EXT4-fs (loop2): group descriptors corrupted! [ 283.318182][T13291] FAT-fs (loop1): Directory bread(block 4) failed [ 283.328533][T13291] FAT-fs (loop1): Directory bread(block 5) failed [ 283.336259][T13291] FAT-fs (loop1): Directory bread(block 6) failed 06:32:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040), 0x0, 0x800}], 0x0, &(0x7f0000013800)) 06:32:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:02 executing program 0 (fault-call:19 fault-nth:11): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 283.353139][T13291] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/351/file0 supports timestamps until 2107 (0x10391447e) [ 283.370849][T13311] loop4: detected capacity change from 0 to 131456 [ 283.389396][T13295] loop5: detected capacity change from 0 to 131458 06:32:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 283.418104][T13311] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 283.432387][T13295] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 283.442842][T13295] EXT4-fs (loop5): group descriptors corrupted! [ 283.465698][T13328] loop3: detected capacity change from 0 to 131456 [ 283.519201][T13328] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 283.535195][T13336] FAULT_INJECTION: forcing a failure. [ 283.535195][T13336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 283.548817][T13336] CPU: 1 PID: 13336 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 283.558304][T13336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.568464][T13336] Call Trace: [ 283.571883][T13336] dump_stack+0x137/0x19d [ 283.577138][T13336] should_fail+0x23c/0x250 [ 283.581750][T13336] should_fail_usercopy+0x16/0x20 [ 283.587078][T13336] _copy_to_iter+0x17c/0xdd0 [ 283.588620][T13327] loop2: detected capacity change from 0 to 131456 [ 283.591752][T13336] ? check_stack_object+0x61/0x70 [ 283.603751][T13336] ? __virt_addr_valid+0x15a/0x1a0 [ 283.609312][T13336] ? __check_object_size+0x253/0x310 06:32:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030900, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 283.609889][T13327] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 283.615214][T13336] simple_copy_to_iter+0x4c/0x60 [ 283.615241][T13336] __skb_datagram_iter+0x23c/0x520 [ 283.625510][T13327] EXT4-fs (loop2): group descriptors corrupted! [ 283.630646][T13336] ? skb_copy_datagram_iter+0xc0/0xc0 [ 283.630670][T13336] skb_copy_datagram_iter+0x39/0xc0 [ 283.630686][T13336] tcp_recvmsg_locked+0xa9c/0x1700 [ 283.630707][T13336] tcp_recvmsg+0x145/0x430 [ 283.630724][T13336] ? mntput+0x45/0x70 [ 283.639036][T13339] loop1: detected capacity change from 0 to 1 [ 283.642533][T13336] inet_recvmsg+0xa3/0x200 [ 283.642562][T13336] ? inet_sendpage+0xc0/0xc0 [ 283.651819][T13341] loop4: detected capacity change from 0 to 131456 [ 283.653453][T13336] ____sys_recvmsg+0x15d/0x310 [ 283.666183][T13339] FAT-fs (loop1): Directory bread(block 3) failed [ 283.667451][T13336] ? __import_iovec+0x1ff/0x270 [ 283.667477][T13336] ? import_iovec+0x69/0x80 [ 283.677500][T13339] FAT-fs (loop1): Directory bread(block 4) failed [ 283.678099][T13336] __sys_recvmsg+0x1d2/0x3a0 [ 283.687325][T13341] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 283.690056][T13336] ? __cond_resched+0x11/0x40 [ 283.703809][T13339] FAT-fs (loop1): Directory bread(block 5) failed [ 283.706610][T13336] ? fput+0x2d/0x130 [ 283.711662][T13339] FAT-fs (loop1): Directory bread(block 6) failed [ 283.718335][T13336] ? ksys_write+0x157/0x180 [ 283.718355][T13336] __x64_sys_recvmsg+0x42/0x50 [ 283.718374][T13336] do_syscall_64+0x4a/0x90 [ 283.724693][T13339] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/352/file0 supports timestamps until 2107 (0x10391447e) [ 283.729788][T13336] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 283.729819][T13336] RIP: 0033:0x4665d9 [ 283.793177][T13336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 283.816789][T13336] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 283.826372][T13336] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 283.835397][T13336] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 283.844175][T13336] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 283.853098][T13336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 283.861525][T13336] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 06:32:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000000040), 0x0, 0x800}], 0x0, &(0x7f0000013800)) [ 283.897040][T13350] loop5: detected capacity change from 0 to 131460 06:32:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{0x0, 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 283.943484][T13360] loop3: detected capacity change from 0 to 131456 [ 283.953340][T13360] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 283.963440][T13359] loop4: detected capacity change from 0 to 131456 [ 283.975586][T13350] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 283.986572][T13350] EXT4-fs (loop5): group descriptors corrupted! 06:32:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{0x0, 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 284.003364][T13359] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 284.019039][T13367] loop2: detected capacity change from 0 to 131456 [ 284.054788][T13375] loop3: detected capacity change from 0 to 131456 [ 284.059113][T13350] loop5: detected capacity change from 0 to 131460 [ 284.061966][T13367] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 284.070161][T13378] loop1: detected capacity change from 0 to 1 [ 284.079071][T13367] EXT4-fs (loop2): group descriptors corrupted! [ 284.097466][T13350] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 284.097997][T13375] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 284.107788][T13350] EXT4-fs (loop5): group descriptors corrupted! [ 284.135537][T13378] FAT-fs (loop1): Directory bread(block 3) failed 06:32:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030b00, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{0x0, 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 284.150551][T13378] FAT-fs (loop1): Directory bread(block 4) failed [ 284.168789][T13378] FAT-fs (loop1): Directory bread(block 5) failed [ 284.169316][T13386] loop4: detected capacity change from 0 to 131456 [ 284.176073][T13378] FAT-fs (loop1): Directory bread(block 6) failed [ 284.194506][T13378] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/353/file0 supports timestamps until 2107 (0x10391447e) [ 284.230703][T13394] loop3: detected capacity change from 0 to 131456 [ 284.237886][T13390] loop5: detected capacity change from 0 to 131461 [ 284.247945][T13386] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 284.256330][T13394] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 284.264439][T13390] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! 06:32:02 executing program 0 (fault-call:19 fault-nth:12): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:02 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 284.275138][T13390] EXT4-fs (loop5): group descriptors corrupted! 06:32:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{0x0, 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{0x0, 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4031001, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 284.369247][T13414] FAULT_INJECTION: forcing a failure. [ 284.369247][T13414] name failslab, interval 1, probability 0, space 0, times 0 [ 284.382497][T13414] CPU: 0 PID: 13414 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 284.391421][T13414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.394636][T13418] loop3: detected capacity change from 0 to 131456 [ 284.401857][T13414] Call Trace: [ 284.401868][T13414] dump_stack+0x137/0x19d [ 284.401893][T13414] should_fail+0x23c/0x250 [ 284.401912][T13414] ? __se_sys_memfd_create+0xfb/0x390 [ 284.427298][T13414] __should_failslab+0x81/0x90 [ 284.432400][T13414] should_failslab+0x5/0x20 [ 284.436126][T13423] loop5: detected capacity change from 0 to 131464 [ 284.437200][T13414] __kmalloc+0x66/0x340 [ 284.444463][T13415] loop1: detected capacity change from 0 to 1 [ 284.447938][T13414] ? strnlen_user+0x137/0x1c0 [ 284.447958][T13414] __se_sys_memfd_create+0xfb/0x390 [ 284.447981][T13414] __x64_sys_memfd_create+0x2d/0x40 [ 284.469410][T13414] do_syscall_64+0x4a/0x90 [ 284.474291][T13414] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 284.480328][T13414] RIP: 0033:0x4665d9 [ 284.484511][T13414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 284.504884][T13414] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 284.513378][T13414] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 284.521610][T13414] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 [ 284.529758][T13414] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff [ 284.537813][T13414] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 284.545985][T13414] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 [ 284.559610][T13415] FAT-fs (loop1): Directory bread(block 3) failed [ 284.571513][T13429] FAULT_INJECTION: forcing a failure. [ 284.571513][T13429] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 284.571546][T13420] loop4: detected capacity change from 0 to 131456 [ 284.585121][T13429] CPU: 0 PID: 13429 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 284.593819][T13423] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 284.601206][T13429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.601220][T13429] Call Trace: [ 284.601227][T13429] dump_stack+0x137/0x19d [ 284.601250][T13429] should_fail+0x23c/0x250 [ 284.611890][T13423] EXT4-fs (loop5): group descriptors corrupted! [ 284.622454][T13429] __alloc_pages+0x102/0x320 [ 284.622479][T13429] alloc_pages_vma+0x391/0x660 [ 284.622499][T13429] ? page_add_new_anon_rmap+0x26d/0x2c0 [ 284.622519][T13429] wp_page_copy+0x121/0x10c0 [ 284.637196][T13415] FAT-fs (loop1): Directory bread(block 4) failed [ 284.641830][T13429] do_wp_page+0x5a8/0xba0 [ 284.641859][T13429] handle_mm_fault+0xb31/0x1a70 [ 284.652201][T13415] FAT-fs (loop1): Directory bread(block 5) failed [ 284.657793][T13429] do_user_addr_fault+0x60c/0xc00 [ 284.657828][T13429] exc_page_fault+0x94/0x230 [ 284.657851][T13429] asm_exc_page_fault+0x1e/0x30 [ 284.673003][T13415] FAT-fs (loop1): Directory bread(block 6) failed [ 284.673509][T13429] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 284.691087][T13415] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/354/file0 supports timestamps until 2107 (0x10391447e) [ 284.695244][T13429] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 284.695265][T13429] RSP: 0018:ffffc9000e86b860 EFLAGS: 00010206 [ 284.738019][T13418] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 284.748063][T13429] [ 284.748068][T13429] RAX: ffff888131b90a28 RBX: 0000000020008740 RCX: 00000000000066f8 [ 284.748084][T13429] RDX: 0000000000006fb8 RSI: ffff8881092908c0 RDI: 0000000020009000 [ 284.748094][T13429] RBP: ffff888109290000 R08: 0000000000000000 R09: 0001ffffffffffff [ 284.748106][T13429] R10: 0001888109296fb7 R11: ffff888131b90040 R12: ffffc9000e86be30 [ 284.754850][T13420] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 284.761194][T13429] R13: 00007ffffffff000 R14: 0000000000006fb8 R15: 0000000000008000 [ 284.761248][T13429] _copy_to_iter+0x1f2/0xdd0 [ 284.817519][T13429] ? check_stack_object+0x61/0x70 [ 284.823434][T13429] ? __virt_addr_valid+0x15a/0x1a0 [ 284.828717][T13429] ? __check_object_size+0x253/0x310 [ 284.834026][T13429] simple_copy_to_iter+0x4c/0x60 [ 284.839134][T13429] __skb_datagram_iter+0x23c/0x520 [ 284.844243][T13429] ? skb_copy_datagram_iter+0xc0/0xc0 [ 284.849945][T13429] skb_copy_datagram_iter+0x39/0xc0 [ 284.855398][T13429] tcp_recvmsg_locked+0xa9c/0x1700 [ 284.860769][T13429] tcp_recvmsg+0x145/0x430 [ 284.865733][T13429] ? mntput+0x45/0x70 [ 284.869978][T13429] inet_recvmsg+0xa3/0x200 [ 284.874668][T13429] ? inet_sendpage+0xc0/0xc0 [ 284.879450][T13429] ____sys_recvmsg+0x15d/0x310 [ 284.884559][T13429] ? __import_iovec+0x1ff/0x270 [ 284.889681][T13429] ? import_iovec+0x69/0x80 [ 284.894375][T13429] __sys_recvmsg+0x1d2/0x3a0 [ 284.899427][T13429] ? __cond_resched+0x11/0x40 [ 284.904547][T13429] ? fput+0x2d/0x130 [ 284.908703][T13429] ? ksys_write+0x157/0x180 [ 284.913363][T13429] __x64_sys_recvmsg+0x42/0x50 [ 284.918388][T13429] do_syscall_64+0x4a/0x90 [ 284.923171][T13429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 284.929144][T13429] RIP: 0033:0x4665d9 [ 284.933497][T13429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 284.953980][T13429] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 284.962679][T13429] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 06:32:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:03 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{0x0, 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 284.971224][T13429] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 284.979606][T13429] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 284.987979][T13429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 284.996541][T13429] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 [ 285.040011][T13439] FAULT_INJECTION: forcing a failure. [ 285.040011][T13439] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 285.053810][T13439] CPU: 0 PID: 13439 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 285.063515][T13439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.071453][T13423] loop5: detected capacity change from 0 to 131464 [ 285.074250][T13439] Call Trace: [ 285.074261][T13439] dump_stack+0x137/0x19d [ 285.074288][T13439] should_fail+0x23c/0x250 [ 285.093802][T13439] should_fail_usercopy+0x16/0x20 [ 285.098918][T13439] _copy_from_user+0x1c/0xd0 [ 285.103588][T13439] __se_sys_memfd_create+0x137/0x390 [ 285.109133][T13439] __x64_sys_memfd_create+0x2d/0x40 [ 285.114402][T13439] do_syscall_64+0x4a/0x90 [ 285.119031][T13439] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 285.126329][T13439] RIP: 0033:0x4665d9 [ 285.130257][T13439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 285.151547][T13439] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 285.160199][T13439] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 285.169602][T13439] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 [ 285.178026][T13439] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff 06:32:03 executing program 0 (fault-call:19 fault-nth:13): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080), 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 285.186560][T13439] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 285.196013][T13439] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 [ 285.248401][T13446] loop1: detected capacity change from 0 to 1 [ 285.263796][T13446] FAT-fs (loop1): Directory bread(block 3) failed [ 285.271991][T13446] FAT-fs (loop1): Directory bread(block 4) failed [ 285.278690][T13446] FAT-fs (loop1): Directory bread(block 5) failed [ 285.286584][T13446] FAT-fs (loop1): Directory bread(block 6) failed 06:32:04 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 285.287539][T13459] loop4: detected capacity change from 0 to 131456 [ 285.294470][T13446] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/355/file0 supports timestamps until 2107 (0x10391447e) [ 285.305451][T13459] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 285.316776][T13460] loop3: detected capacity change from 0 to 131456 [ 285.329340][T13423] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 285.339707][T13423] EXT4-fs (loop5): group descriptors corrupted! [ 285.342836][T13467] FAULT_INJECTION: forcing a failure. [ 285.342836][T13467] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 285.361559][T13467] CPU: 1 PID: 13467 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 285.370791][T13467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.381264][T13467] Call Trace: [ 285.384541][T13467] dump_stack+0x137/0x19d [ 285.389102][T13467] should_fail+0x23c/0x250 [ 285.393598][T13467] __alloc_pages+0x102/0x320 [ 285.398466][T13467] alloc_pages_vma+0x391/0x660 [ 285.403490][T13467] ? page_add_new_anon_rmap+0x26d/0x2c0 [ 285.409410][T13467] wp_page_copy+0x121/0x10c0 [ 285.414619][T13467] do_wp_page+0x5a8/0xba0 [ 285.419127][T13467] handle_mm_fault+0xb31/0x1a70 [ 285.424093][T13467] do_user_addr_fault+0x60c/0xc00 [ 285.429332][T13467] exc_page_fault+0x94/0x230 [ 285.434711][T13467] asm_exc_page_fault+0x1e/0x30 [ 285.439748][T13467] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 285.446566][T13467] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 285.466562][T13467] RSP: 0018:ffffc9000e8cf860 EFLAGS: 00010206 [ 285.472882][T13467] RAX: ffff8881315449e8 RBX: 0000000020008740 RCX: 00000000000056f8 [ 285.481512][T13467] RDX: 0000000000006fb8 RSI: ffff888108ae98c0 RDI: 000000002000a000 [ 285.489838][T13467] RBP: ffff888108ae8000 R08: 0000000000000000 R09: 0001ffffffffffff [ 285.498314][T13467] R10: 0001888108aeefb7 R11: ffff888131544000 R12: ffffc9000e8cfe30 [ 285.506797][T13467] R13: 00007ffffffff000 R14: 0000000000006fb8 R15: 0000000000008000 [ 285.515497][T13467] _copy_to_iter+0x1f2/0xdd0 [ 285.520300][T13467] ? check_stack_object+0x61/0x70 [ 285.526165][T13467] ? __virt_addr_valid+0x15a/0x1a0 [ 285.531634][T13467] ? __check_object_size+0x253/0x310 [ 285.537272][T13467] simple_copy_to_iter+0x4c/0x60 [ 285.542795][T13467] __skb_datagram_iter+0x23c/0x520 [ 285.548358][T13467] ? skb_copy_datagram_iter+0xc0/0xc0 [ 285.553720][T13467] skb_copy_datagram_iter+0x39/0xc0 [ 285.559577][T13467] tcp_recvmsg_locked+0xa9c/0x1700 [ 285.565010][T13467] tcp_recvmsg+0x145/0x430 [ 285.570699][T13467] ? mntput+0x45/0x70 [ 285.575078][T13467] inet_recvmsg+0xa3/0x200 [ 285.579806][T13467] ? inet_sendpage+0xc0/0xc0 [ 285.584696][T13467] ____sys_recvmsg+0x15d/0x310 [ 285.589971][T13467] ? __import_iovec+0x1ff/0x270 [ 285.595428][T13467] ? import_iovec+0x69/0x80 [ 285.599919][T13467] __sys_recvmsg+0x1d2/0x3a0 [ 285.604859][T13467] ? __cond_resched+0x11/0x40 [ 285.609710][T13467] ? fput+0x2d/0x130 [ 285.613728][T13467] ? ksys_write+0x157/0x180 [ 285.618317][T13467] __x64_sys_recvmsg+0x42/0x50 [ 285.623160][T13467] do_syscall_64+0x4a/0x90 [ 285.627844][T13467] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 285.633986][T13467] RIP: 0033:0x4665d9 [ 285.638350][T13467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 285.659644][T13467] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 285.669639][T13467] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 285.678129][T13467] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 285.686871][T13467] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 06:32:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080), 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403ff01, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 285.695311][T13467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 285.704131][T13467] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 [ 285.724955][T13460] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 285.767240][T13474] FAULT_INJECTION: forcing a failure. [ 285.767240][T13474] name failslab, interval 1, probability 0, space 0, times 0 [ 285.780329][T13474] CPU: 0 PID: 13474 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 285.789605][T13474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.800221][T13474] Call Trace: [ 285.804185][T13474] dump_stack+0x137/0x19d [ 285.809316][T13474] should_fail+0x23c/0x250 [ 285.814096][T13474] ? shmem_alloc_inode+0x22/0x30 [ 285.819635][T13474] __should_failslab+0x81/0x90 [ 285.824558][T13474] ? shmem_match+0xa0/0xa0 [ 285.829134][T13474] should_failslab+0x5/0x20 [ 285.833834][T13474] kmem_cache_alloc+0x46/0x2f0 [ 285.838580][T13474] ? do_anonymous_page+0x411/0x8b0 [ 285.843849][T13474] ? fsnotify_perm+0x59/0x2e0 [ 285.848729][T13474] ? shmem_match+0xa0/0xa0 [ 285.853143][T13474] shmem_alloc_inode+0x22/0x30 [ 285.858323][T13474] new_inode_pseudo+0x38/0x1c0 [ 285.863667][T13474] new_inode+0x21/0x120 [ 285.867970][T13474] shmem_get_inode+0xa1/0x480 [ 285.872842][T13474] __shmem_file_setup+0xf1/0x1d0 [ 285.878344][T13474] shmem_file_setup+0x37/0x40 [ 285.883060][T13474] __se_sys_memfd_create+0x1eb/0x390 [ 285.888729][T13474] __x64_sys_memfd_create+0x2d/0x40 [ 285.894479][T13474] do_syscall_64+0x4a/0x90 [ 285.899219][T13474] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 285.905558][T13474] RIP: 0033:0x4665d9 [ 285.910161][T13474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 285.932935][T13474] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 285.941922][T13474] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 285.950767][T13474] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 [ 285.959872][T13474] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff 06:32:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080), 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 285.968358][T13474] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 285.977061][T13474] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 06:32:04 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 286.041420][T13484] loop4: detected capacity change from 0 to 131456 [ 286.049291][T13483] loop1: detected capacity change from 0 to 1 [ 286.067496][T13483] FAT-fs (loop1): Directory bread(block 3) failed [ 286.074319][T13491] loop3: detected capacity change from 0 to 131456 [ 286.081652][T13484] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 286.083021][T13495] FAULT_INJECTION: forcing a failure. [ 286.083021][T13495] name failslab, interval 1, probability 0, space 0, times 0 [ 286.100307][T13483] FAT-fs (loop1): Directory bread(block 4) failed [ 286.101089][T13495] CPU: 0 PID: 13495 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 286.107693][T13483] FAT-fs (loop1): Directory bread(block 5) failed [ 286.116634][T13495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.116649][T13495] Call Trace: 06:32:04 executing program 0 (fault-call:19 fault-nth:14): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 286.116656][T13495] dump_stack+0x137/0x19d [ 286.137721][T13483] FAT-fs (loop1): Directory bread(block 6) failed [ 286.140988][T13495] should_fail+0x23c/0x250 [ 286.141010][T13495] ? security_inode_alloc+0x30/0x180 [ 286.141034][T13495] __should_failslab+0x81/0x90 [ 286.145671][T13483] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/356/file0 supports timestamps until 2107 (0x10391447e) [ 286.152040][T13495] should_failslab+0x5/0x20 [ 286.164401][T13491] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 286.167393][T13495] kmem_cache_alloc+0x46/0x2f0 [ 286.167421][T13495] security_inode_alloc+0x30/0x180 [ 286.167446][T13495] inode_init_always+0x20b/0x420 [ 286.210257][T13495] ? shmem_match+0xa0/0xa0 [ 286.215026][T13495] new_inode_pseudo+0x73/0x1c0 [ 286.220588][T13495] new_inode+0x21/0x120 [ 286.224961][T13495] shmem_get_inode+0xa1/0x480 [ 286.229900][T13495] __shmem_file_setup+0xf1/0x1d0 [ 286.235444][T13495] shmem_file_setup+0x37/0x40 [ 286.240672][T13495] __se_sys_memfd_create+0x1eb/0x390 [ 286.246463][T13495] __x64_sys_memfd_create+0x2d/0x40 [ 286.252907][T13495] do_syscall_64+0x4a/0x90 [ 286.257732][T13495] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 286.263883][T13495] RIP: 0033:0x4665d9 [ 286.268109][T13495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:32:05 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 286.289171][T13495] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 286.298814][T13495] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 286.307446][T13495] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 [ 286.315920][T13495] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff [ 286.325279][T13495] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 286.334007][T13495] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 06:32:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080), 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080), 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 286.417906][T13497] loop5: detected capacity change from 0 to 131583 [ 286.443469][T13497] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 286.453969][T13497] EXT4-fs (loop5): group descriptors corrupted! 06:32:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 286.477114][T13512] FAULT_INJECTION: forcing a failure. [ 286.477114][T13512] name failslab, interval 1, probability 0, space 0, times 0 [ 286.490146][T13512] CPU: 1 PID: 13512 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 286.499018][T13512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.509703][T13512] Call Trace: [ 286.513326][T13512] dump_stack+0x137/0x19d [ 286.514678][T13514] loop3: detected capacity change from 0 to 131456 [ 286.517867][T13512] should_fail+0x23c/0x250 [ 286.517891][T13512] ? __d_alloc+0x36/0x370 [ 286.517907][T13512] __should_failslab+0x81/0x90 [ 286.517929][T13512] should_failslab+0x5/0x20 [ 286.529009][T13513] loop4: detected capacity change from 0 to 131456 [ 286.529253][T13512] kmem_cache_alloc+0x46/0x2f0 [ 286.529281][T13512] ? kcsan_setup_watchpoint+0x26e/0x470 [ 286.560973][T13512] __d_alloc+0x36/0x370 [ 286.565138][T13512] ? current_time+0xdb/0x190 [ 286.568550][T13514] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 286.569825][T13512] d_alloc_pseudo+0x1a/0x50 [ 286.569863][T13512] alloc_file_pseudo+0x63/0x130 [ 286.569879][T13512] __shmem_file_setup+0x14c/0x1d0 [ 286.569899][T13512] shmem_file_setup+0x37/0x40 [ 286.578066][T13513] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 286.581400][T13512] __se_sys_memfd_create+0x1eb/0x390 [ 286.608963][T13512] __x64_sys_memfd_create+0x2d/0x40 [ 286.614851][T13512] do_syscall_64+0x4a/0x90 [ 286.619578][T13512] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 286.625614][T13512] RIP: 0033:0x4665d9 [ 286.629605][T13512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 286.650583][T13512] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 286.659544][T13512] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 286.667791][T13512] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 [ 286.676321][T13512] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff [ 286.684284][T13512] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 286.692616][T13512] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 [ 286.708662][T13523] FAULT_INJECTION: forcing a failure. [ 286.708662][T13523] name fail_page_alloc, interval 1, probability 0, space 0, times 0 06:32:05 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 286.722984][T13523] CPU: 1 PID: 13523 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 286.732145][T13523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.742760][T13523] Call Trace: [ 286.746161][T13523] dump_stack+0x137/0x19d [ 286.750595][T13523] should_fail+0x23c/0x250 [ 286.755469][T13523] __alloc_pages+0x102/0x320 [ 286.760766][T13523] alloc_pages_vma+0x391/0x660 [ 286.765679][T13523] ? page_add_new_anon_rmap+0x26d/0x2c0 [ 286.771519][T13523] wp_page_copy+0x121/0x10c0 [ 286.776292][T13523] do_wp_page+0x5a8/0xba0 [ 286.781052][T13523] handle_mm_fault+0xb31/0x1a70 [ 286.785984][T13523] do_user_addr_fault+0x60c/0xc00 [ 286.791013][T13523] exc_page_fault+0x94/0x230 [ 286.795712][T13523] asm_exc_page_fault+0x1e/0x30 [ 286.798456][T13528] loop1: detected capacity change from 0 to 1 [ 286.800812][T13523] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 286.812523][T13528] FAT-fs (loop1): Directory bread(block 3) failed [ 286.814508][T13523] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 286.814527][T13523] RSP: 0018:ffffc9000e95b860 EFLAGS: 00010206 [ 286.814542][T13523] RAX: ffff88815a9d5a68 RBX: 0000000020008740 RCX: 00000000000046f8 [ 286.821881][T13528] FAT-fs (loop1): Directory bread(block 4) failed [ 286.841658][T13523] RDX: 0000000000006fb8 RSI: ffff888108b8a8c0 RDI: 000000002000b000 [ 286.841674][T13523] RBP: ffff888108b88000 R08: 0000000000000000 R09: 0001ffffffffffff [ 286.841687][T13523] R10: 0001888108b8efb7 R11: ffff88815a9d5080 R12: ffffc9000e95be30 [ 286.841697][T13523] R13: 00007ffffffff000 R14: 0000000000006fb8 R15: 0000000000008000 [ 286.841712][T13523] _copy_to_iter+0x1f2/0xdd0 [ 286.848258][T13528] FAT-fs (loop1): Directory bread(block 5) failed [ 286.856582][T13523] ? check_stack_object+0x61/0x70 [ 286.863519][T13528] FAT-fs (loop1): Directory bread(block 6) failed [ 286.871335][T13523] ? __virt_addr_valid+0x15a/0x1a0 [ 286.871362][T13523] ? __check_object_size+0x253/0x310 [ 286.880086][T13528] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/357/file0 supports timestamps until 2107 (0x10391447e) [ 286.887479][T13523] simple_copy_to_iter+0x4c/0x60 [ 286.887506][T13523] __skb_datagram_iter+0x23c/0x520 [ 286.901641][T13533] loop5: detected capacity change from 0 to 131456 [ 286.906817][T13523] ? skb_copy_datagram_iter+0xc0/0xc0 [ 286.906858][T13523] skb_copy_datagram_iter+0x39/0xc0 [ 286.906876][T13523] tcp_recvmsg_locked+0xa9c/0x1700 [ 286.929863][T13534] FAULT_INJECTION: forcing a failure. [ 286.929863][T13534] name failslab, interval 1, probability 0, space 0, times 0 [ 286.944416][T13523] ? init_wait_entry+0x30/0x30 [ 286.944443][T13523] tcp_recvmsg+0x145/0x430 [ 287.000579][T13523] ? mntput+0x45/0x70 [ 287.004641][T13523] inet_recvmsg+0xa3/0x200 [ 287.009235][T13523] ? inet_sendpage+0xc0/0xc0 [ 287.013812][T13523] ____sys_recvmsg+0x15d/0x310 [ 287.018911][T13523] ? __import_iovec+0x1ff/0x270 [ 287.024028][T13523] ? import_iovec+0x69/0x80 [ 287.028985][T13523] __sys_recvmsg+0x1d2/0x3a0 [ 287.033661][T13523] ? __cond_resched+0x11/0x40 [ 287.038421][T13523] ? fput+0x2d/0x130 [ 287.043179][T13523] ? ksys_write+0x157/0x180 [ 287.047910][T13523] __x64_sys_recvmsg+0x42/0x50 [ 287.053194][T13523] do_syscall_64+0x4a/0x90 [ 287.058561][T13523] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 287.064934][T13523] RIP: 0033:0x4665d9 [ 287.069594][T13523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 287.090365][T13523] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 287.099523][T13523] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 287.107655][T13523] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 287.115796][T13523] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 287.125759][T13523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 287.133895][T13523] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 [ 287.142299][T13534] CPU: 0 PID: 13534 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 287.151376][T13534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.151557][T13533] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 287.162144][T13534] Call Trace: [ 287.162155][T13534] dump_stack+0x137/0x19d [ 287.162181][T13534] should_fail+0x23c/0x250 [ 287.172891][T13533] EXT4-fs (loop5): group descriptors corrupted! [ 287.176438][T13534] ? __alloc_file+0x2e/0x1a0 [ 287.196570][T13534] __should_failslab+0x81/0x90 [ 287.201433][T13534] should_failslab+0x5/0x20 [ 287.206112][T13534] kmem_cache_alloc+0x46/0x2f0 [ 287.211170][T13534] ? inode_doinit_with_dentry+0x382/0x950 [ 287.217197][T13534] __alloc_file+0x2e/0x1a0 [ 287.222304][T13534] alloc_empty_file+0xcd/0x1c0 [ 287.227160][T13534] alloc_file+0x3a/0x280 [ 287.231499][T13534] alloc_file_pseudo+0xe2/0x130 [ 287.236394][T13534] __shmem_file_setup+0x14c/0x1d0 [ 287.241524][T13534] shmem_file_setup+0x37/0x40 [ 287.246804][T13534] __se_sys_memfd_create+0x1eb/0x390 [ 287.252917][T13534] __x64_sys_memfd_create+0x2d/0x40 [ 287.258423][T13534] do_syscall_64+0x4a/0x90 [ 287.263094][T13534] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 287.269164][T13534] RIP: 0033:0x4665d9 [ 287.273132][T13534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 287.293719][T13534] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 287.302648][T13534] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 287.310792][T13534] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 [ 287.319243][T13534] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff 06:32:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080), 0x0, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x4, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 287.327559][T13534] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 287.335701][T13534] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 06:32:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:06 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:06 executing program 0 (fault-call:19 fault-nth:15): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 287.402279][T13550] loop1: detected capacity change from 0 to 1 [ 287.416848][T13550] FAT-fs (loop1): Directory bread(block 3) failed [ 287.434173][T13552] loop4: detected capacity change from 0 to 131456 [ 287.443368][T13550] FAT-fs (loop1): Directory bread(block 4) failed [ 287.454286][T13552] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 287.456097][T13564] FAULT_INJECTION: forcing a failure. [ 287.456097][T13564] name failslab, interval 1, probability 0, space 0, times 0 [ 287.462215][T13550] FAT-fs (loop1): Directory bread(block 5) failed [ 287.474745][T13564] CPU: 1 PID: 13564 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 287.481422][T13550] FAT-fs (loop1): Directory bread(block 6) failed [ 287.490664][T13564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.490677][T13564] Call Trace: [ 287.490683][T13564] dump_stack+0x137/0x19d [ 287.515830][T13564] should_fail+0x23c/0x250 [ 287.519703][T13550] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/358/file0 supports timestamps until 2107 (0x10391447e) [ 287.520545][T13564] ? security_file_alloc+0x30/0x190 [ 287.535670][T13566] loop3: detected capacity change from 0 to 131456 [ 287.540970][T13564] __should_failslab+0x81/0x90 [ 287.540998][T13564] should_failslab+0x5/0x20 [ 287.552015][T13566] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 287.552359][T13564] kmem_cache_alloc+0x46/0x2f0 [ 287.569494][T13564] security_file_alloc+0x30/0x190 [ 287.575385][T13564] __alloc_file+0x83/0x1a0 [ 287.580753][T13564] alloc_empty_file+0xcd/0x1c0 [ 287.586540][T13564] alloc_file+0x3a/0x280 [ 287.590869][T13564] alloc_file_pseudo+0xe2/0x130 [ 287.596178][T13564] __shmem_file_setup+0x14c/0x1d0 [ 287.601373][T13564] shmem_file_setup+0x37/0x40 [ 287.606176][T13564] __se_sys_memfd_create+0x1eb/0x390 [ 287.611858][T13564] __x64_sys_memfd_create+0x2d/0x40 [ 287.617138][T13564] do_syscall_64+0x4a/0x90 [ 287.621794][T13564] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 287.628298][T13564] RIP: 0033:0x4665d9 [ 287.632343][T13564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:32:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 287.653827][T13564] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 287.662672][T13564] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 287.671716][T13564] RDX: 00000000000003c8 RSI: 0000000000000000 RDI: 00000000004bee66 [ 287.679781][T13564] RBP: 0000000000000002 R08: 00000000000001e4 R09: ffffffffffffffff [ 287.688140][T13564] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 06:32:06 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 287.696643][T13564] R13: 00000000200001c0 R14: 00000000000003c8 R15: 00000000200004c0 [ 287.707636][T13571] FAULT_INJECTION: forcing a failure. [ 287.707636][T13571] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 287.721280][T13571] CPU: 0 PID: 13571 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 287.731137][T13571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.742095][T13571] Call Trace: [ 287.745740][T13571] dump_stack+0x137/0x19d [ 287.750609][T13571] should_fail+0x23c/0x250 [ 287.755643][T13571] __alloc_pages+0x102/0x320 [ 287.760366][T13571] alloc_pages_vma+0x391/0x660 [ 287.765389][T13571] ? page_add_new_anon_rmap+0x26d/0x2c0 [ 287.771240][T13571] wp_page_copy+0x121/0x10c0 [ 287.776086][T13571] do_wp_page+0x5a8/0xba0 [ 287.780523][T13571] handle_mm_fault+0xb31/0x1a70 [ 287.785668][T13571] do_user_addr_fault+0x60c/0xc00 [ 287.790714][T13571] exc_page_fault+0x94/0x230 [ 287.795572][T13571] asm_exc_page_fault+0x1e/0x30 [ 287.800508][T13571] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 287.807549][T13571] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 287.828845][T13571] RSP: 0018:ffffc9000ea7f860 EFLAGS: 00010206 [ 287.835632][T13571] RAX: ffff888108969a68 RBX: 0000000020008740 RCX: 00000000000036f8 [ 287.844023][T13571] RDX: 0000000000006fb8 RSI: ffff888131a2b8c0 RDI: 000000002000c000 [ 287.852280][T13571] RBP: ffff888131a28000 R08: 0000000000000000 R09: 0001ffffffffffff [ 287.861168][T13571] R10: 0001888131a2efb7 R11: ffff888108969080 R12: ffffc9000ea7fe30 [ 287.869990][T13571] R13: 00007ffffffff000 R14: 0000000000006fb8 R15: 0000000000008000 [ 287.880182][T13571] _copy_to_iter+0x1f2/0xdd0 [ 287.885146][T13571] ? check_stack_object+0x61/0x70 [ 287.890808][T13571] ? __virt_addr_valid+0x15a/0x1a0 [ 287.896179][T13571] ? __check_object_size+0x253/0x310 [ 287.903286][T13571] simple_copy_to_iter+0x4c/0x60 [ 287.908794][T13571] __skb_datagram_iter+0x23c/0x520 [ 287.913904][T13571] ? skb_copy_datagram_iter+0xc0/0xc0 [ 287.919324][T13571] skb_copy_datagram_iter+0x39/0xc0 [ 287.924917][T13571] tcp_recvmsg_locked+0xa9c/0x1700 [ 287.930301][T13571] tcp_recvmsg+0x145/0x430 [ 287.934818][T13571] ? mntput+0x45/0x70 [ 287.939118][T13571] inet_recvmsg+0xa3/0x200 [ 287.945021][T13571] ? inet_sendpage+0xc0/0xc0 [ 287.949812][T13571] ____sys_recvmsg+0x15d/0x310 [ 287.954882][T13571] ? __import_iovec+0x1ff/0x270 [ 287.960159][T13571] ? import_iovec+0x69/0x80 [ 287.964898][T13571] __sys_recvmsg+0x1d2/0x3a0 [ 287.970503][T13571] ? __cond_resched+0x11/0x40 [ 287.975886][T13571] ? fput+0x2d/0x130 [ 287.980409][T13571] ? ksys_write+0x157/0x180 [ 287.985104][T13571] __x64_sys_recvmsg+0x42/0x50 [ 287.990123][T13571] do_syscall_64+0x4a/0x90 [ 287.995585][T13571] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.001958][T13571] RIP: 0033:0x4665d9 [ 288.005942][T13571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 288.027468][T13571] RSP: 002b:00007fb47a216188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 288.036490][T13571] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665d9 [ 288.044825][T13571] RDX: 0000000000000700 RSI: 0000000020000580 RDI: 0000000000000003 [ 288.053886][T13571] RBP: 00007fb47a2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 288.062616][T13571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 288.072011][T13571] R13: 00007ffc2e06d10f R14: 00007fb47a216300 R15: 0000000000022000 06:32:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f0000000100"/31, 0x1f, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 288.131583][T13580] loop5: detected capacity change from 0 to 131456 [ 288.132923][T13583] FAULT_INJECTION: forcing a failure. [ 288.132923][T13583] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 288.152514][T13583] CPU: 0 PID: 13583 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 288.161392][T13583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.172053][T13583] Call Trace: [ 288.172175][T13584] loop1: detected capacity change from 0 to 1 [ 288.175349][T13583] dump_stack+0x137/0x19d [ 288.175374][T13583] should_fail+0x23c/0x250 [ 288.191872][T13583] __alloc_pages+0x102/0x320 [ 288.194542][T13584] FAT-fs (loop1): Directory bread(block 3) failed [ 288.197174][T13583] alloc_pages_vma+0x391/0x660 [ 288.197198][T13583] shmem_getpage_gfp+0x980/0x1410 [ 288.197221][T13583] ? mls_context_isvalid+0x76/0x1e0 [ 288.209375][T13584] FAT-fs (loop1): Directory bread(block 4) failed [ 288.214901][T13583] shmem_write_begin+0x7e/0x100 [ 288.214931][T13583] generic_perform_write+0x196/0x3a0 [ 288.220431][T13584] FAT-fs (loop1): Directory bread(block 5) failed [ 288.227014][T13583] ? file_update_time+0x1bd/0x3e0 [ 288.227040][T13583] __generic_file_write_iter+0x161/0x300 [ 288.233983][T13584] FAT-fs (loop1): Directory bread(block 6) failed [ 288.238419][T13583] ? generic_write_checks+0x250/0x290 [ 288.238443][T13583] generic_file_write_iter+0x75/0x130 [ 288.238466][T13583] vfs_write+0x69d/0x770 [ 288.247134][T13584] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/359/file0 supports timestamps until 2107 (0x10391447e) [ 288.251863][T13583] __x64_sys_pwrite64+0xf5/0x150 [ 288.251888][T13583] do_syscall_64+0x4a/0x90 [ 288.261710][T13591] loop4: detected capacity change from 0 to 131456 [ 288.264975][T13583] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.265021][T13583] RIP: 0033:0x419777 [ 288.265035][T13583] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 288.265050][T13583] RSP: 002b:00007faddd5a6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 288.265065][T13583] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 288.265075][T13583] RDX: 0000000000000017 RSI: 0000000020000080 RDI: 0000000000000004 [ 288.265084][T13583] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff 06:32:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x7, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 288.265098][T13583] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 288.273215][T13590] loop3: detected capacity change from 0 to 131456 [ 288.276492][T13583] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 288.279282][T13580] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 288.339016][T13591] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 288.343381][T13580] EXT4-fs (loop5): group descriptors corrupted! [ 288.353237][T13590] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 06:32:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f0000000100"/31, 0x1f, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 288.433041][T13583] loop2: detected capacity change from 0 to 1 06:32:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 288.480496][T13583] FAT-fs (loop2): bogus number of reserved sectors [ 288.487323][T13583] FAT-fs (loop2): Can't find a valid FAT filesystem [ 288.516723][T13610] loop5: detected capacity change from 0 to 131456 [ 288.525161][T13614] loop4: detected capacity change from 0 to 131456 [ 288.532330][T13616] loop1: detected capacity change from 0 to 1 [ 288.539360][T13610] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 288.545561][T13614] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 288.550087][T13610] EXT4-fs (loop5): group descriptors corrupted! [ 288.559489][T13616] FAT-fs (loop1): Directory bread(block 3) failed [ 288.569960][T13616] FAT-fs (loop1): Directory bread(block 4) failed [ 288.570875][T13625] loop3: detected capacity change from 0 to 131456 [ 288.576784][T13616] FAT-fs (loop1): Directory bread(block 5) failed [ 288.591262][T13616] FAT-fs (loop1): Directory bread(block 6) failed [ 288.600873][T13616] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/360/file0 supports timestamps until 2107 (0x10391447e) 06:32:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0xa, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:07 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000", 0x2c, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 288.626373][T13625] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 06:32:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xa, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f0000000100"/31, 0x1f, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 288.696302][T13642] FAULT_INJECTION: forcing a failure. [ 288.696302][T13642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 288.700810][T13644] loop4: detected capacity change from 0 to 131456 [ 288.710178][T13642] CPU: 1 PID: 13642 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 288.725671][T13642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.735938][T13642] Call Trace: [ 288.739311][T13642] dump_stack+0x137/0x19d [ 288.744848][T13642] should_fail+0x23c/0x250 [ 288.749692][T13642] should_fail_usercopy+0x16/0x20 [ 288.753380][T13644] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 288.754828][T13642] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 288.768277][T13642] ? shmem_write_begin+0x7e/0x100 [ 288.769799][T13641] loop5: detected capacity change from 0 to 131456 [ 288.773318][T13642] generic_perform_write+0x1e4/0x3a0 [ 288.785629][T13642] ? file_update_time+0x1bd/0x3e0 [ 288.790984][T13642] __generic_file_write_iter+0x161/0x300 [ 288.796820][T13642] ? generic_write_checks+0x250/0x290 [ 288.803165][T13642] generic_file_write_iter+0x75/0x130 [ 288.808476][T13641] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 288.808739][T13642] vfs_write+0x69d/0x770 [ 288.808761][T13642] __x64_sys_pwrite64+0xf5/0x150 [ 288.818999][T13641] EXT4-fs (loop5): group descriptors corrupted! [ 288.823472][T13642] do_syscall_64+0x4a/0x90 [ 288.840161][T13642] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.846535][T13642] RIP: 0033:0x419777 [ 288.850828][T13642] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 288.872338][T13642] RSP: 002b:00007faddd5a6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 288.881044][T13642] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 288.890417][T13642] RDX: 0000000000000017 RSI: 0000000020000080 RDI: 0000000000000004 [ 288.898902][T13642] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 288.907492][T13642] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 288.915987][T13642] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 288.932401][T13646] loop3: detected capacity change from 0 to 131456 [ 288.948867][T13646] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 288.956583][T13655] loop1: detected capacity change from 0 to 1 [ 288.963756][T13642] loop2: detected capacity change from 0 to 1 [ 288.964006][T13641] loop5: detected capacity change from 0 to 131456 [ 288.978227][T13641] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 288.988543][T13641] EXT4-fs (loop5): group descriptors corrupted! 06:32:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f465", 0x2f, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000", 0x2c, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 288.995445][T13642] FAT-fs (loop2): Directory bread(block 3) failed [ 288.999521][T13655] FAT-fs (loop1): Directory bread(block 3) failed [ 289.002841][T13642] FAT-fs (loop2): Directory bread(block 4) failed [ 289.002858][T13642] FAT-fs (loop2): Directory bread(block 5) failed [ 289.022444][T13655] FAT-fs (loop1): Directory bread(block 4) failed [ 289.024085][T13642] FAT-fs (loop2): Directory bread(block 6) failed [ 289.032692][T13655] FAT-fs (loop1): Directory bread(block 5) failed [ 289.038017][T13642] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/272/file0 supports timestamps until 2107 (0x10391447e) [ 289.043877][T13655] FAT-fs (loop1): Directory bread(block 6) failed [ 289.066609][T13655] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/361/file0 supports timestamps until 2107 (0x10391447e) 06:32:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x10, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:07 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 289.153932][T13680] loop3: detected capacity change from 0 to 131456 [ 289.162512][T13677] loop4: detected capacity change from 0 to 131456 [ 289.162787][T13683] loop5: detected capacity change from 0 to 131456 [ 289.181050][T13677] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 289.183034][T13683] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 289.189289][T13680] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 289.198725][T13683] EXT4-fs (loop5): group descriptors corrupted! [ 289.268246][T13683] loop5: detected capacity change from 0 to 131456 [ 289.277871][T13683] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 289.288960][T13683] EXT4-fs (loop5): group descriptors corrupted! [ 289.312864][T13702] FAULT_INJECTION: forcing a failure. [ 289.312864][T13702] name failslab, interval 1, probability 0, space 0, times 0 [ 289.326422][T13702] CPU: 0 PID: 13702 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 289.327344][T13701] loop1: detected capacity change from 0 to 1 [ 289.335326][T13702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.335349][T13702] Call Trace: [ 289.335356][T13702] dump_stack+0x137/0x19d [ 289.335380][T13702] should_fail+0x23c/0x250 [ 289.352393][T13701] FAT-fs (loop1): Directory bread(block 3) failed [ 289.352426][T13702] ? getname_flags+0x84/0x3d0 [ 289.355994][T13701] FAT-fs (loop1): Directory bread(block 4) failed [ 289.360635][T13702] __should_failslab+0x81/0x90 [ 289.360662][T13702] should_failslab+0x5/0x20 [ 289.365231][T13701] FAT-fs (loop1): Directory bread(block 5) failed [ 289.371559][T13702] kmem_cache_alloc+0x46/0x2f0 [ 289.376403][T13701] FAT-fs (loop1): Directory bread(block 6) failed [ 289.383093][T13702] getname_flags+0x84/0x3d0 06:32:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000", 0x2c, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f465", 0x2f, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2e, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xc, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 289.388328][T13701] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/362/file0 supports timestamps until 2107 (0x10391447e) [ 289.392782][T13702] ? vfs_write+0x50c/0x770 [ 289.434872][T13702] getname+0x15/0x20 [ 289.438841][T13702] do_sys_openat2+0x5b/0x250 [ 289.443616][T13702] __x64_sys_openat+0xef/0x110 [ 289.448391][T13702] do_syscall_64+0x4a/0x90 [ 289.453349][T13702] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 289.459356][T13702] RIP: 0033:0x4196c4 [ 289.463753][T13702] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 289.485379][T13702] RSP: 002b:00007faddd5a6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 289.493936][T13702] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 289.502318][T13702] RDX: 0000000000000002 RSI: 00007faddd5a7000 RDI: 00000000ffffff9c 06:32:08 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 289.511709][T13702] RBP: 00007faddd5a7000 R08: 0000000000000000 R09: ffffffffffffffff [ 289.520195][T13702] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 289.529501][T13702] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 289.551652][T13713] loop5: detected capacity change from 0 to 131456 [ 289.564126][T13714] loop4: detected capacity change from 0 to 131456 [ 289.577022][T13709] loop3: detected capacity change from 0 to 131456 [ 289.598255][T13714] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 289.616414][T13732] FAULT_INJECTION: forcing a failure. [ 289.616414][T13732] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.630920][T13732] CPU: 1 PID: 13732 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 289.634981][T13727] loop1: detected capacity change from 0 to 1 [ 289.639932][T13732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.639956][T13732] Call Trace: [ 289.639963][T13732] dump_stack+0x137/0x19d [ 289.654703][T13713] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 289.656728][T13732] should_fail+0x23c/0x250 [ 289.656751][T13732] should_fail_usercopy+0x16/0x20 [ 289.660098][T13713] EXT4-fs (loop5): group descriptors corrupted! [ 289.664588][T13732] strncpy_from_user+0x21/0x250 [ 289.680865][T13727] FAT-fs (loop1): Directory bread(block 3) failed [ 289.685055][T13732] getname_flags+0xb8/0x3d0 [ 289.685079][T13732] ? vfs_write+0x50c/0x770 [ 289.685093][T13732] getname+0x15/0x20 [ 289.685108][T13732] do_sys_openat2+0x5b/0x250 [ 289.692456][T13727] FAT-fs (loop1): Directory bread(block 4) failed [ 289.696575][T13732] __x64_sys_openat+0xef/0x110 [ 289.696601][T13732] do_syscall_64+0x4a/0x90 [ 289.696621][T13732] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 289.696642][T13732] RIP: 0033:0x4196c4 [ 289.696655][T13732] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 06:32:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x64, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:08 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 289.704661][T13727] FAT-fs (loop1): Directory bread(block 5) failed [ 289.707810][T13732] RSP: 002b:00007faddd5a6ed0 EFLAGS: 00000293 [ 289.712755][T13727] FAT-fs (loop1): Directory bread(block 6) failed [ 289.716385][T13732] ORIG_RAX: 0000000000000101 [ 289.716393][T13732] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 289.716406][T13732] RDX: 0000000000000002 RSI: 00007faddd5a7000 RDI: 00000000ffffff9c [ 289.716418][T13732] RBP: 00007faddd5a7000 R08: 0000000000000000 R09: ffffffffffffffff 06:32:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f465", 0x2f, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xd, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 289.716429][T13732] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 289.716441][T13732] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 289.723013][T13727] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/363/file0 supports timestamps until 2107 (0x10391447e) [ 289.809230][T13709] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 289.817428][T13736] FAULT_INJECTION: forcing a failure. [ 289.817428][T13736] name failslab, interval 1, probability 0, space 0, times 0 [ 289.869816][T13736] CPU: 0 PID: 13736 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 289.878760][T13736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.889006][T13736] Call Trace: [ 289.889596][T13742] loop4: detected capacity change from 0 to 131456 [ 289.892332][T13736] dump_stack+0x137/0x19d [ 289.892358][T13736] should_fail+0x23c/0x250 [ 289.908068][T13736] ? __alloc_file+0x2e/0x1a0 [ 289.913486][T13736] __should_failslab+0x81/0x90 [ 289.918412][T13736] should_failslab+0x5/0x20 [ 289.919610][T13742] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 289.923112][T13736] kmem_cache_alloc+0x46/0x2f0 [ 289.923140][T13736] __alloc_file+0x2e/0x1a0 [ 289.940512][T13736] alloc_empty_file+0xcd/0x1c0 [ 289.945373][T13736] path_openat+0x6a/0x20b0 [ 289.950618][T13736] ? avc_has_perm_noaudit+0x19a/0x240 [ 289.956406][T13736] ? avc_has_perm+0x59/0x150 [ 289.961903][T13736] ? avc_has_perm+0xc8/0x150 [ 289.967237][T13736] do_filp_open+0xd9/0x1f0 [ 289.972191][T13736] ? __virt_addr_valid+0x15a/0x1a0 [ 289.978208][T13736] ? __check_object_size+0x253/0x310 [ 289.984245][T13736] ? _find_next_bit+0x16a/0x190 [ 289.989205][T13736] ? alloc_fd+0x388/0x3e0 [ 289.993616][T13736] do_sys_openat2+0xa3/0x250 [ 289.998955][T13736] __x64_sys_openat+0xef/0x110 [ 290.003987][T13736] do_syscall_64+0x4a/0x90 [ 290.009595][T13736] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 290.015604][T13736] RIP: 0033:0x4196c4 [ 290.019949][T13736] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 290.041973][T13736] RSP: 002b:00007faddd5a6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 290.051114][T13736] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 290.059247][T13736] RDX: 0000000000000002 RSI: 00007faddd5a7000 RDI: 00000000ffffff9c [ 290.067728][T13736] RBP: 00007faddd5a7000 R08: 0000000000000000 R09: ffffffffffffffff [ 290.075894][T13736] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 290.084028][T13736] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 06:32:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff", 0x37, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:08 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 290.162601][T13754] loop5: detected capacity change from 0 to 131456 [ 290.164486][T13757] loop1: detected capacity change from 0 to 1 [ 290.177322][T13760] loop4: detected capacity change from 0 to 131456 [ 290.179685][T13757] FAT-fs (loop1): Directory bread(block 3) failed [ 290.189901][T13754] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 290.201607][T13754] EXT4-fs (loop5): group descriptors corrupted! [ 290.205649][T13763] FAULT_INJECTION: forcing a failure. [ 290.205649][T13763] name failslab, interval 1, probability 0, space 0, times 0 [ 290.218566][T13760] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 290.220884][T13763] CPU: 0 PID: 13763 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 290.232514][T13757] FAT-fs (loop1): Directory bread(block 4) failed [ 290.237197][T13763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.237210][T13763] Call Trace: [ 290.237217][T13763] dump_stack+0x137/0x19d [ 290.245199][T13757] FAT-fs (loop1): Directory bread(block 5) failed [ 290.256358][T13763] should_fail+0x23c/0x250 [ 290.256385][T13763] ? security_file_alloc+0x30/0x190 [ 290.256408][T13763] __should_failslab+0x81/0x90 [ 290.256460][T13763] should_failslab+0x5/0x20 [ 290.260095][T13757] FAT-fs (loop1): Directory bread(block 6) failed [ 290.264298][T13763] kmem_cache_alloc+0x46/0x2f0 [ 290.264322][T13763] security_file_alloc+0x30/0x190 06:32:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f465", 0x33, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 290.272911][T13757] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/364/file0 supports timestamps until 2107 (0x10391447e) [ 290.275500][T13763] __alloc_file+0x83/0x1a0 [ 290.328941][T13763] alloc_empty_file+0xcd/0x1c0 [ 290.333988][T13763] path_openat+0x6a/0x20b0 [ 290.338526][T13763] ? avc_has_perm_noaudit+0x19a/0x240 [ 290.344172][T13763] ? avc_has_perm+0x59/0x150 [ 290.349378][T13763] ? avc_has_perm+0xc8/0x150 [ 290.353955][T13763] do_filp_open+0xd9/0x1f0 [ 290.358383][T13763] ? __virt_addr_valid+0x15a/0x1a0 [ 290.363982][T13763] ? __check_object_size+0x253/0x310 [ 290.369423][T13763] ? _find_next_bit+0x16a/0x190 [ 290.374348][T13763] ? alloc_fd+0x388/0x3e0 [ 290.379039][T13763] do_sys_openat2+0xa3/0x250 [ 290.383998][T13763] __x64_sys_openat+0xef/0x110 [ 290.389146][T13763] do_syscall_64+0x4a/0x90 [ 290.393652][T13763] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 290.399888][T13763] RIP: 0033:0x4196c4 [ 290.404207][T13763] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 290.425708][T13763] RSP: 002b:00007faddd5a6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 290.434546][T13763] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 290.443292][T13763] RDX: 0000000000000002 RSI: 00007faddd5a7000 RDI: 00000000ffffff9c [ 290.453272][T13763] RBP: 00007faddd5a7000 R08: 0000000000000000 R09: ffffffffffffffff 06:32:09 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 290.461647][T13763] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 290.470999][T13763] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 06:32:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff", 0x37, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 290.509642][T13754] loop5: detected capacity change from 0 to 131456 [ 290.522946][T13779] FAULT_INJECTION: forcing a failure. [ 290.522946][T13779] name failslab, interval 1, probability 0, space 0, times 0 [ 290.536028][T13779] CPU: 1 PID: 13779 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 290.545057][T13779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.546048][T13773] loop3: detected capacity change from 0 to 131456 [ 290.555761][T13779] Call Trace: [ 290.555772][T13779] dump_stack+0x137/0x19d [ 290.555798][T13779] should_fail+0x23c/0x250 [ 290.574951][T13779] ? loop_set_status_from_info+0x3a0/0x3a0 [ 290.580951][T13779] __should_failslab+0x81/0x90 [ 290.586010][T13779] ? __kthread_create_on_node+0x7a/0x290 [ 290.587400][T13754] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 290.591847][T13779] should_failslab+0x5/0x20 06:32:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xe, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x10e, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 290.591878][T13779] kmem_cache_alloc_trace+0x49/0x310 [ 290.603010][T13754] EXT4-fs (loop5): group descriptors corrupted! [ 290.607754][T13779] ? loop_set_status_from_info+0x3a0/0x3a0 [ 290.625573][T13779] __kthread_create_on_node+0x7a/0x290 [ 290.631165][T13779] ? __cond_resched+0x11/0x40 [ 290.635851][T13779] ? __blkdev_get+0x8c/0x6c0 [ 290.640538][T13779] ? loop_set_status_from_info+0x3a0/0x3a0 [ 290.646568][T13779] kthread_create_on_node+0x72/0xa0 [ 290.651887][T13779] loop_configure+0x597/0xcb0 [ 290.657532][T13786] loop4: detected capacity change from 0 to 131456 [ 290.657551][T13779] ? mntput+0x45/0x70 [ 290.668477][T13779] lo_ioctl+0x555/0x11f0 [ 290.672731][T13779] ? path_openat+0x19ab/0x20b0 [ 290.677678][T13779] ? putname+0xa5/0xc0 [ 290.682281][T13779] ? ___cache_free+0x3c/0x300 [ 290.687277][T13779] ? blkdev_common_ioctl+0x9c3/0x1040 [ 290.693164][T13779] ? selinux_file_ioctl+0x8e0/0x970 [ 290.698481][T13779] ? lo_release+0x120/0x120 [ 290.703168][T13779] blkdev_ioctl+0x1d0/0x3c0 [ 290.708309][T13779] block_ioctl+0x6d/0x80 [ 290.712846][T13779] ? blkdev_iopoll+0x70/0x70 [ 290.717657][T13779] __se_sys_ioctl+0xcb/0x140 [ 290.722533][T13779] __x64_sys_ioctl+0x3f/0x50 [ 290.727303][T13779] do_syscall_64+0x4a/0x90 [ 290.732421][T13779] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 290.739140][T13779] RIP: 0033:0x466397 [ 290.743374][T13779] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 290.764282][T13779] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 290.774099][T13779] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 290.783127][T13779] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 290.791593][T13779] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 290.799580][T13779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 06:32:09 executing program 2 (fault-call:0 fault-nth:14): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f465", 0x33, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 290.808083][T13779] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 290.825969][T13773] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 290.834385][T13786] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 06:32:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff", 0x37, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 290.895034][T13802] loop1: detected capacity change from 0 to 1 [ 290.904281][T13806] FAULT_INJECTION: forcing a failure. [ 290.904281][T13806] name failslab, interval 1, probability 0, space 0, times 0 [ 290.904705][T13805] loop5: detected capacity change from 0 to 131456 [ 290.918191][T13806] CPU: 1 PID: 13806 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 290.934051][T13806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.944920][T13806] Call Trace: [ 290.948518][T13806] dump_stack+0x137/0x19d [ 290.953157][T13806] should_fail+0x23c/0x250 [ 290.957889][T13806] ? __kernfs_new_node+0x6a/0x330 [ 290.963329][T13806] __should_failslab+0x81/0x90 [ 290.968284][T13806] should_failslab+0x5/0x20 [ 290.973084][T13806] kmem_cache_alloc+0x46/0x2f0 [ 290.978455][T13806] ? kvm_sched_clock_read+0xd/0x20 [ 290.984426][T13806] __kernfs_new_node+0x6a/0x330 [ 290.989604][T13806] ? select_task_rq_fair+0x186/0xc00 [ 290.995853][T13806] ? rb_insert_color+0x7e/0x310 [ 291.002077][T13806] kernfs_create_dir_ns+0x5e/0x140 [ 291.007817][T13806] internal_create_group+0x138/0x850 [ 291.013735][T13806] ? check_preempt_wakeup+0x1bb/0x360 [ 291.019365][T13806] sysfs_create_group+0x1b/0x20 [ 291.024717][T13806] loop_configure+0xa21/0xcb0 [ 291.029648][T13806] lo_ioctl+0x555/0x11f0 [ 291.035037][T13806] ? path_openat+0x19ab/0x20b0 [ 291.040394][T13806] ? putname+0xa5/0xc0 [ 291.044905][T13806] ? ___cache_free+0x3c/0x300 [ 291.050172][T13806] ? blkdev_common_ioctl+0x9c3/0x1040 [ 291.055582][T13806] ? selinux_file_ioctl+0x8e0/0x970 [ 291.061262][T13806] ? lo_release+0x120/0x120 [ 291.066666][T13806] blkdev_ioctl+0x1d0/0x3c0 [ 291.071614][T13806] block_ioctl+0x6d/0x80 [ 291.076465][T13806] ? blkdev_iopoll+0x70/0x70 [ 291.081846][T13806] __se_sys_ioctl+0xcb/0x140 [ 291.087189][T13806] __x64_sys_ioctl+0x3f/0x50 [ 291.092375][T13806] do_syscall_64+0x4a/0x90 [ 291.097057][T13806] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 291.103853][T13806] RIP: 0033:0x466397 [ 291.107820][T13806] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 291.131118][T13806] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.141230][T13806] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 291.149947][T13806] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 291.158644][T13806] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 291.167946][T13806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 291.176202][T13806] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 291.184597][T13806] loop2: detected capacity change from 0 to 1 [ 291.193676][T13802] FAT-fs (loop1): Directory bread(block 3) failed [ 291.200725][T13806] FAT-fs (loop2): Directory bread(block 3) failed [ 291.206436][T13805] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 291.208365][T13802] FAT-fs (loop1): Directory bread(block 4) failed [ 291.218933][T13805] EXT4-fs (loop5): group descriptors corrupted! [ 291.236366][T13806] FAT-fs (loop2): Directory bread(block 4) failed [ 291.267199][T13806] FAT-fs (loop2): Directory bread(block 5) failed [ 291.275307][T13818] loop3: detected capacity change from 0 to 131456 [ 291.282766][T13819] loop4: detected capacity change from 0 to 131456 [ 291.289632][T13802] FAT-fs (loop1): Directory bread(block 5) failed [ 291.290172][T13818] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 291.297589][T13806] FAT-fs (loop2): Directory bread(block 6) failed [ 291.308696][T13802] FAT-fs (loop1): Directory bread(block 6) failed 06:32:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f465", 0x33, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01", 0x3b, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 291.318485][T13819] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 291.342212][T13802] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/365/file0 supports timestamps until 2107 (0x10391447e) 06:32:10 executing program 2 (fault-call:0 fault-nth:15): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 291.357728][T13806] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/278/file0 supports timestamps until 2107 (0x10391447e) [ 291.383720][T13805] loop5: detected capacity change from 0 to 131456 [ 291.417309][T13805] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 291.427976][T13805] EXT4-fs (loop5): group descriptors corrupted! [ 291.450819][T13837] loop4: detected capacity change from 0 to 131456 [ 291.450867][T13838] loop3: detected capacity change from 0 to 131456 06:32:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x5, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xf, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x388, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 291.459849][T13839] FAULT_INJECTION: forcing a failure. [ 291.459849][T13839] name failslab, interval 1, probability 0, space 0, times 0 [ 291.467851][T13838] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 291.478322][T13839] CPU: 1 PID: 13839 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 291.494496][T13839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.499651][T13837] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 291.505369][T13839] Call Trace: [ 291.505380][T13839] dump_stack+0x137/0x19d [ 291.505403][T13839] should_fail+0x23c/0x250 [ 291.515812][T13837] EXT4-fs (loop4): group descriptors corrupted! [ 291.519246][T13839] ? __kernfs_new_node+0x6a/0x330 [ 291.540212][T13839] __should_failslab+0x81/0x90 [ 291.545807][T13839] should_failslab+0x5/0x20 [ 291.550384][T13839] kmem_cache_alloc+0x46/0x2f0 [ 291.555753][T13839] ? __cond_resched+0x11/0x40 [ 291.560768][T13839] __kernfs_new_node+0x6a/0x330 [ 291.565787][T13839] ? idr_alloc_cyclic+0x249/0x2d0 [ 291.571063][T13839] ? rb_insert_color+0x7e/0x310 [ 291.576448][T13839] kernfs_new_node+0x5b/0xd0 [ 291.581937][T13839] __kernfs_create_file+0x45/0x1a0 [ 291.587326][T13839] sysfs_add_file_mode_ns+0x1c1/0x250 [ 291.592706][T13839] internal_create_group+0x2e4/0x850 [ 291.598183][T13839] sysfs_create_group+0x1b/0x20 [ 291.603663][T13839] loop_configure+0xa21/0xcb0 [ 291.609145][T13839] lo_ioctl+0x555/0x11f0 [ 291.613914][T13839] ? path_openat+0x19ab/0x20b0 [ 291.618977][T13839] ? putname+0xa5/0xc0 [ 291.623159][T13839] ? ___cache_free+0x3c/0x300 [ 291.627998][T13839] ? blkdev_common_ioctl+0x9c3/0x1040 [ 291.633457][T13839] ? selinux_file_ioctl+0x8e0/0x970 [ 291.638792][T13839] ? lo_release+0x120/0x120 [ 291.643392][T13839] blkdev_ioctl+0x1d0/0x3c0 [ 291.647906][T13839] block_ioctl+0x6d/0x80 [ 291.652136][T13839] ? blkdev_iopoll+0x70/0x70 [ 291.657051][T13839] __se_sys_ioctl+0xcb/0x140 [ 291.661627][T13839] __x64_sys_ioctl+0x3f/0x50 [ 291.666361][T13839] do_syscall_64+0x4a/0x90 [ 291.671060][T13839] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 291.677478][T13839] RIP: 0033:0x466397 [ 291.681572][T13839] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 291.701511][T13839] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.710459][T13839] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 291.719576][T13839] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 291.728321][T13839] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 291.736527][T13839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 291.745015][T13839] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 291.755157][T13839] loop2: detected capacity change from 0 to 1 06:32:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff", 0x37, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 291.787374][T13839] FAT-fs (loop2): Directory bread(block 3) failed [ 291.795932][T13839] FAT-fs (loop2): Directory bread(block 4) failed [ 291.802683][T13839] FAT-fs (loop2): Directory bread(block 5) failed [ 291.816928][T13839] FAT-fs (loop2): Directory bread(block 6) failed [ 291.818429][T13860] loop1: detected capacity change from 0 to 1 [ 291.832903][T13860] FAT-fs (loop1): Directory bread(block 3) failed [ 291.839963][T13860] FAT-fs (loop1): Directory bread(block 4) failed [ 291.844937][T13864] loop3: detected capacity change from 0 to 131456 [ 291.848206][T13839] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/279/file0 supports timestamps until 2107 (0x10391447e) [ 291.856438][T13864] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 291.871755][T13867] loop4: detected capacity change from 0 to 131456 [ 291.875558][T13860] FAT-fs (loop1): Directory bread(block 5) failed [ 291.888615][T13860] FAT-fs (loop1): Directory bread(block 6) failed [ 291.889818][T13861] loop5: detected capacity change from 0 to 131456 [ 291.900452][T13867] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 291.905139][T13861] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 291.918701][T13861] EXT4-fs (loop5): group descriptors corrupted! 06:32:10 executing program 2 (fault-call:0 fault-nth:16): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff", 0x37, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 291.932645][T13860] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/366/file0 supports timestamps until 2107 (0x10391447e) 06:32:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x10, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 292.000218][T13861] loop5: detected capacity change from 0 to 131456 [ 292.036652][T13888] loop4: detected capacity change from 0 to 131456 [ 292.045855][T13888] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 292.055576][T13861] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 292.060634][T13891] loop3: detected capacity change from 0 to 131456 [ 292.067279][T13861] EXT4-fs (loop5): group descriptors corrupted! [ 292.076997][T13892] FAULT_INJECTION: forcing a failure. [ 292.076997][T13892] name failslab, interval 1, probability 0, space 0, times 0 [ 292.095697][T13892] CPU: 1 PID: 13892 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 292.104658][T13892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.116847][T13892] Call Trace: [ 292.120558][T13892] dump_stack+0x137/0x19d [ 292.126886][T13892] should_fail+0x23c/0x250 [ 292.131651][T13892] ? __kernfs_new_node+0x6a/0x330 [ 292.136753][T13892] __should_failslab+0x81/0x90 [ 292.142148][T13892] should_failslab+0x5/0x20 [ 292.146926][T13892] kmem_cache_alloc+0x46/0x2f0 [ 292.151819][T13892] __kernfs_new_node+0x6a/0x330 [ 292.156895][T13892] ? __cond_resched+0x11/0x40 [ 292.161659][T13892] ? mutex_lock+0x9/0x30 [ 292.166160][T13892] kernfs_new_node+0x5b/0xd0 [ 292.170946][T13892] __kernfs_create_file+0x45/0x1a0 [ 292.176444][T13892] sysfs_add_file_mode_ns+0x1c1/0x250 [ 292.182102][T13892] internal_create_group+0x2e4/0x850 [ 292.187547][T13892] sysfs_create_group+0x1b/0x20 [ 292.193002][T13892] loop_configure+0xa21/0xcb0 [ 292.197667][T13892] lo_ioctl+0x555/0x11f0 [ 292.201986][T13892] ? path_openat+0x19ab/0x20b0 [ 292.206909][T13892] ? putname+0xa5/0xc0 [ 292.211047][T13892] ? ___cache_free+0x3c/0x300 [ 292.215808][T13892] ? blkdev_common_ioctl+0x9c3/0x1040 [ 292.221621][T13892] ? selinux_file_ioctl+0x8e0/0x970 [ 292.227435][T13892] ? lo_release+0x120/0x120 [ 292.232145][T13892] blkdev_ioctl+0x1d0/0x3c0 [ 292.236664][T13892] block_ioctl+0x6d/0x80 [ 292.241068][T13892] ? blkdev_iopoll+0x70/0x70 [ 292.245993][T13892] __se_sys_ioctl+0xcb/0x140 [ 292.250622][T13892] __x64_sys_ioctl+0x3f/0x50 [ 292.255820][T13892] do_syscall_64+0x4a/0x90 [ 292.260605][T13892] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 292.267260][T13892] RIP: 0033:0x466397 [ 292.271488][T13892] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 292.292690][T13892] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.301767][T13892] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 292.309793][T13892] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 292.318748][T13892] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 292.326713][T13892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 292.334771][T13892] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 292.345257][T13892] loop2: detected capacity change from 0 to 1 06:32:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3cb, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 292.355255][T13891] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 292.368203][T13901] loop1: detected capacity change from 0 to 1 [ 292.386769][T13901] FAT-fs (loop1): Directory bread(block 3) failed [ 292.389601][T13892] FAT-fs (loop2): Directory bread(block 3) failed 06:32:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x6, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 292.398860][T13901] FAT-fs (loop1): Directory bread(block 4) failed [ 292.421205][T13901] FAT-fs (loop1): Directory bread(block 5) failed [ 292.429227][T13901] FAT-fs (loop1): Directory bread(block 6) failed [ 292.436414][T13901] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/367/file0 supports timestamps until 2107 (0x10391447e) 06:32:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff", 0x37, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 292.442610][T13892] FAT-fs (loop2): Directory bread(block 4) failed [ 292.458382][T13892] FAT-fs (loop2): Directory bread(block 5) failed [ 292.468829][T13892] FAT-fs (loop2): Directory bread(block 6) failed [ 292.468934][T13909] loop5: detected capacity change from 0 to 131456 [ 292.475468][T13892] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/280/file0 supports timestamps until 2107 (0x10391447e) 06:32:11 executing program 2 (fault-call:0 fault-nth:17): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x11, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 292.509247][T13909] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 292.515992][T13915] loop4: detected capacity change from 0 to 131456 [ 292.519920][T13909] EXT4-fs (loop5): group descriptors corrupted! [ 292.529828][T13915] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 292.598888][T13923] loop3: detected capacity change from 0 to 131456 [ 292.625702][T13909] loop5: detected capacity change from 0 to 131456 [ 292.625753][T13927] FAULT_INJECTION: forcing a failure. [ 292.625753][T13927] name failslab, interval 1, probability 0, space 0, times 0 [ 292.645522][T13927] CPU: 0 PID: 13927 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 292.654572][T13927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.665129][T13927] Call Trace: [ 292.666772][T13923] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 292.668740][T13927] dump_stack+0x137/0x19d [ 292.676558][T13929] loop4: detected capacity change from 0 to 131456 [ 292.680989][T13927] should_fail+0x23c/0x250 [ 292.681015][T13927] ? __kernfs_new_node+0x6a/0x330 [ 292.698054][T13927] __should_failslab+0x81/0x90 [ 292.703469][T13927] should_failslab+0x5/0x20 [ 292.708114][T13927] kmem_cache_alloc+0x46/0x2f0 [ 292.712998][T13927] __kernfs_new_node+0x6a/0x330 [ 292.718747][T13927] ? __cond_resched+0x11/0x40 [ 292.723528][T13927] ? mutex_lock+0x9/0x30 [ 292.728141][T13927] kernfs_new_node+0x5b/0xd0 [ 292.732068][T13909] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 292.733029][T13927] __kernfs_create_file+0x45/0x1a0 [ 292.733058][T13927] sysfs_add_file_mode_ns+0x1c1/0x250 [ 292.743908][T13909] EXT4-fs (loop5): group descriptors corrupted! [ 292.749114][T13927] internal_create_group+0x2e4/0x850 [ 292.749145][T13927] sysfs_create_group+0x1b/0x20 [ 292.770962][T13927] loop_configure+0xa21/0xcb0 [ 292.773254][T13939] loop1: detected capacity change from 0 to 1 [ 292.775922][T13927] lo_ioctl+0x555/0x11f0 [ 292.775944][T13927] ? path_openat+0x19ab/0x20b0 [ 292.776019][T13927] ? putname+0xa5/0xc0 [ 292.795983][T13927] ? ___cache_free+0x3c/0x300 [ 292.800809][T13927] ? blkdev_common_ioctl+0x9c3/0x1040 [ 292.806298][T13927] ? selinux_file_ioctl+0x8e0/0x970 [ 292.808945][T13929] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 292.811782][T13927] ? lo_release+0x120/0x120 [ 292.822077][T13929] EXT4-fs (loop4): group descriptors corrupted! [ 292.826810][T13927] blkdev_ioctl+0x1d0/0x3c0 [ 292.826834][T13927] block_ioctl+0x6d/0x80 [ 292.836551][T13939] FAT-fs (loop1): Directory bread(block 3) failed [ 292.838161][T13927] ? blkdev_iopoll+0x70/0x70 [ 292.838185][T13927] __se_sys_ioctl+0xcb/0x140 [ 292.842943][T13939] FAT-fs (loop1): Directory bread(block 4) failed [ 292.849383][T13927] __x64_sys_ioctl+0x3f/0x50 [ 292.849410][T13927] do_syscall_64+0x4a/0x90 [ 292.875304][T13927] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 292.878920][T13939] FAT-fs (loop1): Directory bread(block 5) failed [ 292.881395][T13927] RIP: 0033:0x466397 06:32:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 292.881413][T13927] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 292.912231][T13927] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.916123][T13939] FAT-fs (loop1): Directory bread(block 6) failed [ 292.920913][T13927] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 292.920930][T13927] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 06:32:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3cc, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x12, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 292.920942][T13927] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 292.932163][T13939] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/368/file0 supports timestamps until 2107 (0x10391447e) [ 292.936010][T13927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 292.936025][T13927] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 292.936311][T13927] loop2: detected capacity change from 0 to 1 06:32:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 292.994806][T13927] FAT-fs (loop2): Directory bread(block 3) failed [ 293.001532][T13927] FAT-fs (loop2): Directory bread(block 4) failed [ 293.014944][T13927] FAT-fs (loop2): Directory bread(block 5) failed [ 293.025403][T13927] FAT-fs (loop2): Directory bread(block 6) failed 06:32:11 executing program 2 (fault-call:0 fault-nth:18): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 293.034846][T13927] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/281/file0 supports timestamps until 2107 (0x10391447e) [ 293.068345][T13951] loop3: detected capacity change from 0 to 131456 [ 293.100150][T13951] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 293.107170][T13958] loop4: detected capacity change from 0 to 131456 [ 293.117484][T13960] loop1: detected capacity change from 0 to 1 [ 293.125785][T13964] loop5: detected capacity change from 0 to 131456 [ 293.164042][T13964] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 293.174620][T13964] EXT4-fs (loop5): group descriptors corrupted! [ 293.192519][T13958] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 293.201070][T13960] FAT-fs (loop1): Directory bread(block 3) failed 06:32:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 293.214538][T13960] FAT-fs (loop1): Directory bread(block 4) failed [ 293.228275][T13975] FAULT_INJECTION: forcing a failure. [ 293.228275][T13975] name failslab, interval 1, probability 0, space 0, times 0 [ 293.236807][T13960] FAT-fs (loop1): Directory bread(block 5) failed [ 293.241372][T13975] CPU: 0 PID: 13975 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 293.248158][T13960] FAT-fs (loop1): Directory bread(block 6) failed [ 293.257305][T13975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.257319][T13975] Call Trace: [ 293.257326][T13975] dump_stack+0x137/0x19d [ 293.257351][T13975] should_fail+0x23c/0x250 [ 293.280940][T13960] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/369/file0 supports timestamps until 2107 (0x10391447e) [ 293.281936][T13975] ? __kernfs_new_node+0x6a/0x330 [ 293.281962][T13975] __should_failslab+0x81/0x90 [ 293.281982][T13975] should_failslab+0x5/0x20 [ 293.282001][T13975] kmem_cache_alloc+0x46/0x2f0 [ 293.282017][T13975] __kernfs_new_node+0x6a/0x330 [ 293.325794][T13980] loop3: detected capacity change from 0 to 131456 [ 293.327664][T13975] ? __cond_resched+0x11/0x40 [ 293.327687][T13975] ? mutex_lock+0x9/0x30 [ 293.340006][T13980] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 293.344181][T13975] kernfs_new_node+0x5b/0xd0 [ 293.344209][T13975] __kernfs_create_file+0x45/0x1a0 [ 293.361513][T13975] sysfs_add_file_mode_ns+0x1c1/0x250 [ 293.367162][T13975] internal_create_group+0x2e4/0x850 [ 293.372565][T13975] sysfs_create_group+0x1b/0x20 [ 293.377850][T13975] loop_configure+0xa21/0xcb0 [ 293.382816][T13975] lo_ioctl+0x555/0x11f0 [ 293.387581][T13975] ? path_openat+0x19ab/0x20b0 [ 293.392472][T13975] ? putname+0xa5/0xc0 [ 293.396707][T13975] ? ___cache_free+0x3c/0x300 [ 293.401613][T13975] ? blkdev_common_ioctl+0x9c3/0x1040 [ 293.407325][T13975] ? selinux_file_ioctl+0x8e0/0x970 06:32:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x7, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x18, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 293.412544][T13975] ? lo_release+0x120/0x120 [ 293.417513][T13975] blkdev_ioctl+0x1d0/0x3c0 [ 293.422110][T13975] block_ioctl+0x6d/0x80 [ 293.426755][T13975] ? blkdev_iopoll+0x70/0x70 [ 293.431382][T13975] __se_sys_ioctl+0xcb/0x140 [ 293.436596][T13975] __x64_sys_ioctl+0x3f/0x50 [ 293.443931][T13975] do_syscall_64+0x4a/0x90 [ 293.449104][T13975] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 293.455499][T13975] RIP: 0033:0x466397 [ 293.459648][T13975] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 293.481131][T13975] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.490722][T13975] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 293.499158][T13975] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 06:32:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 293.507628][T13975] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 293.517419][T13975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 293.526397][T13975] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 293.544505][T13975] loop2: detected capacity change from 0 to 1 06:32:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 293.575456][T13975] FAT-fs (loop2): Directory bread(block 3) failed [ 293.582502][T13964] loop5: detected capacity change from 0 to 131456 [ 293.589703][T13997] loop4: detected capacity change from 0 to 131456 [ 293.599783][T13997] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 293.613241][T13964] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! 06:32:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3cd, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 293.624014][T13964] EXT4-fs (loop5): group descriptors corrupted! [ 293.628612][T13975] FAT-fs (loop2): Directory bread(block 4) failed [ 293.637533][T13975] FAT-fs (loop2): Directory bread(block 5) failed [ 293.644401][T13975] FAT-fs (loop2): Directory bread(block 6) failed [ 293.651689][T13975] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/282/file0 supports timestamps until 2107 (0x10391447e) 06:32:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 293.681173][T14008] loop1: detected capacity change from 0 to 1 [ 293.687633][T14007] loop3: detected capacity change from 0 to 131456 [ 293.706071][T14007] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 293.710944][T14008] FAT-fs (loop1): Directory bread(block 3) failed 06:32:12 executing program 2 (fault-call:0 fault-nth:19): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 293.746404][T14008] FAT-fs (loop1): Directory bread(block 4) failed [ 293.760923][T14008] FAT-fs (loop1): Directory bread(block 5) failed [ 293.767792][T14008] FAT-fs (loop1): Directory bread(block 6) failed [ 293.774401][T14008] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/370/file0 supports timestamps until 2107 (0x10391447e) 06:32:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x19, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 293.817154][T14024] loop4: detected capacity change from 0 to 131456 [ 293.827093][T14024] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 293.837557][T14016] loop5: detected capacity change from 0 to 131456 [ 293.879026][T14040] loop4: detected capacity change from 0 to 131456 [ 293.882949][T14016] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 293.888521][T14040] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 293.896479][T14016] EXT4-fs (loop5): group descriptors corrupted! [ 293.919477][T14035] loop3: detected capacity change from 0 to 131456 [ 293.975558][T14046] loop1: detected capacity change from 0 to 1 [ 293.975575][T14034] FAULT_INJECTION: forcing a failure. [ 293.975575][T14034] name failslab, interval 1, probability 0, space 0, times 0 [ 293.992833][T14046] FAT-fs (loop1): Directory bread(block 3) failed [ 293.995015][T14034] CPU: 0 PID: 14034 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 293.995038][T14034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.001725][T14046] FAT-fs (loop1): Directory bread(block 4) failed [ 294.010991][T14034] Call Trace: [ 294.011002][T14034] dump_stack+0x137/0x19d [ 294.022705][T14046] FAT-fs (loop1): Directory bread(block 5) failed [ 294.028318][T14034] should_fail+0x23c/0x250 [ 294.032324][T14046] FAT-fs (loop1): Directory bread(block 6) failed [ 294.036004][T14034] ? __kernfs_new_node+0x6a/0x330 [ 294.036029][T14034] __should_failslab+0x81/0x90 [ 294.036052][T14034] should_failslab+0x5/0x20 06:32:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x22, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 294.043808][T14046] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/371/file0 supports timestamps until 2107 (0x10391447e) [ 294.047628][T14034] kmem_cache_alloc+0x46/0x2f0 [ 294.047654][T14034] __kernfs_new_node+0x6a/0x330 [ 294.047681][T14034] ? __cond_resched+0x11/0x40 [ 294.099053][T14034] ? mutex_lock+0x9/0x30 [ 294.103307][T14034] kernfs_new_node+0x5b/0xd0 [ 294.107931][T14034] __kernfs_create_file+0x45/0x1a0 [ 294.113357][T14034] sysfs_add_file_mode_ns+0x1c1/0x250 [ 294.119159][T14034] internal_create_group+0x2e4/0x850 [ 294.127507][T14034] sysfs_create_group+0x1b/0x20 [ 294.132861][T14034] loop_configure+0xa21/0xcb0 [ 294.137782][T14034] lo_ioctl+0x555/0x11f0 [ 294.140653][T14016] loop5: detected capacity change from 0 to 131456 [ 294.142120][T14034] ? path_openat+0x19ab/0x20b0 [ 294.142145][T14034] ? putname+0xa5/0xc0 [ 294.142157][T14034] ? ___cache_free+0x3c/0x300 [ 294.142174][T14034] ? blkdev_common_ioctl+0x9c3/0x1040 [ 294.142191][T14034] ? selinux_file_ioctl+0x8e0/0x970 [ 294.142206][T14034] ? lo_release+0x120/0x120 [ 294.150950][T14016] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 294.153912][T14034] blkdev_ioctl+0x1d0/0x3c0 [ 294.153937][T14034] block_ioctl+0x6d/0x80 [ 294.153958][T14034] ? blkdev_iopoll+0x70/0x70 [ 294.158631][T14016] EXT4-fs (loop5): group descriptors corrupted! [ 294.163682][T14034] __se_sys_ioctl+0xcb/0x140 [ 294.174324][T14057] loop4: detected capacity change from 0 to 131456 [ 294.179075][T14057] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 294.189720][T14034] __x64_sys_ioctl+0x3f/0x50 [ 294.234296][T14034] do_syscall_64+0x4a/0x90 [ 294.238994][T14034] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 294.244902][T14034] RIP: 0033:0x466397 [ 294.248814][T14034] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 294.268841][T14034] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.277294][T14034] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 294.285607][T14034] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 294.293955][T14034] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 294.302537][T14034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 294.310895][T14034] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 294.320966][T14035] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 294.321341][T14034] loop2: detected capacity change from 0 to 1 [ 294.361361][T14034] FAT-fs (loop2): Directory bread(block 3) failed [ 294.374264][T14034] FAT-fs (loop2): Directory bread(block 4) failed [ 294.405184][T14034] FAT-fs (loop2): Directory bread(block 5) failed [ 294.412679][T14074] loop1: detected capacity change from 0 to 1 [ 294.422623][T14074] FAT-fs (loop1): Directory bread(block 3) failed [ 294.429464][T14074] FAT-fs (loop1): Directory bread(block 4) failed [ 294.437911][T14034] FAT-fs (loop2): Directory bread(block 6) failed [ 294.438955][T14074] FAT-fs (loop1): Directory bread(block 5) failed 06:32:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x8, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3ce, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 294.451964][T14074] FAT-fs (loop1): Directory bread(block 6) failed [ 294.458827][T14074] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/372/file0 supports timestamps until 2107 (0x10391447e) [ 294.481299][T14034] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/283/file0 supports timestamps until 2107 (0x10391447e) 06:32:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x25, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:13 executing program 2 (fault-call:0 fault-nth:20): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 294.512541][T14090] loop4: detected capacity change from 0 to 131456 [ 294.519960][T14094] loop3: detected capacity change from 0 to 131456 [ 294.528804][T14090] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 294.542346][T14092] loop5: detected capacity change from 0 to 131456 06:32:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, 0x0) [ 294.565949][T14094] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 294.574331][T14092] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 294.585613][T14092] EXT4-fs (loop5): group descriptors corrupted! [ 294.648380][T14114] FAULT_INJECTION: forcing a failure. [ 294.648380][T14114] name failslab, interval 1, probability 0, space 0, times 0 [ 294.661588][T14118] loop4: detected capacity change from 0 to 131456 [ 294.661709][T14114] CPU: 1 PID: 14114 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 294.676678][T14117] loop1: detected capacity change from 0 to 1 [ 294.677721][T14114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:32:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 294.677734][T14114] Call Trace: [ 294.677741][T14114] dump_stack+0x137/0x19d [ 294.687485][T14117] FAT-fs (loop1): Directory bread(block 3) failed [ 294.695584][T14114] should_fail+0x23c/0x250 [ 294.695609][T14114] ? __kernfs_new_node+0x6a/0x330 [ 294.701044][T14117] FAT-fs (loop1): Directory bread(block 4) failed [ 294.703877][T14114] __should_failslab+0x81/0x90 [ 294.711105][T14117] FAT-fs (loop1): Directory bread(block 5) failed [ 294.715297][T14114] should_failslab+0x5/0x20 [ 294.715325][T14114] kmem_cache_alloc+0x46/0x2f0 06:32:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x48, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 294.721136][T14117] FAT-fs (loop1): Directory bread(block 6) failed [ 294.726966][T14114] __kernfs_new_node+0x6a/0x330 [ 294.727004][T14114] ? __cond_resched+0x11/0x40 [ 294.733362][T14117] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/373/file0 supports timestamps until 2107 (0x10391447e) [ 294.739167][T14114] ? mutex_lock+0x9/0x30 [ 294.739188][T14114] kernfs_new_node+0x5b/0xd0 [ 294.739206][T14114] __kernfs_create_file+0x45/0x1a0 [ 294.782067][T14092] loop5: detected capacity change from 0 to 131456 [ 294.785225][T14114] sysfs_add_file_mode_ns+0x1c1/0x250 [ 294.785256][T14114] internal_create_group+0x2e4/0x850 [ 294.790552][T14092] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 294.795598][T14114] sysfs_create_group+0x1b/0x20 [ 294.795627][T14114] loop_configure+0xa21/0xcb0 [ 294.802490][T14092] EXT4-fs (loop5): group descriptors corrupted! [ 294.808019][T14114] lo_ioctl+0x555/0x11f0 [ 294.808039][T14114] ? path_openat+0x19ab/0x20b0 [ 294.815821][T14127] loop3: detected capacity change from 0 to 131456 [ 294.824335][T14114] ? putname+0xa5/0xc0 [ 294.824356][T14114] ? ___cache_free+0x3c/0x300 [ 294.832016][T14127] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 294.834293][T14114] ? blkdev_common_ioctl+0x9c3/0x1040 [ 294.881172][T14114] ? selinux_file_ioctl+0x8e0/0x970 [ 294.886463][T14114] ? lo_release+0x120/0x120 [ 294.891768][T14114] blkdev_ioctl+0x1d0/0x3c0 [ 294.896564][T14114] block_ioctl+0x6d/0x80 [ 294.900911][T14114] ? blkdev_iopoll+0x70/0x70 [ 294.906035][T14114] __se_sys_ioctl+0xcb/0x140 [ 294.910830][T14114] __x64_sys_ioctl+0x3f/0x50 [ 294.915976][T14114] do_syscall_64+0x4a/0x90 [ 294.920944][T14114] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 294.927227][T14114] RIP: 0033:0x466397 [ 294.932144][T14114] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 294.955062][T14114] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.964527][T14114] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 294.974137][T14114] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 294.982614][T14114] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 06:32:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, 0x0) 06:32:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3cf, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 294.991215][T14114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 295.000673][T14114] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 295.011508][T14114] loop2: detected capacity change from 0 to 1 [ 295.020686][T14114] FAT-fs (loop2): Directory bread(block 3) failed [ 295.039608][T14114] FAT-fs (loop2): Directory bread(block 4) failed 06:32:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, 0x0) [ 295.047875][T14114] FAT-fs (loop2): Directory bread(block 5) failed [ 295.055652][T14114] FAT-fs (loop2): Directory bread(block 6) failed [ 295.095357][T14137] loop5: detected capacity change from 0 to 131456 [ 295.101420][T14114] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/284/file0 supports timestamps until 2107 (0x10391447e) [ 295.137728][T14145] loop1: detected capacity change from 0 to 1 [ 295.145202][T14146] loop4: detected capacity change from 0 to 131456 [ 295.147245][T14137] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 295.162794][T14137] EXT4-fs (loop5): group descriptors corrupted! [ 295.165012][T14147] loop3: detected capacity change from 0 to 131456 [ 295.176354][T14145] FAT-fs (loop1): Directory bread(block 3) failed [ 295.183520][T14145] FAT-fs (loop1): Directory bread(block 4) failed [ 295.207114][T14145] FAT-fs (loop1): Directory bread(block 5) failed [ 295.214849][T14145] FAT-fs (loop1): Directory bread(block 6) failed [ 295.223114][T14145] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/374/file0 supports timestamps until 2107 (0x10391447e) [ 295.260378][T14137] loop5: detected capacity change from 0 to 131456 [ 295.295691][T14137] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 295.306946][T14137] EXT4-fs (loop5): group descriptors corrupted! 06:32:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0xa, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:14 executing program 2 (fault-call:0 fault-nth:21): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, 0x0) 06:32:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, 0x0) 06:32:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4c, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3d0, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 295.366768][T14177] loop4: detected capacity change from 0 to 131456 [ 295.381652][T14176] loop2: detected capacity change from 0 to 1 [ 295.388371][T14176] FAULT_INJECTION: forcing a failure. [ 295.388371][T14176] name failslab, interval 1, probability 0, space 0, times 0 [ 295.388415][T14186] loop3: detected capacity change from 0 to 131456 [ 295.401493][T14176] CPU: 0 PID: 14176 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 295.408714][T14188] loop5: detected capacity change from 0 to 131456 [ 295.417245][T14176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.417261][T14176] Call Trace: [ 295.417269][T14176] dump_stack+0x137/0x19d [ 295.426080][T14187] loop1: detected capacity change from 0 to 1 [ 295.434544][T14176] should_fail+0x23c/0x250 [ 295.434571][T14176] __should_failslab+0x81/0x90 [ 295.439610][T14188] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 295.442344][T14176] ? kobject_uevent_env+0x1a7/0xc40 [ 295.448640][T14188] EXT4-fs (loop5): group descriptors corrupted! [ 295.453073][T14176] should_failslab+0x5/0x20 [ 295.461328][T14187] FAT-fs (loop1): Directory bread(block 3) failed [ 295.468843][T14176] kmem_cache_alloc_trace+0x49/0x310 [ 295.468877][T14176] ? dev_uevent_filter+0x70/0x70 [ 295.468897][T14176] kobject_uevent_env+0x1a7/0xc40 [ 295.479315][T14187] FAT-fs (loop1): Directory bread(block 4) failed 06:32:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x60, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 295.481276][T14176] kobject_uevent+0x18/0x20 [ 295.481305][T14176] loop_configure+0xb3c/0xcb0 [ 295.486165][T14187] FAT-fs (loop1): Directory bread(block 5) failed [ 295.492415][T14176] lo_ioctl+0x555/0x11f0 [ 295.492438][T14176] ? path_openat+0x19ab/0x20b0 [ 295.492456][T14176] ? putname+0xa5/0xc0 [ 295.492501][T14176] ? ___cache_free+0x3c/0x300 [ 295.492518][T14176] ? blkdev_common_ioctl+0x9c3/0x1040 [ 295.492536][T14176] ? selinux_file_ioctl+0x8e0/0x970 [ 295.492552][T14176] ? lo_release+0x120/0x120 [ 295.492567][T14176] blkdev_ioctl+0x1d0/0x3c0 [ 295.492586][T14176] block_ioctl+0x6d/0x80 [ 295.492667][T14176] ? blkdev_iopoll+0x70/0x70 [ 295.501175][T14187] FAT-fs (loop1): Directory bread(block 6) failed [ 295.503362][T14176] __se_sys_ioctl+0xcb/0x140 [ 295.503390][T14176] __x64_sys_ioctl+0x3f/0x50 [ 295.509900][T14187] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/375/file0 supports timestamps until 2107 (0x10391447e) [ 295.516031][T14176] do_syscall_64+0x4a/0x90 [ 295.516057][T14176] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 295.516080][T14176] RIP: 0033:0x466397 [ 295.516094][T14176] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 295.649160][T14176] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 295.657734][T14176] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 06:32:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 295.666415][T14176] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 295.674893][T14176] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 295.683528][T14176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 295.692513][T14176] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 295.703424][T14176] FAT-fs (loop2): Directory bread(block 3) failed 06:32:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, 0x0) [ 295.736680][T14176] FAT-fs (loop2): Directory bread(block 4) failed [ 295.737419][T14188] loop5: detected capacity change from 0 to 131456 [ 295.746688][T14176] FAT-fs (loop2): Directory bread(block 5) failed [ 295.758435][T14176] FAT-fs (loop2): Directory bread(block 6) failed 06:32:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x10, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 295.781238][T14176] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/285/file0 supports timestamps until 2107 (0x10391447e) [ 295.799220][T14202] loop1: detected capacity change from 0 to 1 [ 295.815180][T14188] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 295.820319][T14202] FAT-fs (loop1): Directory bread(block 3) failed 06:32:14 executing program 2 (fault-call:0 fault-nth:22): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3d1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 295.826841][T14188] EXT4-fs (loop5): group descriptors corrupted! [ 295.839637][T14209] loop3: detected capacity change from 0 to 131456 [ 295.842458][T14202] FAT-fs (loop1): Directory bread(block 4) failed [ 295.892106][T14202] FAT-fs (loop1): Directory bread(block 5) failed [ 295.904503][T14202] FAT-fs (loop1): Directory bread(block 6) failed [ 295.907416][T14220] loop4: detected capacity change from 0 to 1 [ 295.913851][T14202] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/376/file0 supports timestamps until 2107 (0x10391447e) [ 295.938580][T14220] FAT-fs (loop4): Directory bread(block 3) failed [ 295.951598][T14216] loop5: detected capacity change from 0 to 131456 [ 295.953723][T14220] FAT-fs (loop4): Directory bread(block 4) failed [ 295.982329][T14220] FAT-fs (loop4): Directory bread(block 5) failed [ 295.987734][T14229] loop2: detected capacity change from 0 to 1 [ 295.990558][T14220] FAT-fs (loop4): Directory bread(block 6) failed [ 295.997890][T14229] FAULT_INJECTION: forcing a failure. [ 295.997890][T14229] name failslab, interval 1, probability 0, space 0, times 0 [ 296.004380][T14220] vfat filesystem being mounted at /root/syzkaller-testdir036990735/syzkaller.6ScFL2/391/file0 supports timestamps until 2107 (0x10391447e) [ 296.015232][T14229] CPU: 0 PID: 14229 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 296.039440][T14229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.049786][T14229] Call Trace: [ 296.053232][T14229] dump_stack+0x137/0x19d [ 296.057995][T14229] should_fail+0x23c/0x250 [ 296.062579][T14229] ? kzalloc+0x1d/0x30 [ 296.067031][T14229] __should_failslab+0x81/0x90 [ 296.071854][T14229] should_failslab+0x5/0x20 [ 296.077009][T14229] __kmalloc+0x66/0x340 [ 296.081700][T14229] kzalloc+0x1d/0x30 [ 296.085677][T14229] kobject_get_path+0x7c/0x110 [ 296.090537][T14229] kobject_uevent_env+0x1be/0xc40 [ 296.095813][T14229] kobject_uevent+0x18/0x20 [ 296.100380][T14229] loop_configure+0xb3c/0xcb0 [ 296.105425][T14229] lo_ioctl+0x555/0x11f0 [ 296.109828][T14229] ? path_openat+0x19ab/0x20b0 [ 296.115025][T14229] ? putname+0xa5/0xc0 [ 296.119262][T14229] ? ___cache_free+0x3c/0x300 [ 296.126470][T14229] ? blkdev_common_ioctl+0x9c3/0x1040 [ 296.132473][T14229] ? selinux_file_ioctl+0x8e0/0x970 [ 296.138545][T14229] ? lo_release+0x120/0x120 [ 296.143560][T14229] blkdev_ioctl+0x1d0/0x3c0 [ 296.148445][T14229] block_ioctl+0x6d/0x80 [ 296.152860][T14229] ? blkdev_iopoll+0x70/0x70 [ 296.157895][T14229] __se_sys_ioctl+0xcb/0x140 [ 296.162475][T14229] __x64_sys_ioctl+0x3f/0x50 [ 296.167352][T14229] do_syscall_64+0x4a/0x90 [ 296.171927][T14229] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 296.178699][T14229] RIP: 0033:0x466397 06:32:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0xf, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x64, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x68, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3d2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 296.182676][T14229] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 296.204263][T14229] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 296.213349][T14229] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 296.221821][T14229] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 296.230677][T14229] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 296.239612][T14229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 296.248143][T14229] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 296.264167][T14229] FAT-fs (loop2): Directory bread(block 3) failed [ 296.273310][T14229] FAT-fs (loop2): Directory bread(block 4) failed [ 296.283956][T14229] FAT-fs (loop2): Directory bread(block 5) failed 06:32:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0xa, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:15 executing program 2 (fault-call:0 fault-nth:23): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 296.284832][T14236] loop3: detected capacity change from 0 to 131456 [ 296.290491][T14229] FAT-fs (loop2): Directory bread(block 6) failed [ 296.304137][T14229] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/286/file0 supports timestamps until 2107 (0x10391447e) 06:32:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0xa, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 296.361659][T14236] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 296.372474][T14236] EXT4-fs (loop3): group descriptors corrupted! [ 296.381515][T14246] loop1: detected capacity change from 0 to 1 06:32:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0xa, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 296.428671][T14246] FAT-fs (loop1): Directory bread(block 3) failed [ 296.439466][T14257] loop5: detected capacity change from 0 to 131456 [ 296.440867][T14246] FAT-fs (loop1): Directory bread(block 4) failed [ 296.461530][T14257] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 296.472629][T14257] EXT4-fs (loop5): group descriptors corrupted! 06:32:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 296.491049][T14246] FAT-fs (loop1): Directory bread(block 5) failed [ 296.499069][T14246] FAT-fs (loop1): Directory bread(block 6) failed [ 296.502288][T14271] loop2: detected capacity change from 0 to 1 [ 296.513494][T14271] FAULT_INJECTION: forcing a failure. [ 296.513494][T14271] name failslab, interval 1, probability 0, space 0, times 0 [ 296.520853][T14246] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/377/file0 supports timestamps until 2107 (0x10391447e) [ 296.526917][T14271] CPU: 1 PID: 14271 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 296.550896][T14271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.562153][T14271] Call Trace: [ 296.565616][T14271] dump_stack+0x137/0x19d [ 296.569963][T14271] should_fail+0x23c/0x250 [ 296.574560][T14271] __should_failslab+0x81/0x90 [ 296.579427][T14271] should_failslab+0x5/0x20 [ 296.584194][T14271] kmem_cache_alloc_node+0x58/0x2b0 [ 296.589393][T14271] ? __alloc_skb+0xed/0x420 [ 296.594183][T14271] __alloc_skb+0xed/0x420 [ 296.598658][T14271] alloc_uevent_skb+0x5b/0x120 [ 296.603808][T14271] kobject_uevent_env+0x863/0xc40 [ 296.608918][T14271] kobject_uevent+0x18/0x20 [ 296.613701][T14271] loop_configure+0xb3c/0xcb0 [ 296.618372][T14271] lo_ioctl+0x555/0x11f0 [ 296.622664][T14271] ? path_openat+0x19ab/0x20b0 [ 296.627503][T14271] ? putname+0xa5/0xc0 [ 296.631560][T14271] ? ___cache_free+0x3c/0x300 [ 296.636413][T14271] ? blkdev_common_ioctl+0x9c3/0x1040 [ 296.644301][T14271] ? selinux_file_ioctl+0x8e0/0x970 [ 296.649594][T14271] ? lo_release+0x120/0x120 [ 296.654181][T14271] blkdev_ioctl+0x1d0/0x3c0 [ 296.658683][T14271] block_ioctl+0x6d/0x80 [ 296.663205][T14271] ? blkdev_iopoll+0x70/0x70 [ 296.668417][T14271] __se_sys_ioctl+0xcb/0x140 [ 296.672999][T14271] __x64_sys_ioctl+0x3f/0x50 [ 296.677597][T14271] do_syscall_64+0x4a/0x90 [ 296.683079][T14271] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 296.689138][T14271] RIP: 0033:0x466397 [ 296.693306][T14271] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 296.713623][T14271] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 296.722376][T14271] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 296.730423][T14271] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 06:32:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:15 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 296.738926][T14271] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 296.746998][T14271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 296.755554][T14271] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 296.776565][T14278] FAULT_INJECTION: forcing a failure. [ 296.776565][T14278] name failslab, interval 1, probability 0, space 0, times 0 [ 296.790001][T14278] CPU: 1 PID: 14278 Comm: syz-executor.4 Not tainted 5.13.0-rc2-syzkaller #0 [ 296.798930][T14278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.809600][T14278] Call Trace: [ 296.812976][T14278] dump_stack+0x137/0x19d [ 296.818207][T14278] should_fail+0x23c/0x250 [ 296.822896][T14278] ? __se_sys_memfd_create+0xfb/0x390 [ 296.824288][T14271] FAT-fs (loop2): Directory bread(block 3) failed [ 296.828420][T14278] __should_failslab+0x81/0x90 [ 296.828450][T14278] should_failslab+0x5/0x20 [ 296.835496][T14271] FAT-fs (loop2): Directory bread(block 4) failed [ 296.840017][T14278] __kmalloc+0x66/0x340 [ 296.840044][T14278] ? strnlen_user+0x137/0x1c0 [ 296.840057][T14278] __se_sys_memfd_create+0xfb/0x390 [ 296.844790][T14271] FAT-fs (loop2): Directory bread(block 5) failed [ 296.851196][T14278] __x64_sys_memfd_create+0x2d/0x40 [ 296.858867][T14271] FAT-fs (loop2): Directory bread(block 6) failed [ 296.861283][T14278] do_syscall_64+0x4a/0x90 [ 296.861310][T14278] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 296.867821][T14271] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/287/file0 supports timestamps until 2107 (0x10391447e) [ 296.873617][T14278] RIP: 0033:0x4665d9 [ 296.916041][T14278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 296.936535][T14278] RSP: 002b:00007f9731b93f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 296.945569][T14278] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 296.954638][T14278] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 296.963028][T14278] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 296.971314][T14278] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 296.979551][T14278] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 06:32:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x10, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 06:32:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x6c, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:15 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:15 executing program 2 (fault-call:0 fault-nth:24): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:15 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3d3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 297.124561][T14294] loop1: detected capacity change from 0 to 1 [ 297.133531][T14294] FAT-fs (loop1): Directory bread(block 3) failed [ 297.140742][T14294] FAT-fs (loop1): Directory bread(block 4) failed [ 297.150461][T14294] FAT-fs (loop1): Directory bread(block 5) failed [ 297.154456][T14307] FAULT_INJECTION: forcing a failure. [ 297.154456][T14307] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 297.157584][T14294] FAT-fs (loop1): Directory bread(block 6) failed [ 297.157762][T14294] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/378/file0 supports timestamps until 2107 (0x10391447e) [ 297.171520][T14307] CPU: 0 PID: 14307 Comm: syz-executor.4 Not tainted 5.13.0-rc2-syzkaller #0 [ 297.189130][T14305] FAULT_INJECTION: forcing a failure. [ 297.189130][T14305] name failslab, interval 1, probability 0, space 0, times 0 [ 297.192759][T14307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.192773][T14307] Call Trace: [ 297.192781][T14307] dump_stack+0x137/0x19d [ 297.232838][T14307] should_fail+0x23c/0x250 [ 297.237637][T14307] should_fail_usercopy+0x16/0x20 [ 297.242946][T14307] _copy_from_user+0x1c/0xd0 [ 297.247710][T14307] __se_sys_memfd_create+0x137/0x390 [ 297.253304][T14307] __x64_sys_memfd_create+0x2d/0x40 [ 297.258600][T14307] do_syscall_64+0x4a/0x90 [ 297.263333][T14307] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 297.269402][T14307] RIP: 0033:0x4665d9 [ 297.273608][T14307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 297.293605][T14307] RSP: 002b:00007f9731b93f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 297.302480][T14307] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 297.310536][T14307] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 297.318693][T14307] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 297.326821][T14307] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 297.335132][T14307] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 297.343195][T14305] CPU: 1 PID: 14305 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 297.351082][T14298] loop2: detected capacity change from 0 to 1 [ 297.352462][T14305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.352475][T14305] Call Trace: [ 297.352482][T14305] dump_stack+0x137/0x19d [ 297.361384][T14298] FAULT_INJECTION: forcing a failure. [ 297.361384][T14298] name failslab, interval 1, probability 0, space 0, times 0 [ 297.369735][T14305] should_fail+0x23c/0x250 [ 297.369760][T14305] ? __se_sys_memfd_create+0xfb/0x390 [ 297.400453][T14305] __should_failslab+0x81/0x90 [ 297.405749][T14305] should_failslab+0x5/0x20 [ 297.410623][T14305] __kmalloc+0x66/0x340 [ 297.414765][T14305] ? strnlen_user+0x137/0x1c0 [ 297.419444][T14305] __se_sys_memfd_create+0xfb/0x390 [ 297.424636][T14305] __x64_sys_memfd_create+0x2d/0x40 [ 297.430164][T14305] do_syscall_64+0x4a/0x90 [ 297.434697][T14305] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 297.441080][T14305] RIP: 0033:0x4665d9 [ 297.445029][T14305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 297.465228][T14305] RSP: 002b:00007ff264912f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 297.473871][T14305] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 297.482100][T14305] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 297.490166][T14305] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 297.498650][T14305] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 297.506882][T14305] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 297.515720][T14298] CPU: 0 PID: 14298 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 297.524676][T14298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.535066][T14298] Call Trace: [ 297.538395][T14298] dump_stack+0x137/0x19d [ 297.542734][T14298] should_fail+0x23c/0x250 [ 297.547158][T14298] __should_failslab+0x81/0x90 [ 297.552095][T14298] should_failslab+0x5/0x20 [ 297.556873][T14298] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 297.562944][T14298] ? __kmalloc_node_track_caller+0x30/0x40 [ 297.569047][T14298] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 297.574781][T14298] __kmalloc_node_track_caller+0x30/0x40 [ 297.576753][T14314] FAULT_INJECTION: forcing a failure. [ 297.576753][T14314] name failslab, interval 1, probability 0, space 0, times 0 [ 297.580942][T14298] ? alloc_uevent_skb+0x5b/0x120 [ 297.598811][T14298] __alloc_skb+0x187/0x420 [ 297.603229][T14298] alloc_uevent_skb+0x5b/0x120 [ 297.608341][T14298] kobject_uevent_env+0x863/0xc40 [ 297.613710][T14298] kobject_uevent+0x18/0x20 [ 297.618483][T14298] loop_configure+0xb3c/0xcb0 [ 297.623361][T14298] lo_ioctl+0x555/0x11f0 [ 297.627623][T14298] ? path_openat+0x19ab/0x20b0 [ 297.632447][T14298] ? putname+0xa5/0xc0 [ 297.636757][T14298] ? ___cache_free+0x3c/0x300 [ 297.641517][T14298] ? blkdev_common_ioctl+0x9c3/0x1040 [ 297.646996][T14298] ? selinux_file_ioctl+0x8e0/0x970 [ 297.652639][T14298] ? lo_release+0x120/0x120 [ 297.657327][T14298] blkdev_ioctl+0x1d0/0x3c0 [ 297.662452][T14298] block_ioctl+0x6d/0x80 [ 297.666771][T14298] ? blkdev_iopoll+0x70/0x70 [ 297.671634][T14298] __se_sys_ioctl+0xcb/0x140 [ 297.676456][T14298] __x64_sys_ioctl+0x3f/0x50 [ 297.681265][T14298] do_syscall_64+0x4a/0x90 [ 297.685882][T14298] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 297.692573][T14298] RIP: 0033:0x466397 [ 297.696714][T14298] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 297.716992][T14298] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 06:32:16 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x74, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:16 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 297.725476][T14298] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 297.733865][T14298] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 297.742224][T14298] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 297.750522][T14298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 297.758522][T14298] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 297.766679][T14314] CPU: 1 PID: 14314 Comm: syz-executor.4 Not tainted 5.13.0-rc2-syzkaller #0 [ 297.771372][T14298] FAT-fs (loop2): Directory bread(block 3) failed [ 297.775573][T14314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.782345][T14298] FAT-fs (loop2): Directory bread(block 4) failed [ 297.792219][T14314] Call Trace: [ 297.792230][T14314] dump_stack+0x137/0x19d [ 297.792253][T14314] should_fail+0x23c/0x250 [ 297.798978][T14298] FAT-fs (loop2): Directory bread(block 5) failed [ 297.802015][T14314] ? shmem_alloc_inode+0x22/0x30 [ 297.806483][T14298] FAT-fs (loop2): Directory bread(block 6) failed [ 297.810749][T14314] __should_failslab+0x81/0x90 [ 297.810775][T14314] ? shmem_match+0xa0/0xa0 [ 297.817786][T14298] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/288/file0 supports timestamps until 2107 (0x10391447e) [ 297.822511][T14314] should_failslab+0x5/0x20 [ 297.858594][T14314] kmem_cache_alloc+0x46/0x2f0 [ 297.861843][T14309] loop5: detected capacity change from 0 to 131456 [ 297.863689][T14314] ? do_anonymous_page+0x411/0x8b0 [ 297.876019][T14314] ? fsnotify_perm+0x59/0x2e0 [ 297.877130][T14309] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 297.880830][T14314] ? shmem_match+0xa0/0xa0 [ 297.880858][T14314] shmem_alloc_inode+0x22/0x30 [ 297.891185][T14309] EXT4-fs (loop5): group descriptors corrupted! [ 297.895578][T14314] new_inode_pseudo+0x38/0x1c0 [ 297.895601][T14314] new_inode+0x21/0x120 [ 297.903201][T14315] FAULT_INJECTION: forcing a failure. [ 297.903201][T14315] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 297.907340][T14314] shmem_get_inode+0xa1/0x480 [ 297.907369][T14314] __shmem_file_setup+0xf1/0x1d0 [ 297.940348][T14314] shmem_file_setup+0x37/0x40 [ 297.945209][T14314] __se_sys_memfd_create+0x1eb/0x390 [ 297.950607][T14314] __x64_sys_memfd_create+0x2d/0x40 [ 297.956073][T14314] do_syscall_64+0x4a/0x90 [ 297.960477][T14314] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 297.966359][T14314] RIP: 0033:0x4665d9 [ 297.970432][T14314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 297.991013][T14314] RSP: 002b:00007f9731b93f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 298.001600][T14314] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 298.009760][T14314] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 298.018830][T14314] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff 06:32:16 executing program 2 (fault-call:0 fault-nth:25): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 298.027067][T14314] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 298.035226][T14314] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 298.043426][T14315] CPU: 0 PID: 14315 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 298.052731][T14315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.063085][T14315] Call Trace: [ 298.066484][T14315] dump_stack+0x137/0x19d [ 298.071028][T14315] should_fail+0x23c/0x250 [ 298.075680][T14315] should_fail_usercopy+0x16/0x20 [ 298.080975][T14315] _copy_from_user+0x1c/0xd0 [ 298.085696][T14315] __se_sys_memfd_create+0x137/0x390 [ 298.091133][T14315] __x64_sys_memfd_create+0x2d/0x40 [ 298.096331][T14315] do_syscall_64+0x4a/0x90 [ 298.100849][T14315] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 298.107073][T14315] RIP: 0033:0x4665d9 [ 298.111336][T14315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 298.135412][T14315] RSP: 002b:00007ff264912f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 298.144279][T14315] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 298.152724][T14315] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 298.161048][T14315] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 298.169530][T14315] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 06:32:16 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:16 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 298.178024][T14315] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 06:32:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x13, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 298.246654][T14332] loop2: detected capacity change from 0 to 1 [ 298.247243][T14337] FAULT_INJECTION: forcing a failure. [ 298.247243][T14337] name failslab, interval 1, probability 0, space 0, times 0 [ 298.255680][T14332] FAULT_INJECTION: forcing a failure. [ 298.255680][T14332] name failslab, interval 1, probability 0, space 0, times 0 [ 298.266104][T14337] CPU: 0 PID: 14337 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 298.288019][T14337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.298173][T14337] Call Trace: [ 298.301908][T14337] dump_stack+0x137/0x19d [ 298.306254][T14337] should_fail+0x23c/0x250 [ 298.310835][T14337] ? shmem_alloc_inode+0x22/0x30 [ 298.316185][T14337] __should_failslab+0x81/0x90 [ 298.321013][T14337] ? shmem_match+0xa0/0xa0 [ 298.326897][T14337] should_failslab+0x5/0x20 [ 298.331566][T14337] kmem_cache_alloc+0x46/0x2f0 [ 298.336603][T14337] ? do_anonymous_page+0x411/0x8b0 [ 298.342037][T14337] ? fsnotify_perm+0x59/0x2e0 [ 298.347140][T14337] ? shmem_match+0xa0/0xa0 [ 298.351744][T14337] shmem_alloc_inode+0x22/0x30 [ 298.356701][T14337] new_inode_pseudo+0x38/0x1c0 [ 298.361713][T14337] new_inode+0x21/0x120 [ 298.366288][T14337] shmem_get_inode+0xa1/0x480 [ 298.371583][T14337] __shmem_file_setup+0xf1/0x1d0 [ 298.376803][T14337] shmem_file_setup+0x37/0x40 [ 298.381698][T14337] __se_sys_memfd_create+0x1eb/0x390 [ 298.387342][T14337] __x64_sys_memfd_create+0x2d/0x40 [ 298.392702][T14337] do_syscall_64+0x4a/0x90 [ 298.397211][T14337] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 298.403375][T14337] RIP: 0033:0x4665d9 [ 298.408057][T14337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 298.428744][T14337] RSP: 002b:00007ff264912f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 298.437465][T14337] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 298.446401][T14337] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 298.454771][T14337] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 298.463285][T14337] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 298.471602][T14337] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 298.479765][T14332] CPU: 1 PID: 14332 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 298.489175][T14332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.490345][T14340] FAULT_INJECTION: forcing a failure. [ 298.490345][T14340] name failslab, interval 1, probability 0, space 0, times 0 [ 298.499613][T14332] Call Trace: [ 298.499625][T14332] dump_stack+0x137/0x19d [ 298.499649][T14332] should_fail+0x23c/0x250 [ 298.499667][T14332] ? skb_clone+0x12c/0x1f0 [ 298.529413][T14332] __should_failslab+0x81/0x90 [ 298.534520][T14332] should_failslab+0x5/0x20 [ 298.539115][T14332] kmem_cache_alloc+0x46/0x2f0 [ 298.543977][T14332] skb_clone+0x12c/0x1f0 [ 298.548649][T14332] netlink_broadcast_filtered+0x50d/0xb90 [ 298.554548][T14332] ? skb_put+0xb9/0xf0 [ 298.558955][T14332] netlink_broadcast+0x35/0x50 [ 298.563766][T14332] kobject_uevent_env+0x8c9/0xc40 [ 298.569065][T14332] kobject_uevent+0x18/0x20 [ 298.573680][T14332] loop_configure+0xb3c/0xcb0 [ 298.578693][T14332] lo_ioctl+0x555/0x11f0 [ 298.582945][T14332] ? path_openat+0x19ab/0x20b0 [ 298.587871][T14332] ? putname+0xa5/0xc0 [ 298.591956][T14332] ? ___cache_free+0x3c/0x300 [ 298.596718][T14332] ? blkdev_common_ioctl+0x9c3/0x1040 [ 298.602102][T14332] ? selinux_file_ioctl+0x8e0/0x970 [ 298.607521][T14332] ? lo_release+0x120/0x120 [ 298.612226][T14332] blkdev_ioctl+0x1d0/0x3c0 [ 298.616914][T14332] block_ioctl+0x6d/0x80 [ 298.621523][T14332] ? blkdev_iopoll+0x70/0x70 [ 298.626458][T14332] __se_sys_ioctl+0xcb/0x140 [ 298.631237][T14332] __x64_sys_ioctl+0x3f/0x50 [ 298.636064][T14332] do_syscall_64+0x4a/0x90 [ 298.640948][T14332] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 298.647165][T14332] RIP: 0033:0x466397 [ 298.651140][T14332] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 298.673511][T14332] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 298.682229][T14332] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 298.691096][T14332] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 298.699574][T14332] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 298.707726][T14332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 298.716236][T14332] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 298.724914][T14340] CPU: 0 PID: 14340 Comm: syz-executor.4 Not tainted 5.13.0-rc2-syzkaller #0 [ 298.735087][T14340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.745632][T14340] Call Trace: [ 298.749087][T14340] dump_stack+0x137/0x19d [ 298.749895][T14332] FAT-fs (loop2): Directory bread(block 3) failed [ 298.753680][T14340] should_fail+0x23c/0x250 [ 298.753703][T14340] ? security_inode_alloc+0x30/0x180 [ 298.760729][T14332] FAT-fs (loop2): Directory bread(block 4) failed [ 298.765146][T14340] __should_failslab+0x81/0x90 [ 298.765174][T14340] should_failslab+0x5/0x20 [ 298.772602][T14332] FAT-fs (loop2): Directory bread(block 5) failed [ 298.777114][T14340] kmem_cache_alloc+0x46/0x2f0 06:32:17 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:17 executing program 2 (fault-call:0 fault-nth:26): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 298.777157][T14340] security_inode_alloc+0x30/0x180 [ 298.783361][T14332] FAT-fs (loop2): Directory bread(block 6) failed [ 298.787134][T14340] inode_init_always+0x20b/0x420 [ 298.794738][T14332] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/289/file0 supports timestamps until 2107 (0x10391447e) [ 298.798745][T14340] ? shmem_match+0xa0/0xa0 [ 298.798772][T14340] new_inode_pseudo+0x73/0x1c0 [ 298.798790][T14340] new_inode+0x21/0x120 [ 298.798806][T14340] shmem_get_inode+0xa1/0x480 [ 298.849776][T14340] __shmem_file_setup+0xf1/0x1d0 [ 298.854825][T14340] shmem_file_setup+0x37/0x40 [ 298.859663][T14340] __se_sys_memfd_create+0x1eb/0x390 [ 298.866001][T14340] __x64_sys_memfd_create+0x2d/0x40 [ 298.871603][T14340] do_syscall_64+0x4a/0x90 [ 298.876428][T14340] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 298.882576][T14340] RIP: 0033:0x4665d9 [ 298.886650][T14340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 298.906907][T14340] RSP: 002b:00007f9731b93f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 298.917237][T14340] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 298.925197][T14340] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 298.933325][T14340] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 298.941629][T14340] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 298.949920][T14340] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 298.959290][T14339] loop1: detected capacity change from 0 to 1 [ 298.965951][T14350] FAULT_INJECTION: forcing a failure. [ 298.965951][T14350] name failslab, interval 1, probability 0, space 0, times 0 [ 298.969083][T14339] FAT-fs (loop1): Directory bread(block 3) failed [ 298.979186][T14350] CPU: 0 PID: 14350 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 298.979209][T14350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.986323][T14339] FAT-fs (loop1): Directory bread(block 4) failed [ 298.995166][T14350] Call Trace: [ 298.995178][T14350] dump_stack+0x137/0x19d [ 298.995202][T14350] should_fail+0x23c/0x250 [ 299.006210][T14339] FAT-fs (loop1): Directory bread(block 5) failed [ 299.012381][T14350] ? security_inode_alloc+0x30/0x180 [ 299.016051][T14339] FAT-fs (loop1): Directory bread(block 6) failed [ 299.021063][T14350] __should_failslab+0x81/0x90 06:32:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x78, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:17 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 299.021089][T14350] should_failslab+0x5/0x20 [ 299.026183][T14339] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/379/file0 supports timestamps until 2107 (0x10391447e) [ 299.032245][T14350] kmem_cache_alloc+0x46/0x2f0 [ 299.032271][T14350] security_inode_alloc+0x30/0x180 [ 299.082946][T14350] inode_init_always+0x20b/0x420 [ 299.088464][T14350] ? shmem_match+0xa0/0xa0 [ 299.093063][T14350] new_inode_pseudo+0x73/0x1c0 [ 299.098038][T14350] new_inode+0x21/0x120 [ 299.102453][T14350] shmem_get_inode+0xa1/0x480 [ 299.107201][T14358] FAULT_INJECTION: forcing a failure. [ 299.107201][T14358] name failslab, interval 1, probability 0, space 0, times 0 [ 299.107289][T14350] __shmem_file_setup+0xf1/0x1d0 [ 299.128077][T14350] shmem_file_setup+0x37/0x40 [ 299.132893][T14350] __se_sys_memfd_create+0x1eb/0x390 [ 299.138240][T14350] __x64_sys_memfd_create+0x2d/0x40 [ 299.143522][T14350] do_syscall_64+0x4a/0x90 [ 299.148102][T14350] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 299.154161][T14350] RIP: 0033:0x4665d9 [ 299.158653][T14350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 299.179346][T14350] RSP: 002b:00007ff264912f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 299.188632][T14350] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 299.197026][T14350] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 299.205332][T14350] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 299.213387][T14350] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 299.221516][T14350] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 299.229737][T14358] CPU: 1 PID: 14358 Comm: syz-executor.4 Not tainted 5.13.0-rc2-syzkaller #0 [ 299.238822][T14358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.249606][T14358] Call Trace: [ 299.252996][T14358] dump_stack+0x137/0x19d [ 299.257343][T14358] should_fail+0x23c/0x250 [ 299.261916][T14358] ? __d_alloc+0x36/0x370 [ 299.266412][T14358] __should_failslab+0x81/0x90 [ 299.271612][T14358] should_failslab+0x5/0x20 [ 299.276864][T14358] kmem_cache_alloc+0x46/0x2f0 [ 299.282137][T14358] ? __init_rwsem+0x59/0x70 [ 299.286648][T14358] __d_alloc+0x36/0x370 [ 299.291114][T14358] ? current_time+0xdb/0x190 [ 299.296053][T14358] d_alloc_pseudo+0x1a/0x50 [ 299.300746][T14358] alloc_file_pseudo+0x63/0x130 [ 299.305856][T14358] __shmem_file_setup+0x14c/0x1d0 [ 299.310885][T14358] shmem_file_setup+0x37/0x40 [ 299.316011][T14358] __se_sys_memfd_create+0x1eb/0x390 [ 299.321883][T14358] __x64_sys_memfd_create+0x2d/0x40 [ 299.328041][T14358] do_syscall_64+0x4a/0x90 [ 299.332855][T14358] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 299.338958][T14358] RIP: 0033:0x4665d9 [ 299.343188][T14358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 299.364193][T14358] RSP: 002b:00007f9731b93f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 299.373046][T14358] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 299.381311][T14358] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 299.390693][T14358] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 299.399365][T14358] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 299.407984][T14358] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 299.446440][T14366] loop2: detected capacity change from 0 to 1 [ 299.453147][T14366] FAULT_INJECTION: forcing a failure. [ 299.453147][T14366] name failslab, interval 1, probability 0, space 0, times 0 [ 299.467934][T14366] CPU: 1 PID: 14366 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 299.478117][T14366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.489452][T14366] Call Trace: [ 299.493097][T14366] dump_stack+0x137/0x19d [ 299.498010][T14366] should_fail+0x23c/0x250 [ 299.502779][T14366] __should_failslab+0x81/0x90 [ 299.507631][T14366] ? call_usermodehelper_setup+0x81/0x160 [ 299.513486][T14366] should_failslab+0x5/0x20 [ 299.518134][T14366] kmem_cache_alloc_trace+0x49/0x310 [ 299.523582][T14366] ? add_uevent_var+0x16e/0x1c0 [ 299.528654][T14366] ? __kfree_skb+0xfe/0x150 [ 299.533347][T14366] call_usermodehelper_setup+0x81/0x160 [ 299.539125][T14366] ? add_uevent_var+0x1c0/0x1c0 [ 299.544261][T14366] kobject_uevent_env+0xb29/0xc40 [ 299.549539][T14366] kobject_uevent+0x18/0x20 [ 299.554301][T14366] loop_configure+0xb3c/0xcb0 [ 299.559524][T14366] lo_ioctl+0x555/0x11f0 [ 299.564237][T14366] ? path_openat+0x19ab/0x20b0 [ 299.569045][T14366] ? putname+0xa5/0xc0 [ 299.573986][T14366] ? ___cache_free+0x3c/0x300 [ 299.579132][T14366] ? blkdev_common_ioctl+0x9c3/0x1040 [ 299.585231][T14366] ? selinux_file_ioctl+0x8e0/0x970 [ 299.590647][T14366] ? lo_release+0x120/0x120 [ 299.595694][T14366] blkdev_ioctl+0x1d0/0x3c0 [ 299.600342][T14366] block_ioctl+0x6d/0x80 [ 299.604693][T14366] ? blkdev_iopoll+0x70/0x70 [ 299.609879][T14366] __se_sys_ioctl+0xcb/0x140 [ 299.614638][T14366] __x64_sys_ioctl+0x3f/0x50 [ 299.619349][T14366] do_syscall_64+0x4a/0x90 [ 299.624178][T14366] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 299.630396][T14366] RIP: 0033:0x466397 [ 299.634286][T14366] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 299.654918][T14366] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 299.664488][T14366] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 299.672664][T14366] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 299.680848][T14366] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 299.689165][T14366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 06:32:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3d4, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:18 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:18 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 299.697384][T14366] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 299.724357][T14366] FAT-fs (loop2): Directory bread(block 3) failed [ 299.739168][T14366] FAT-fs (loop2): Directory bread(block 4) failed [ 299.753921][T14366] FAT-fs (loop2): Directory bread(block 5) failed [ 299.761250][T14380] FAULT_INJECTION: forcing a failure. [ 299.761250][T14380] name failslab, interval 1, probability 0, space 0, times 0 [ 299.774398][T14382] FAULT_INJECTION: forcing a failure. [ 299.774398][T14382] name failslab, interval 1, probability 0, space 0, times 0 [ 299.774557][T14380] CPU: 1 PID: 14380 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 299.796579][T14380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.807095][T14380] Call Trace: [ 299.810682][T14380] dump_stack+0x137/0x19d [ 299.815571][T14380] should_fail+0x23c/0x250 [ 299.819996][T14380] ? __d_alloc+0x36/0x370 [ 299.824432][T14380] __should_failslab+0x81/0x90 [ 299.829444][T14380] should_failslab+0x5/0x20 [ 299.834130][T14380] kmem_cache_alloc+0x46/0x2f0 [ 299.839069][T14380] ? __init_rwsem+0x59/0x70 [ 299.844186][T14380] __d_alloc+0x36/0x370 [ 299.848946][T14380] ? current_time+0xdb/0x190 [ 299.853520][T14380] d_alloc_pseudo+0x1a/0x50 [ 299.858425][T14380] alloc_file_pseudo+0x63/0x130 [ 299.864016][T14380] __shmem_file_setup+0x14c/0x1d0 [ 299.870052][T14380] shmem_file_setup+0x37/0x40 [ 299.874745][T14380] __se_sys_memfd_create+0x1eb/0x390 [ 299.880040][T14380] __x64_sys_memfd_create+0x2d/0x40 [ 299.885735][T14380] do_syscall_64+0x4a/0x90 [ 299.890155][T14380] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 299.896275][T14380] RIP: 0033:0x4665d9 [ 299.900259][T14380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 299.920813][T14380] RSP: 002b:00007ff264912f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 299.929504][T14380] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 299.938784][T14380] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 299.947207][T14380] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 299.955814][T14380] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 299.963788][T14380] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 299.972042][T14382] CPU: 0 PID: 14382 Comm: syz-executor.4 Not tainted 5.13.0-rc2-syzkaller #0 [ 299.972161][T14376] loop1: detected capacity change from 0 to 1 [ 299.981833][T14382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.981847][T14382] Call Trace: [ 299.981853][T14382] dump_stack+0x137/0x19d [ 299.981877][T14382] should_fail+0x23c/0x250 [ 299.981900][T14382] ? __alloc_file+0x2e/0x1a0 [ 299.981915][T14382] __should_failslab+0x81/0x90 [ 299.981933][T14382] should_failslab+0x5/0x20 [ 299.981952][T14382] kmem_cache_alloc+0x46/0x2f0 [ 299.999186][T14366] FAT-fs (loop2): Directory bread(block 6) failed [ 299.999543][T14382] ? inode_doinit_with_dentry+0x382/0x950 06:32:18 executing program 2 (fault-call:0 fault-nth:27): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x240, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) [ 300.003203][T14366] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/290/file0 supports timestamps until 2107 (0x10391447e) [ 300.007536][T14382] __alloc_file+0x2e/0x1a0 [ 300.007560][T14382] alloc_empty_file+0xcd/0x1c0 [ 300.007577][T14382] alloc_file+0x3a/0x280 [ 300.007593][T14382] alloc_file_pseudo+0xe2/0x130 [ 300.035053][T14376] FAT-fs (loop1): Directory bread(block 3) failed [ 300.038672][T14382] __shmem_file_setup+0x14c/0x1d0 [ 300.045708][T14376] FAT-fs (loop1): Directory bread(block 4) failed [ 300.059688][T14382] shmem_file_setup+0x37/0x40 06:32:18 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 300.059720][T14382] __se_sys_memfd_create+0x1eb/0x390 [ 300.059741][T14382] __x64_sys_memfd_create+0x2d/0x40 [ 300.059760][T14382] do_syscall_64+0x4a/0x90 [ 300.073930][T14384] loop5: detected capacity change from 0 to 131456 [ 300.078349][T14382] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 300.078378][T14382] RIP: 0033:0x4665d9 [ 300.078393][T14382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:32:18 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 300.125445][T14384] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 300.130782][T14382] RSP: 002b:00007f9731b93f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 300.130805][T14382] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 300.130817][T14382] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 300.135169][T14384] EXT4-fs (loop5): group descriptors corrupted! [ 300.155474][T14382] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 300.155491][T14382] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 300.155501][T14382] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 300.160513][T14376] FAT-fs (loop1): Directory bread(block 5) failed [ 300.222105][T14396] FAULT_INJECTION: forcing a failure. [ 300.222105][T14396] name failslab, interval 1, probability 0, space 0, times 0 [ 300.227359][T14402] FAULT_INJECTION: forcing a failure. [ 300.227359][T14402] name failslab, interval 1, probability 0, space 0, times 0 [ 300.230134][T14396] CPU: 1 PID: 14396 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 300.265238][T14396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.275469][T14396] Call Trace: [ 300.278833][T14396] dump_stack+0x137/0x19d [ 300.283245][T14396] should_fail+0x23c/0x250 [ 300.288169][T14396] ? __alloc_file+0x2e/0x1a0 [ 300.292755][T14396] __should_failslab+0x81/0x90 [ 300.297792][T14396] should_failslab+0x5/0x20 [ 300.302669][T14396] kmem_cache_alloc+0x46/0x2f0 [ 300.307618][T14396] ? inode_doinit_with_dentry+0x382/0x950 [ 300.313335][T14396] __alloc_file+0x2e/0x1a0 [ 300.317766][T14396] alloc_empty_file+0xcd/0x1c0 [ 300.322690][T14396] alloc_file+0x3a/0x280 [ 300.327026][T14396] alloc_file_pseudo+0xe2/0x130 [ 300.331898][T14396] __shmem_file_setup+0x14c/0x1d0 [ 300.337011][T14396] shmem_file_setup+0x37/0x40 [ 300.341763][T14396] __se_sys_memfd_create+0x1eb/0x390 [ 300.347557][T14396] __x64_sys_memfd_create+0x2d/0x40 [ 300.352742][T14396] do_syscall_64+0x4a/0x90 [ 300.357361][T14396] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 300.364128][T14396] RIP: 0033:0x4665d9 [ 300.368122][T14396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 300.388959][T14396] RSP: 002b:00007ff264912f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 300.397647][T14396] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 300.406330][T14396] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 300.414555][T14396] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 300.422861][T14396] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 300.430917][T14396] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 300.439376][T14402] CPU: 0 PID: 14402 Comm: syz-executor.4 Not tainted 5.13.0-rc2-syzkaller #0 [ 300.442010][T14376] FAT-fs (loop1): Directory bread(block 6) failed 06:32:19 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 300.448240][T14402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.448253][T14402] Call Trace: [ 300.448260][T14402] dump_stack+0x137/0x19d [ 300.455337][T14376] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/380/file0 supports timestamps until 2107 (0x10391447e) [ 300.466086][T14402] should_fail+0x23c/0x250 [ 300.466108][T14402] ? security_file_alloc+0x30/0x190 [ 300.466125][T14402] __should_failslab+0x81/0x90 [ 300.503387][T14402] should_failslab+0x5/0x20 [ 300.507918][T14402] kmem_cache_alloc+0x46/0x2f0 [ 300.513174][T14402] security_file_alloc+0x30/0x190 [ 300.518187][T14402] __alloc_file+0x83/0x1a0 [ 300.522763][T14402] alloc_empty_file+0xcd/0x1c0 [ 300.527721][T14402] alloc_file+0x3a/0x280 [ 300.532140][T14402] alloc_file_pseudo+0xe2/0x130 [ 300.537208][T14402] __shmem_file_setup+0x14c/0x1d0 [ 300.542269][T14402] shmem_file_setup+0x37/0x40 [ 300.547216][T14402] __se_sys_memfd_create+0x1eb/0x390 [ 300.553233][T14402] __x64_sys_memfd_create+0x2d/0x40 [ 300.559885][T14402] do_syscall_64+0x4a/0x90 [ 300.564532][T14402] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 300.570780][T14402] RIP: 0033:0x4665d9 [ 300.575378][T14402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 300.596189][T14402] RSP: 002b:00007f9731b93f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 06:32:19 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 300.605077][T14402] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 300.613317][T14402] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 300.621533][T14402] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 300.629865][T14402] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 300.638285][T14402] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 06:32:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x7a, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 300.688275][T14410] FAULT_INJECTION: forcing a failure. [ 300.688275][T14410] name failslab, interval 1, probability 0, space 0, times 0 [ 300.701318][T14410] CPU: 0 PID: 14410 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 300.710745][T14410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.721696][T14410] Call Trace: [ 300.724981][T14410] dump_stack+0x137/0x19d [ 300.729742][T14410] should_fail+0x23c/0x250 [ 300.734327][T14410] ? security_file_alloc+0x30/0x190 [ 300.739749][T14410] __should_failslab+0x81/0x90 [ 300.744904][T14410] should_failslab+0x5/0x20 [ 300.746560][T14413] loop2: detected capacity change from 0 to 1 [ 300.749889][T14410] kmem_cache_alloc+0x46/0x2f0 [ 300.757953][T14413] FAULT_INJECTION: forcing a failure. [ 300.757953][T14413] name failslab, interval 1, probability 0, space 0, times 0 [ 300.761844][T14410] security_file_alloc+0x30/0x190 [ 300.780485][T14410] __alloc_file+0x83/0x1a0 [ 300.785613][T14410] alloc_empty_file+0xcd/0x1c0 [ 300.790655][T14410] alloc_file+0x3a/0x280 [ 300.795047][T14410] alloc_file_pseudo+0xe2/0x130 [ 300.800107][T14410] __shmem_file_setup+0x14c/0x1d0 [ 300.805578][T14410] shmem_file_setup+0x37/0x40 [ 300.810311][T14410] __se_sys_memfd_create+0x1eb/0x390 [ 300.816584][T14410] __x64_sys_memfd_create+0x2d/0x40 [ 300.822309][T14410] do_syscall_64+0x4a/0x90 [ 300.826897][T14410] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 300.833160][T14410] RIP: 0033:0x4665d9 [ 300.837344][T14410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 300.857839][T14410] RSP: 002b:00007ff264912f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 300.866358][T14410] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665d9 [ 300.874541][T14410] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 300.882940][T14410] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 300.890989][T14410] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 300.899037][T14410] R13: 0000000020000100 R14: 0000000004030010 R15: 0000000020013800 [ 300.907574][T14413] CPU: 1 PID: 14413 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 300.915744][T14418] FAULT_INJECTION: forcing a failure. [ 300.915744][T14418] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 300.917167][T14413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.917179][T14413] Call Trace: [ 300.917186][T14413] dump_stack+0x137/0x19d [ 300.949214][T14413] should_fail+0x23c/0x250 [ 300.953999][T14413] __should_failslab+0x81/0x90 [ 300.958852][T14413] ? call_usermodehelper_setup+0x81/0x160 [ 300.964650][T14413] should_failslab+0x5/0x20 [ 300.969285][T14413] kmem_cache_alloc_trace+0x49/0x310 [ 300.974856][T14413] ? add_uevent_var+0x16e/0x1c0 [ 300.979791][T14413] ? __kfree_skb+0xfe/0x150 [ 300.984439][T14413] call_usermodehelper_setup+0x81/0x160 [ 300.990173][T14413] ? add_uevent_var+0x1c0/0x1c0 [ 300.995282][T14413] kobject_uevent_env+0xb29/0xc40 [ 301.000656][T14413] kobject_uevent+0x18/0x20 [ 301.005210][T14413] loop_configure+0xb3c/0xcb0 [ 301.010392][T14413] lo_ioctl+0x555/0x11f0 [ 301.014910][T14413] ? path_openat+0x19ab/0x20b0 [ 301.020098][T14413] ? putname+0xa5/0xc0 [ 301.024729][T14413] ? ___cache_free+0x3c/0x300 [ 301.029830][T14413] ? blkdev_common_ioctl+0x9c3/0x1040 [ 301.036038][T14413] ? selinux_file_ioctl+0x8e0/0x970 [ 301.042560][T14413] ? lo_release+0x120/0x120 [ 301.048292][T14413] blkdev_ioctl+0x1d0/0x3c0 [ 301.057627][T14413] block_ioctl+0x6d/0x80 [ 301.063064][T14413] ? blkdev_iopoll+0x70/0x70 [ 301.069133][T14413] __se_sys_ioctl+0xcb/0x140 [ 301.075417][T14413] __x64_sys_ioctl+0x3f/0x50 [ 301.080725][T14413] do_syscall_64+0x4a/0x90 [ 301.085521][T14413] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 301.092100][T14413] RIP: 0033:0x466397 [ 301.096249][T14413] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 301.117409][T14413] RSP: 002b:00007faddd5a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 301.129068][T14413] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 06:32:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3d5, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 301.138164][T14413] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 301.147010][T14413] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 301.155613][T14413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 301.164094][T14413] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 301.172391][T14418] CPU: 0 PID: 14418 Comm: syz-executor.4 Not tainted 5.13.0-rc2-syzkaller #0 [ 301.181533][T14418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.191927][T14418] Call Trace: [ 301.195559][T14418] dump_stack+0x137/0x19d [ 301.200173][T14418] should_fail+0x23c/0x250 [ 301.205383][T14418] __alloc_pages+0x102/0x320 [ 301.210288][T14418] alloc_pages_vma+0x391/0x660 [ 301.215142][T14418] shmem_getpage_gfp+0x980/0x1410 [ 301.220533][T14418] ? mls_context_isvalid+0x76/0x1e0 [ 301.226472][T14418] shmem_write_begin+0x7e/0x100 [ 301.232029][T14418] generic_perform_write+0x196/0x3a0 [ 301.237765][T14418] ? file_update_time+0x1bd/0x3e0 [ 301.242862][T14418] __generic_file_write_iter+0x161/0x300 [ 301.249150][T14418] ? generic_write_checks+0x250/0x290 [ 301.254906][T14418] generic_file_write_iter+0x75/0x130 [ 301.260540][T14418] vfs_write+0x69d/0x770 [ 301.265285][T14418] __x64_sys_pwrite64+0xf5/0x150 [ 301.270379][T14418] do_syscall_64+0x4a/0x90 [ 301.275700][T14418] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 301.282235][T14418] RIP: 0033:0x419777 [ 301.286547][T14418] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 301.307887][T14418] RSP: 002b:00007f9731b93f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 301.317244][T14418] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 301.326972][T14418] RDX: 000000000000003a RSI: 0000000020000080 RDI: 0000000000000004 [ 301.335891][T14418] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 301.344316][T14418] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 301.353283][T14418] R13: 0000000000000004 R14: 0000000020000300 R15: 0000000000000000 06:32:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x77dc}], 0x1}, 0x700) [ 301.382857][T14425] loop5: detected capacity change from 0 to 131456 [ 301.392071][T14425] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 301.402838][T14425] EXT4-fs (loop5): group descriptors corrupted! [ 301.417461][T14413] FAT-fs (loop2): Directory bread(block 3) failed [ 301.425993][T14413] FAT-fs (loop2): Directory bread(block 4) failed 06:32:20 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x26c8, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 301.433860][T14413] FAT-fs (loop2): Directory bread(block 5) failed [ 301.442120][T14413] FAT-fs (loop2): Directory bread(block 6) failed [ 301.449232][T14413] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/291/file0 supports timestamps until 2107 (0x10391447e) [ 301.486624][T14437] FAULT_INJECTION: forcing a failure. [ 301.486624][T14437] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 301.492606][T14418] loop4: detected capacity change from 0 to 131456 [ 301.500647][T14437] CPU: 0 PID: 14437 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 301.509312][T14418] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 301.516120][T14437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.516156][T14437] Call Trace: [ 301.516163][T14437] dump_stack+0x137/0x19d [ 301.524018][T14439] loop1: detected capacity change from 0 to 1 [ 301.533483][T14437] should_fail+0x23c/0x250 [ 301.533513][T14437] __alloc_pages+0x102/0x320 [ 301.542888][T14439] FAT-fs (loop1): Directory bread(block 3) failed [ 301.547264][T14437] alloc_pages_vma+0x391/0x660 [ 301.552028][T14439] FAT-fs (loop1): Directory bread(block 4) failed [ 301.556479][T14437] shmem_getpage_gfp+0x980/0x1410 06:32:20 executing program 2 (fault-call:0 fault-nth:28): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 301.563513][T14439] FAT-fs (loop1): Directory bread(block 5) failed [ 301.568611][T14437] ? mls_context_isvalid+0x76/0x1e0 [ 301.575902][T14439] FAT-fs (loop1): Directory bread(block 6) failed [ 301.581135][T14437] shmem_write_begin+0x7e/0x100 [ 301.589711][T14439] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/381/file0 supports timestamps until 2107 (0x10391447e) [ 301.593094][T14437] generic_perform_write+0x196/0x3a0 [ 301.625400][T14437] ? file_update_time+0x1bd/0x3e0 [ 301.630422][T14437] __generic_file_write_iter+0x161/0x300 [ 301.636307][T14437] ? generic_write_checks+0x250/0x290 [ 301.642196][T14437] generic_file_write_iter+0x75/0x130 [ 301.647812][T14437] vfs_write+0x69d/0x770 [ 301.652148][T14437] __x64_sys_pwrite64+0xf5/0x150 [ 301.657230][T14437] do_syscall_64+0x4a/0x90 [ 301.662526][T14437] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 301.669087][T14437] RIP: 0033:0x419777 06:32:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x10e, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 301.673314][T14437] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 301.694378][T14437] RSP: 002b:00007ff264912f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 301.703448][T14437] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 301.711991][T14437] RDX: 000000000000003a RSI: 0000000020000080 RDI: 0000000000000004 [ 301.720131][T14437] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 301.728729][T14437] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 06:32:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 301.736986][T14437] R13: 0000000000000004 R14: 0000000020000300 R15: 0000000000000000 [ 301.778265][T14437] loop3: detected capacity change from 0 to 131456 [ 301.805681][T14458] loop4: detected capacity change from 0 to 131456 [ 301.811249][T14437] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 06:32:20 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 301.821030][T14458] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 301.831512][T14458] EXT4-fs (loop4): group descriptors corrupted! [ 301.839065][T14466] loop1: detected capacity change from 0 to 1 [ 301.856232][T14466] FAT-fs (loop1): Directory bread(block 3) failed [ 301.871318][T14465] loop2: detected capacity change from 0 to 1 [ 301.889852][T14465] FAULT_INJECTION: forcing a failure. [ 301.889852][T14465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 301.894330][T14466] FAT-fs (loop1): Directory bread(block 4) failed [ 301.903673][T14465] CPU: 1 PID: 14465 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 301.913679][T14473] FAULT_INJECTION: forcing a failure. [ 301.913679][T14473] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 301.920259][T14465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.920274][T14465] Call Trace: [ 301.920282][T14465] dump_stack+0x137/0x19d [ 301.920307][T14465] should_fail+0x23c/0x250 [ 301.958951][T14465] should_fail_usercopy+0x16/0x20 [ 301.964335][T14465] strncpy_from_user+0x21/0x250 [ 301.969901][T14465] getname_flags+0xb8/0x3d0 [ 301.974533][T14465] do_mkdirat+0x3b/0x200 [ 301.978937][T14465] __x64_sys_mkdir+0x32/0x40 [ 301.983548][T14465] do_syscall_64+0x4a/0x90 [ 301.988269][T14465] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 301.994856][T14465] RIP: 0033:0x4656e7 [ 301.999327][T14465] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 302.019387][T14465] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 302.030438][T14465] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 302.039033][T14465] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 302.047784][T14465] RBP: 00007faddd5a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 302.055745][T14465] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 302.064535][T14465] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 302.072788][T14473] CPU: 0 PID: 14473 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 302.077342][T14466] FAT-fs (loop1): Directory bread(block 5) failed [ 302.082864][T14473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.082879][T14473] Call Trace: [ 302.082887][T14473] dump_stack+0x137/0x19d [ 302.089937][T14466] FAT-fs (loop1): Directory bread(block 6) failed [ 302.100330][T14473] should_fail+0x23c/0x250 [ 302.100358][T14473] should_fail_usercopy+0x16/0x20 [ 302.100376][T14473] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 302.100394][T14473] ? shmem_write_begin+0x7e/0x100 [ 302.100417][T14473] generic_perform_write+0x1e4/0x3a0 [ 302.110314][T14451] loop5: detected capacity change from 0 to 131456 [ 302.115421][T14473] ? file_update_time+0x1bd/0x3e0 [ 302.115448][T14473] __generic_file_write_iter+0x161/0x300 [ 302.115469][T14473] ? generic_write_checks+0x250/0x290 [ 302.167813][T14473] generic_file_write_iter+0x75/0x130 [ 302.173326][T14473] vfs_write+0x69d/0x770 [ 302.177922][T14473] __x64_sys_pwrite64+0xf5/0x150 [ 302.183297][T14473] do_syscall_64+0x4a/0x90 [ 302.187977][T14473] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 302.194089][T14473] RIP: 0033:0x419777 [ 302.198166][T14473] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 302.218833][T14473] RSP: 002b:00007ff264912f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 302.227676][T14473] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 302.236056][T14473] RDX: 000000000000003a RSI: 0000000020000080 RDI: 0000000000000004 [ 302.244465][T14473] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 302.252958][T14473] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 302.261647][T14473] R13: 0000000000000004 R14: 0000000020000300 R15: 0000000000000000 [ 302.271014][T14466] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/382/file0 supports timestamps until 2107 (0x10391447e) 06:32:21 executing program 2 (fault-call:0 fault-nth:29): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 302.275748][T14451] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 302.296842][T14451] EXT4-fs (loop5): group descriptors corrupted! [ 302.307001][T14473] loop3: detected capacity change from 0 to 131456 06:32:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030002, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xefb8}], 0x1}, 0x700) 06:32:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x179, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 302.345809][T14473] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 302.356440][T14473] EXT4-fs (loop3): group descriptors corrupted! [ 302.369190][T14486] loop2: detected capacity change from 0 to 1 [ 302.385408][T14486] FAULT_INJECTION: forcing a failure. [ 302.385408][T14486] name failslab, interval 1, probability 0, space 0, times 0 [ 302.399211][T14486] CPU: 0 PID: 14486 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 302.408354][T14486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.415392][T14451] loop5: detected capacity change from 0 to 131456 [ 302.419472][T14486] Call Trace: [ 302.419481][T14486] dump_stack+0x137/0x19d [ 302.426809][T14451] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 302.429585][T14486] should_fail+0x23c/0x250 [ 302.429621][T14486] ? __d_alloc+0x36/0x370 [ 302.434126][T14451] EXT4-fs (loop5): group descriptors corrupted! [ 302.445236][T14486] __should_failslab+0x81/0x90 [ 302.445266][T14486] should_failslab+0x5/0x20 [ 302.445291][T14486] kmem_cache_alloc+0x46/0x2f0 [ 302.445317][T14486] __d_alloc+0x36/0x370 [ 302.445331][T14486] ? __perf_event_task_sched_out+0xce0/0xd30 [ 302.445352][T14486] ? putname+0xa5/0xc0 [ 302.451013][T14490] loop4: detected capacity change from 0 to 131456 [ 302.454278][T14486] d_alloc+0x2a/0x130 [ 302.462853][T14490] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 302.465446][T14486] __lookup_hash+0x8f/0x180 [ 302.465469][T14486] filename_create+0xdb/0x3c0 [ 302.465488][T14486] do_mkdirat+0x59/0x200 [ 302.470258][T14490] EXT4-fs (loop4): group descriptors corrupted! [ 302.475093][T14486] __x64_sys_mkdir+0x32/0x40 [ 302.475116][T14486] do_syscall_64+0x4a/0x90 [ 302.475134][T14486] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 302.551827][T14486] RIP: 0033:0x4656e7 [ 302.555895][T14486] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 302.576562][T14486] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 302.585797][T14486] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 06:32:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x26d6, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 302.593915][T14486] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 302.602489][T14486] RBP: 00007faddd5a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 302.611133][T14486] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 302.619621][T14486] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:21 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:21 executing program 2 (fault-call:0 fault-nth:30): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 302.676990][T14504] loop1: detected capacity change from 0 to 1 [ 302.685373][T14504] FAT-fs (loop1): Directory bread(block 3) failed [ 302.692265][T14504] FAT-fs (loop1): Directory bread(block 4) failed [ 302.699203][T14490] loop4: detected capacity change from 0 to 131456 [ 302.725888][T14516] FAULT_INJECTION: forcing a failure. [ 302.725888][T14516] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 302.739729][T14516] CPU: 1 PID: 14516 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 302.744966][T14504] FAT-fs (loop1): Directory bread(block 5) failed [ 302.749190][T14516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.749203][T14516] Call Trace: [ 302.749209][T14516] dump_stack+0x137/0x19d [ 302.774406][T14516] should_fail+0x23c/0x250 [ 302.779282][T14516] should_fail_usercopy+0x16/0x20 [ 302.784368][T14516] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 302.790652][T14516] ? shmem_write_begin+0x7e/0x100 [ 302.793561][T14504] FAT-fs (loop1): Directory bread(block 6) failed [ 302.795955][T14516] generic_perform_write+0x1e4/0x3a0 [ 302.795984][T14516] ? file_update_time+0x1bd/0x3e0 [ 302.813172][T14516] __generic_file_write_iter+0x161/0x300 [ 302.819240][T14516] ? generic_write_checks+0x250/0x290 [ 302.824710][T14516] generic_file_write_iter+0x75/0x130 [ 302.830166][T14516] vfs_write+0x69d/0x770 [ 302.834876][T14516] __x64_sys_pwrite64+0xf5/0x150 [ 302.835170][T14490] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 302.839917][T14516] do_syscall_64+0x4a/0x90 [ 302.850330][T14490] EXT4-fs (loop4): group descriptors corrupted! [ 302.855128][T14516] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 302.867458][T14516] RIP: 0033:0x419777 [ 302.871392][T14516] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 302.889746][T14504] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/383/file0 supports timestamps until 2107 (0x10391447e) [ 302.891527][T14516] RSP: 002b:00007ff264912f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 302.891549][T14516] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 06:32:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x204, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 302.891561][T14516] RDX: 0000000000000001 RSI: 0000000020000040 RDI: 0000000000000004 [ 302.919121][T14521] loop2: detected capacity change from 0 to 1 [ 302.923968][T14516] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 302.923985][T14516] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 302.923997][T14516] R13: 0000000000000004 R14: 0000000020000318 R15: 0000000000000001 [ 302.932402][T14514] loop5: detected capacity change from 0 to 131456 [ 302.966718][T14521] FAULT_INJECTION: forcing a failure. [ 302.966718][T14521] name failslab, interval 1, probability 0, space 0, times 0 [ 302.972154][T14514] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 302.983228][T14521] CPU: 1 PID: 14521 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 302.993649][T14514] EXT4-fs (loop5): group descriptors corrupted! [ 303.002572][T14521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.002586][T14521] Call Trace: [ 303.002593][T14521] dump_stack+0x137/0x19d [ 303.021154][T14516] loop3: detected capacity change from 0 to 131456 [ 303.023188][T14521] should_fail+0x23c/0x250 [ 303.023213][T14521] ? ext4_alloc_inode+0x27/0x300 [ 303.045666][T14521] __should_failslab+0x81/0x90 [ 303.051530][T14521] ? set_qf_name+0x230/0x230 [ 303.057166][T14521] should_failslab+0x5/0x20 [ 303.062116][T14521] kmem_cache_alloc+0x46/0x2f0 [ 303.067152][T14521] ? ebitmap_destroy+0x91/0xa0 [ 303.072476][T14521] ? set_qf_name+0x230/0x230 [ 303.077322][T14521] ext4_alloc_inode+0x27/0x300 [ 303.082479][T14521] ? set_qf_name+0x230/0x230 [ 303.088177][T14521] new_inode_pseudo+0x38/0x1c0 [ 303.093331][T14521] new_inode+0x21/0x120 [ 303.097696][T14521] __ext4_new_inode+0x126/0x2f70 [ 303.103700][T14521] ? __dquot_initialize+0x131/0x7e0 [ 303.109045][T14521] ext4_mkdir+0x28a/0x760 [ 303.114222][T14521] vfs_mkdir+0x2a4/0x370 [ 303.118952][T14521] do_mkdirat+0x11d/0x200 [ 303.125206][T14521] __x64_sys_mkdir+0x32/0x40 [ 303.130735][T14521] do_syscall_64+0x4a/0x90 [ 303.135831][T14521] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 303.142187][T14521] RIP: 0033:0x4656e7 [ 303.146435][T14521] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 303.167626][T14521] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 06:32:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x16794}], 0x1}, 0x700) [ 303.176032][T14521] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 303.184103][T14521] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 303.192421][T14521] RBP: 00007faddd5a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 303.201042][T14521] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 303.209900][T14521] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403000a, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:21 executing program 2 (fault-call:0 fault-nth:31): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 303.241312][T14516] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 303.251730][T14516] EXT4-fs (loop3): group descriptors corrupted! 06:32:22 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 303.311427][T14545] loop1: detected capacity change from 0 to 1 [ 303.317890][T14551] loop4: detected capacity change from 0 to 131456 [ 303.333157][T14551] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 303.339488][T14545] FAT-fs (loop1): Directory bread(block 3) failed [ 303.343374][T14551] EXT4-fs (loop4): group descriptors corrupted! [ 303.376413][T14553] loop2: detected capacity change from 0 to 1 [ 303.397579][T14553] FAULT_INJECTION: forcing a failure. [ 303.397579][T14553] name failslab, interval 1, probability 0, space 0, times 0 [ 303.411210][T14553] CPU: 1 PID: 14553 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 303.416436][T14545] FAT-fs (loop1): Directory bread(block 4) failed [ 303.420697][T14553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.420712][T14553] Call Trace: [ 303.420719][T14553] dump_stack+0x137/0x19d [ 303.428148][T14565] FAULT_INJECTION: forcing a failure. [ 303.428148][T14565] name failslab, interval 1, probability 0, space 0, times 0 [ 303.438381][T14553] should_fail+0x23c/0x250 [ 303.438408][T14553] ? security_inode_alloc+0x30/0x180 [ 303.469968][T14553] __should_failslab+0x81/0x90 [ 303.474989][T14553] should_failslab+0x5/0x20 [ 303.479491][T14553] kmem_cache_alloc+0x46/0x2f0 [ 303.484339][T14553] security_inode_alloc+0x30/0x180 [ 303.489890][T14553] inode_init_always+0x20b/0x420 [ 303.496011][T14553] ? set_qf_name+0x230/0x230 [ 303.500839][T14553] new_inode_pseudo+0x73/0x1c0 [ 303.505687][T14553] new_inode+0x21/0x120 [ 303.509899][T14553] __ext4_new_inode+0x126/0x2f70 [ 303.515078][T14553] ? __dquot_initialize+0x131/0x7e0 [ 303.520373][T14553] ext4_mkdir+0x28a/0x760 [ 303.524922][T14553] vfs_mkdir+0x2a4/0x370 [ 303.529500][T14553] do_mkdirat+0x11d/0x200 [ 303.534183][T14553] __x64_sys_mkdir+0x32/0x40 [ 303.538940][T14553] do_syscall_64+0x4a/0x90 [ 303.543864][T14553] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 303.549928][T14553] RIP: 0033:0x4656e7 [ 303.554229][T14553] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 303.574858][T14553] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 303.583899][T14553] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 303.592118][T14553] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 303.600180][T14553] RBP: 00007faddd5a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 303.608311][T14553] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 303.616547][T14553] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x100c0, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403000f, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 303.624594][T14565] CPU: 0 PID: 14565 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 303.633531][T14565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.643803][T14565] Call Trace: [ 303.646541][T14545] FAT-fs (loop1): Directory bread(block 5) failed [ 303.647077][T14565] dump_stack+0x137/0x19d [ 303.647115][T14565] should_fail+0x23c/0x250 [ 303.647130][T14565] ? getname_flags+0x84/0x3d0 [ 303.647144][T14565] __should_failslab+0x81/0x90 06:32:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x286, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 303.653785][T14545] FAT-fs (loop1): Directory bread(block 6) failed [ 303.658386][T14565] should_failslab+0x5/0x20 [ 303.658414][T14565] kmem_cache_alloc+0x46/0x2f0 [ 303.658435][T14565] getname_flags+0x84/0x3d0 [ 303.658450][T14565] ? vfs_write+0x50c/0x770 [ 303.665314][T14545] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/384/file0 supports timestamps until 2107 (0x10391447e) [ 303.667615][T14565] getname+0x15/0x20 [ 303.667636][T14565] do_sys_openat2+0x5b/0x250 [ 303.721959][T14565] __x64_sys_openat+0xef/0x110 [ 303.726868][T14565] do_syscall_64+0x4a/0x90 [ 303.731694][T14565] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 303.738083][T14565] RIP: 0033:0x4196c4 [ 303.742355][T14565] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 303.762593][T14565] RSP: 002b:00007ff264912ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 06:32:22 executing program 2 (fault-call:0 fault-nth:32): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 303.771284][T14565] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 303.779617][T14565] RDX: 0000000000000002 RSI: 00007ff264913000 RDI: 00000000ffffff9c [ 303.787770][T14565] RBP: 00007ff264913000 R08: 0000000000000000 R09: ffffffffffffffff [ 303.795739][T14565] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 303.804118][T14565] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 06:32:22 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 303.852012][T14578] loop1: detected capacity change from 0 to 1 [ 303.860916][T14578] FAT-fs (loop1): Directory bread(block 3) failed [ 303.873922][T14578] FAT-fs (loop1): Directory bread(block 4) failed [ 303.877682][T14577] loop4: detected capacity change from 0 to 131456 [ 303.881470][T14587] loop2: detected capacity change from 0 to 1 [ 303.895001][T14578] FAT-fs (loop1): Directory bread(block 5) failed [ 303.902797][T14587] FAULT_INJECTION: forcing a failure. [ 303.902797][T14587] name failslab, interval 1, probability 0, space 0, times 0 [ 303.914387][T14592] FAULT_INJECTION: forcing a failure. [ 303.914387][T14592] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 303.915535][T14587] CPU: 1 PID: 14587 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 303.939208][T14587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.949342][T14587] Call Trace: [ 303.953046][T14587] dump_stack+0x137/0x19d [ 303.957519][T14587] should_fail+0x23c/0x250 [ 303.961952][T14587] ? sidtab_sid2str_get+0x9c/0x130 [ 303.967150][T14587] __should_failslab+0x81/0x90 [ 303.971997][T14587] should_failslab+0x5/0x20 [ 303.976677][T14587] __kmalloc_track_caller+0x64/0x340 [ 303.982198][T14587] kmemdup+0x21/0x50 [ 303.986338][T14587] sidtab_sid2str_get+0x9c/0x130 [ 303.991369][T14587] security_sid_to_context_core+0x1cb/0x2d0 [ 303.997741][T14587] security_sid_to_context_force+0x2f/0x40 [ 304.003652][T14587] selinux_inode_init_security+0x49e/0x550 [ 304.010014][T14587] security_inode_init_security+0xd7/0x260 [ 304.015853][T14587] ? ext4_init_security+0x40/0x40 [ 304.021127][T14587] ext4_init_security+0x30/0x40 [ 304.026394][T14587] __ext4_new_inode+0x29a1/0x2f70 [ 304.031409][T14587] ext4_mkdir+0x28a/0x760 [ 304.035769][T14587] vfs_mkdir+0x2a4/0x370 [ 304.040082][T14587] do_mkdirat+0x11d/0x200 [ 304.044660][T14587] __x64_sys_mkdir+0x32/0x40 [ 304.049573][T14587] do_syscall_64+0x4a/0x90 [ 304.054458][T14587] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 304.061033][T14587] RIP: 0033:0x4656e7 [ 304.065608][T14587] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 304.086171][T14587] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 304.095447][T14587] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 304.103871][T14587] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 304.112091][T14587] RBP: 00007faddd5a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 304.120424][T14587] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 304.130496][T14587] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 304.138676][T14592] CPU: 0 PID: 14592 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 304.147836][T14592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.158171][T14592] Call Trace: [ 304.161720][T14592] dump_stack+0x137/0x19d [ 304.165989][T14577] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 304.166228][T14592] should_fail+0x23c/0x250 [ 304.177703][T14577] EXT4-fs (loop4): group descriptors corrupted! [ 304.182221][T14592] should_fail_usercopy+0x16/0x20 [ 304.194253][T14592] strncpy_from_user+0x21/0x250 [ 304.199201][T14592] getname_flags+0xb8/0x3d0 [ 304.204059][T14592] ? vfs_write+0x50c/0x770 [ 304.209046][T14592] getname+0x15/0x20 [ 304.213035][T14592] do_sys_openat2+0x5b/0x250 [ 304.217854][T14592] __x64_sys_openat+0xef/0x110 [ 304.223177][T14592] do_syscall_64+0x4a/0x90 [ 304.227830][T14592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 304.233940][T14592] RIP: 0033:0x4196c4 [ 304.237833][T14592] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 304.257903][T14592] RSP: 002b:00007ff264912ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 304.266844][T14592] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 304.275100][T14592] RDX: 0000000000000002 RSI: 00007ff264913000 RDI: 00000000ffffff9c [ 304.283162][T14592] RBP: 00007ff264913000 R08: 0000000000000000 R09: ffffffffffffffff [ 304.291215][T14592] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 06:32:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x18000}], 0x1}, 0x700) [ 304.299259][T14592] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 304.307571][T14578] FAT-fs (loop1): Directory bread(block 6) failed [ 304.323893][T14578] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/385/file0 supports timestamps until 2107 (0x10391447e) 06:32:23 executing program 2 (fault-call:0 fault-nth:33): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x300, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:23 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 304.362785][T14577] loop4: detected capacity change from 0 to 131456 [ 304.384040][T14577] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 304.394381][T14577] EXT4-fs (loop4): group descriptors corrupted! [ 304.402577][T14570] loop5: detected capacity change from 0 to 131456 [ 304.409278][T14610] FAULT_INJECTION: forcing a failure. [ 304.409278][T14610] name failslab, interval 1, probability 0, space 0, times 0 [ 304.409300][T14610] CPU: 0 PID: 14610 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 304.423324][T14608] loop2: detected capacity change from 0 to 1 [ 304.431755][T14610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.431769][T14610] Call Trace: [ 304.431778][T14610] dump_stack+0x137/0x19d [ 304.431802][T14610] should_fail+0x23c/0x250 [ 304.441259][T14570] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 304.448290][T14610] ? __alloc_file+0x2e/0x1a0 [ 304.448314][T14610] __should_failslab+0x81/0x90 [ 304.451713][T14570] EXT4-fs (loop5): group descriptors corrupted! [ 304.456262][T14610] should_failslab+0x5/0x20 [ 304.456288][T14610] kmem_cache_alloc+0x46/0x2f0 [ 304.456307][T14610] __alloc_file+0x2e/0x1a0 [ 304.456323][T14610] alloc_empty_file+0xcd/0x1c0 [ 304.456364][T14610] path_openat+0x6a/0x20b0 [ 304.461411][T14608] FAULT_INJECTION: forcing a failure. [ 304.461411][T14608] name failslab, interval 1, probability 0, space 0, times 0 [ 304.471650][T14610] ? iov_iter_advance+0x291/0xe10 [ 304.471707][T14610] ? shmem_write_end+0x37d/0x3d0 [ 304.471729][T14610] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 304.541410][T14610] ? generic_perform_write+0x332/0x3a0 [ 304.546876][T14610] do_filp_open+0xd9/0x1f0 [ 304.551482][T14610] ? __virt_addr_valid+0x15a/0x1a0 [ 304.556680][T14610] ? __check_object_size+0x253/0x310 [ 304.561964][T14610] ? _find_next_bit+0x16a/0x190 [ 304.567654][T14610] ? alloc_fd+0x388/0x3e0 [ 304.572203][T14610] do_sys_openat2+0xa3/0x250 [ 304.577132][T14610] __x64_sys_openat+0xef/0x110 [ 304.582579][T14610] do_syscall_64+0x4a/0x90 [ 304.587037][T14610] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 304.593911][T14610] RIP: 0033:0x4196c4 [ 304.598232][T14610] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 304.618204][T14610] RSP: 002b:00007ff264912ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 304.626956][T14610] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 304.635341][T14610] RDX: 0000000000000002 RSI: 00007ff264913000 RDI: 00000000ffffff9c [ 304.643560][T14610] RBP: 00007ff264913000 R08: 0000000000000000 R09: ffffffffffffffff [ 304.651950][T14610] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 304.660029][T14610] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 304.668008][T14608] CPU: 1 PID: 14608 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 304.677085][T14608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.687421][T14608] Call Trace: [ 304.690693][T14608] dump_stack+0x137/0x19d [ 304.695108][T14608] should_fail+0x23c/0x250 [ 304.699953][T14608] ? kcalloc+0x32/0x50 [ 304.704122][T14608] __should_failslab+0x81/0x90 [ 304.709167][T14608] should_failslab+0x5/0x20 [ 304.713833][T14608] __kmalloc+0x66/0x340 [ 304.718107][T14608] ? chksum_update+0x39/0x50 [ 304.723147][T14608] kcalloc+0x32/0x50 [ 304.727147][T14608] ext4_find_extent+0x21c/0x7f0 [ 304.732569][T14608] ext4_ext_map_blocks+0xd9/0x1f00 [ 304.737767][T14608] ? __down_read_common+0x16b/0x5a0 [ 304.743306][T14608] ? percpu_counter_add_batch+0x69/0xd0 [ 304.749455][T14608] ? ext4_es_lookup_extent+0x206/0x490 [ 304.755271][T14608] ext4_map_blocks+0x1be/0xef0 [ 304.760172][T14608] ext4_getblk+0xb1/0x3d0 [ 304.764869][T14608] ? __ext4_new_inode+0x2aed/0x2f70 [ 304.770071][T14608] ext4_bread+0x28/0x130 [ 304.774730][T14608] ext4_append+0xd1/0x1c0 [ 304.779228][T14608] ext4_init_new_dir+0x177/0x500 [ 304.784677][T14608] ext4_mkdir+0x329/0x760 [ 304.789102][T14608] vfs_mkdir+0x2a4/0x370 [ 304.793916][T14608] do_mkdirat+0x11d/0x200 [ 304.798271][T14608] __x64_sys_mkdir+0x32/0x40 [ 304.803253][T14608] do_syscall_64+0x4a/0x90 [ 304.808152][T14608] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 304.814825][T14608] RIP: 0033:0x4656e7 [ 304.818938][T14608] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 304.841081][T14608] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 304.850889][T14608] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 304.859118][T14608] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 304.867246][T14608] RBP: 00007faddd5a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 304.875215][T14608] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 304.883588][T14608] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:23 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2017c, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030011, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 304.915494][T14617] loop1: detected capacity change from 0 to 1 [ 304.922385][T14608] FAT-fs (loop2): Directory bread(block 3) failed [ 304.929151][T14617] FAT-fs (loop1): Directory bread(block 3) failed [ 304.936840][T14608] FAT-fs (loop2): Directory bread(block 4) failed [ 304.950619][T14622] FAULT_INJECTION: forcing a failure. [ 304.950619][T14622] name failslab, interval 1, probability 0, space 0, times 0 [ 304.963005][T14608] FAT-fs (loop2): Directory bread(block 5) failed [ 304.963847][T14622] CPU: 0 PID: 14622 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 304.970494][T14608] FAT-fs (loop2): Directory bread(block 6) failed [ 304.979677][T14622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.987705][T14617] FAT-fs (loop1): Directory bread(block 4) failed [ 304.996628][T14622] Call Trace: [ 304.996640][T14622] dump_stack+0x137/0x19d 06:32:23 executing program 2 (fault-call:0 fault-nth:34): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 305.005067][T14608] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/297/file0 supports timestamps until 2107 (0x10391447e) [ 305.006774][T14622] should_fail+0x23c/0x250 [ 305.006800][T14622] ? security_file_alloc+0x30/0x190 [ 305.012207][T14617] FAT-fs (loop1): Directory bread(block 5) failed [ 305.027352][T14622] __should_failslab+0x81/0x90 [ 305.046038][T14617] FAT-fs (loop1): Directory bread(block 6) failed [ 305.049305][T14622] should_failslab+0x5/0x20 [ 305.049355][T14622] kmem_cache_alloc+0x46/0x2f0 [ 305.056540][T14617] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/386/file0 supports timestamps until 2107 (0x10391447e) [ 305.060983][T14622] security_file_alloc+0x30/0x190 [ 305.061004][T14622] __alloc_file+0x83/0x1a0 [ 305.091734][T14622] alloc_empty_file+0xcd/0x1c0 [ 305.096741][T14622] path_openat+0x6a/0x20b0 [ 305.101149][T14622] ? iov_iter_advance+0x291/0xe10 [ 305.106768][T14622] ? shmem_write_end+0x37d/0x3d0 [ 305.111947][T14622] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 305.118632][T14622] ? generic_perform_write+0x332/0x3a0 [ 305.127195][T14622] do_filp_open+0xd9/0x1f0 [ 305.132714][T14622] ? __virt_addr_valid+0x15a/0x1a0 [ 305.138086][T14622] ? __check_object_size+0x253/0x310 [ 305.143718][T14622] ? _find_next_bit+0x16a/0x190 [ 305.148733][T14622] ? alloc_fd+0x388/0x3e0 [ 305.153316][T14622] do_sys_openat2+0xa3/0x250 [ 305.158027][T14622] __x64_sys_openat+0xef/0x110 06:32:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x383, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 305.162903][T14622] do_syscall_64+0x4a/0x90 [ 305.167396][T14622] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 305.173550][T14622] RIP: 0033:0x4196c4 [ 305.177562][T14622] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 305.198729][T14622] RSP: 002b:00007ff264912ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 305.207702][T14622] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 06:32:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x1df70}], 0x1}, 0x700) 06:32:23 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 305.216045][T14622] RDX: 0000000000000002 RSI: 00007ff264913000 RDI: 00000000ffffff9c [ 305.224679][T14622] RBP: 00007ff264913000 R08: 0000000000000000 R09: ffffffffffffffff [ 305.233217][T14622] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 305.241548][T14622] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 305.317521][T14635] FAULT_INJECTION: forcing a failure. [ 305.317521][T14635] name failslab, interval 1, probability 0, space 0, times 0 [ 305.330921][T14635] CPU: 0 PID: 14635 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 305.340306][T14635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.340301][T14644] loop2: detected capacity change from 0 to 1 [ 305.350841][T14635] Call Trace: [ 305.350852][T14635] dump_stack+0x137/0x19d [ 305.350877][T14635] should_fail+0x23c/0x250 [ 305.350908][T14635] ? loop_set_status_from_info+0x3a0/0x3a0 [ 305.350925][T14635] __should_failslab+0x81/0x90 [ 305.350944][T14635] ? __kthread_create_on_node+0x7a/0x290 [ 305.377111][T14644] FAULT_INJECTION: forcing a failure. [ 305.377111][T14644] name failslab, interval 1, probability 0, space 0, times 0 [ 305.381370][T14635] should_failslab+0x5/0x20 [ 305.405425][T14635] kmem_cache_alloc_trace+0x49/0x310 [ 305.411015][T14635] ? loop_set_status_from_info+0x3a0/0x3a0 [ 305.416907][T14635] __kthread_create_on_node+0x7a/0x290 [ 305.422753][T14635] ? __cond_resched+0x11/0x40 [ 305.427924][T14635] ? __blkdev_get+0x8c/0x6c0 [ 305.432690][T14635] ? loop_set_status_from_info+0x3a0/0x3a0 [ 305.438521][T14635] kthread_create_on_node+0x72/0xa0 [ 305.443709][T14635] loop_configure+0x597/0xcb0 [ 305.448380][T14635] ? mntput+0x45/0x70 [ 305.452983][T14635] lo_ioctl+0x555/0x11f0 [ 305.457388][T14635] ? path_openat+0x19ab/0x20b0 [ 305.462159][T14635] ? putname+0xa5/0xc0 [ 305.466559][T14635] ? ___cache_free+0x3c/0x300 [ 305.471307][T14635] ? blkdev_common_ioctl+0x9c3/0x1040 [ 305.477032][T14635] ? selinux_file_ioctl+0x8e0/0x970 [ 305.482585][T14635] ? lo_release+0x120/0x120 [ 305.487439][T14635] blkdev_ioctl+0x1d0/0x3c0 [ 305.492122][T14635] block_ioctl+0x6d/0x80 [ 305.497232][T14635] ? blkdev_iopoll+0x70/0x70 [ 305.501905][T14635] __se_sys_ioctl+0xcb/0x140 [ 305.506852][T14635] __x64_sys_ioctl+0x3f/0x50 [ 305.511778][T14635] do_syscall_64+0x4a/0x90 [ 305.516375][T14635] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 305.523263][T14635] RIP: 0033:0x466397 [ 305.527427][T14635] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 305.548127][T14635] RSP: 002b:00007ff264912f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 305.556701][T14635] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 305.565096][T14635] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 305.573149][T14635] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 305.581279][T14635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 305.589511][T14635] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 305.598264][T14644] CPU: 1 PID: 14644 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 305.607860][T14644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.618413][T14644] Call Trace: [ 305.621707][T14644] dump_stack+0x137/0x19d [ 305.626967][T14644] should_fail+0x23c/0x250 [ 305.631562][T14644] ? kcalloc+0x32/0x50 [ 305.636190][T14644] __should_failslab+0x81/0x90 [ 305.641269][T14644] should_failslab+0x5/0x20 [ 305.645825][T14644] __kmalloc+0x66/0x340 [ 305.650287][T14644] ? chksum_update+0x39/0x50 [ 305.655437][T14644] kcalloc+0x32/0x50 [ 305.659510][T14644] ext4_find_extent+0x21c/0x7f0 [ 305.664804][T14644] ext4_ext_map_blocks+0xd9/0x1f00 [ 305.670969][T14644] ? __down_read_common+0x16b/0x5a0 [ 305.676358][T14644] ? percpu_counter_add_batch+0x69/0xd0 [ 305.682011][T14644] ? ext4_es_lookup_extent+0x206/0x490 [ 305.688098][T14644] ext4_map_blocks+0x1be/0xef0 [ 305.693004][T14644] ext4_getblk+0xb1/0x3d0 [ 305.697718][T14644] ? __ext4_new_inode+0x2aed/0x2f70 [ 305.702938][T14644] ext4_bread+0x28/0x130 [ 305.707223][T14644] ext4_append+0xd1/0x1c0 [ 305.711550][T14644] ext4_init_new_dir+0x177/0x500 [ 305.716663][T14644] ext4_mkdir+0x329/0x760 [ 305.720998][T14644] vfs_mkdir+0x2a4/0x370 [ 305.725403][T14644] do_mkdirat+0x11d/0x200 [ 305.729796][T14644] __x64_sys_mkdir+0x32/0x40 [ 305.734742][T14644] do_syscall_64+0x4a/0x90 [ 305.739303][T14644] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 305.745344][T14644] RIP: 0033:0x4656e7 [ 305.749311][T14644] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 305.769551][T14644] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 305.778561][T14644] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 305.786714][T14644] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 305.795291][T14644] RBP: 00007faddd5a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 305.803701][T14644] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 06:32:24 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 305.812262][T14644] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 305.821024][T14643] loop4: detected capacity change from 0 to 131456 [ 305.830287][T14644] FAT-fs (loop2): Directory bread(block 3) failed [ 305.833448][T14649] loop1: detected capacity change from 0 to 1 [ 305.837319][T14644] FAT-fs (loop2): Directory bread(block 4) failed [ 305.850342][T14644] FAT-fs (loop2): Directory bread(block 5) failed [ 305.854941][T14643] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! 06:32:24 executing program 2 (fault-call:0 fault-nth:35): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 305.857100][T14644] FAT-fs (loop2): Directory bread(block 6) failed [ 305.867653][T14643] EXT4-fs (loop4): group descriptors corrupted! [ 305.881201][T14644] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/298/file0 supports timestamps until 2107 (0x10391447e) [ 305.881914][T14649] FAT-fs (loop1): Directory bread(block 3) failed [ 305.905050][T14649] FAT-fs (loop1): Directory bread(block 4) failed [ 305.926495][T14649] FAT-fs (loop1): Directory bread(block 5) failed [ 305.933144][T14657] FAULT_INJECTION: forcing a failure. [ 305.933144][T14657] name failslab, interval 1, probability 0, space 0, times 0 [ 305.933256][T14649] FAT-fs (loop1): Directory bread(block 6) failed [ 305.946565][T14657] CPU: 1 PID: 14657 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 305.962455][T14657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.972778][T14657] Call Trace: [ 305.976105][T14657] dump_stack+0x137/0x19d [ 305.980730][T14657] should_fail+0x23c/0x250 [ 305.985193][T14657] ? __kernfs_new_node+0x6a/0x330 [ 305.990464][T14657] __should_failslab+0x81/0x90 [ 305.995398][T14657] should_failslab+0x5/0x20 [ 306.000273][T14657] kmem_cache_alloc+0x46/0x2f0 [ 306.005032][T14657] ? kvm_sched_clock_read+0xd/0x20 [ 306.010322][T14657] __kernfs_new_node+0x6a/0x330 [ 306.015380][T14657] ? select_task_rq_fair+0x186/0xc00 [ 306.021390][T14657] ? rb_insert_color+0x7e/0x310 [ 306.026678][T14657] kernfs_create_dir_ns+0x5e/0x140 [ 306.031956][T14657] internal_create_group+0x138/0x850 [ 306.037456][T14657] ? enqueue_task_fair+0xcd/0x510 [ 306.042503][T14657] sysfs_create_group+0x1b/0x20 [ 306.047458][T14657] loop_configure+0xa21/0xcb0 [ 306.052426][T14657] lo_ioctl+0x555/0x11f0 [ 306.057395][T14657] ? path_openat+0x19ab/0x20b0 [ 306.062344][T14657] ? putname+0xa5/0xc0 [ 306.066411][T14657] ? ___cache_free+0x3c/0x300 [ 306.071384][T14657] ? blkdev_common_ioctl+0x9c3/0x1040 [ 306.077029][T14657] ? selinux_file_ioctl+0x8e0/0x970 [ 306.082334][T14657] ? lo_release+0x120/0x120 [ 306.087000][T14657] blkdev_ioctl+0x1d0/0x3c0 [ 306.091515][T14657] block_ioctl+0x6d/0x80 [ 306.095954][T14657] ? blkdev_iopoll+0x70/0x70 [ 306.100729][T14657] __se_sys_ioctl+0xcb/0x140 [ 306.105601][T14657] __x64_sys_ioctl+0x3f/0x50 [ 306.110229][T14657] do_syscall_64+0x4a/0x90 [ 306.114753][T14657] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 306.120662][T14657] RIP: 0033:0x466397 06:32:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x20000}], 0x1}, 0x700) [ 306.126391][T14657] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 306.148231][T14657] RSP: 002b:00007ff264912f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 306.156999][T14657] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 306.165659][T14657] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 306.174459][T14657] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 306.182962][T14657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 306.191021][T14657] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 306.199120][T14657] loop3: detected capacity change from 0 to 131456 [ 306.205493][T14649] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/387/file0 supports timestamps until 2107 (0x10391447e) 06:32:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x384, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030029, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 306.267195][T14657] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 306.277866][T14657] EXT4-fs (loop3): group descriptors corrupted! [ 306.286754][T14631] loop5: detected capacity change from 0 to 131456 06:32:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2017e, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 306.353044][T14677] loop2: detected capacity change from 0 to 1 [ 306.359835][T14681] loop1: detected capacity change from 0 to 1 [ 306.361966][T14677] FAULT_INJECTION: forcing a failure. [ 306.361966][T14677] name failslab, interval 1, probability 0, space 0, times 0 [ 306.376478][T14681] FAT-fs (loop1): Directory bread(block 3) failed [ 306.379566][T14677] CPU: 1 PID: 14677 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 306.386166][T14681] FAT-fs (loop1): Directory bread(block 4) failed [ 306.395027][T14677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.395041][T14677] Call Trace: [ 306.395048][T14677] dump_stack+0x137/0x19d [ 306.401729][T14681] FAT-fs (loop1): Directory bread(block 5) failed [ 306.413242][T14677] should_fail+0x23c/0x250 [ 306.413267][T14677] ? kcalloc+0x32/0x50 [ 306.416564][T14681] FAT-fs (loop1): Directory bread(block 6) failed [ 306.416711][T14681] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/388/file0 supports timestamps until 2107 (0x10391447e) [ 306.420975][T14677] __should_failslab+0x81/0x90 [ 306.460710][T14683] loop4: detected capacity change from 0 to 131456 [ 306.463393][T14677] should_failslab+0x5/0x20 [ 306.474970][T14677] __kmalloc+0x66/0x340 [ 306.479143][T14677] ? kcalloc+0x32/0x50 [ 306.483506][T14677] kcalloc+0x32/0x50 [ 306.487868][T14677] ext4_find_extent+0x21c/0x7f0 [ 306.493186][T14677] ? kfree+0xf0/0x1d0 [ 306.497577][T14677] ext4_ext_map_blocks+0xd9/0x1f00 [ 306.502864][T14677] ? __down_write_common+0x45/0x890 [ 306.508063][T14677] ? __down_read_common+0x16b/0x5a0 [ 306.513477][T14677] ? percpu_counter_add_batch+0x69/0xd0 [ 306.519521][T14677] ? ext4_es_lookup_extent+0x206/0x490 [ 306.525119][T14677] ext4_map_blocks+0x70d/0xef0 [ 306.529960][T14677] ext4_getblk+0xb1/0x3d0 [ 306.534315][T14677] ext4_bread+0x28/0x130 [ 306.538541][T14677] ext4_append+0xd1/0x1c0 [ 306.542949][T14677] ext4_init_new_dir+0x177/0x500 [ 306.548567][T14677] ext4_mkdir+0x329/0x760 [ 306.553106][T14677] vfs_mkdir+0x2a4/0x370 [ 306.557497][T14677] do_mkdirat+0x11d/0x200 [ 306.562240][T14677] __x64_sys_mkdir+0x32/0x40 [ 306.567009][T14677] do_syscall_64+0x4a/0x90 [ 306.571419][T14677] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 306.577447][T14677] RIP: 0033:0x4656e7 [ 306.581544][T14677] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 306.605037][T14677] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 306.614908][T14677] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 306.623370][T14677] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 306.632036][T14677] RBP: 00007faddd5a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 306.640289][T14677] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 06:32:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x387, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 306.649027][T14677] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:25 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 306.676629][T14683] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 306.687738][T14683] EXT4-fs (loop4): group descriptors corrupted! [ 306.712281][T14698] FAULT_INJECTION: forcing a failure. [ 306.712281][T14698] name failslab, interval 1, probability 0, space 0, times 0 [ 306.725946][T14698] CPU: 0 PID: 14698 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 306.734845][T14698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.745779][T14698] Call Trace: [ 306.749169][T14698] dump_stack+0x137/0x19d [ 306.754028][T14698] should_fail+0x23c/0x250 [ 306.759012][T14698] ? __kernfs_new_node+0x6a/0x330 [ 306.764061][T14698] __should_failslab+0x81/0x90 [ 306.769160][T14698] should_failslab+0x5/0x20 [ 306.774077][T14698] kmem_cache_alloc+0x46/0x2f0 [ 306.779435][T14698] ? __cond_resched+0x11/0x40 [ 306.784485][T14698] __kernfs_new_node+0x6a/0x330 [ 306.789845][T14698] ? idr_alloc_cyclic+0x249/0x2d0 [ 306.795434][T14698] ? rb_insert_color+0x7e/0x310 [ 306.800559][T14698] kernfs_new_node+0x5b/0xd0 [ 306.805355][T14698] __kernfs_create_file+0x45/0x1a0 [ 306.810931][T14698] sysfs_add_file_mode_ns+0x1c1/0x250 [ 306.816344][T14698] internal_create_group+0x2e4/0x850 [ 306.822460][T14698] sysfs_create_group+0x1b/0x20 [ 306.827711][T14698] loop_configure+0xa21/0xcb0 [ 306.833386][T14698] lo_ioctl+0x555/0x11f0 [ 306.837860][T14698] ? path_openat+0x19ab/0x20b0 [ 306.842824][T14698] ? putname+0xa5/0xc0 [ 306.847113][T14698] ? ___cache_free+0x3c/0x300 [ 306.852817][T14698] ? blkdev_common_ioctl+0x9c3/0x1040 [ 306.858351][T14698] ? selinux_file_ioctl+0x8e0/0x970 [ 306.863726][T14698] ? lo_release+0x120/0x120 [ 306.868369][T14698] blkdev_ioctl+0x1d0/0x3c0 [ 306.873023][T14698] block_ioctl+0x6d/0x80 [ 306.877629][T14698] ? blkdev_iopoll+0x70/0x70 [ 306.882323][T14698] __se_sys_ioctl+0xcb/0x140 [ 306.887182][T14698] __x64_sys_ioctl+0x3f/0x50 [ 306.891907][T14698] do_syscall_64+0x4a/0x90 [ 306.896719][T14698] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 306.902807][T14698] RIP: 0033:0x466397 [ 306.906878][T14698] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 306.927554][T14698] RSP: 002b:00007ff264912f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 306.936834][T14698] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 306.945304][T14698] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 306.953660][T14698] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 306.962031][T14698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 06:32:25 executing program 2 (fault-call:0 fault-nth:36): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 306.970040][T14698] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 306.979016][T14698] loop3: detected capacity change from 0 to 131456 [ 307.006756][T14683] loop4: detected capacity change from 0 to 131456 [ 307.015472][T14683] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 307.025989][T14683] EXT4-fs (loop4): group descriptors corrupted! [ 307.034284][T14702] loop1: detected capacity change from 0 to 1 [ 307.065301][T14698] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! 06:32:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40300fe, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:25 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 307.065680][T14702] FAT-fs (loop1): Directory bread(block 3) failed [ 307.076559][T14698] EXT4-fs (loop3): group descriptors corrupted! [ 307.111099][T14702] FAT-fs (loop1): Directory bread(block 4) failed [ 307.127896][T14718] loop2: detected capacity change from 0 to 1 [ 307.131016][T14702] FAT-fs (loop1): Directory bread(block 5) failed [ 307.138822][T14718] FAULT_INJECTION: forcing a failure. [ 307.138822][T14718] name failslab, interval 1, probability 0, space 0, times 0 [ 307.145645][T14702] FAT-fs (loop1): Directory bread(block 6) failed [ 307.156110][T14718] CPU: 0 PID: 14718 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 307.156135][T14718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.156146][T14718] Call Trace: [ 307.167191][T14702] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/389/file0 supports timestamps until 2107 (0x10391447e) [ 307.172932][T14718] dump_stack+0x137/0x19d [ 307.172960][T14718] should_fail+0x23c/0x250 [ 307.186090][T14725] loop4: detected capacity change from 0 to 131456 [ 307.186823][T14718] ? ext4_mb_new_blocks+0x2e7/0x1f90 [ 307.186891][T14718] __should_failslab+0x81/0x90 [ 307.228326][T14718] should_failslab+0x5/0x20 [ 307.233554][T14718] kmem_cache_alloc+0x46/0x2f0 [ 307.238719][T14718] ext4_mb_new_blocks+0x2e7/0x1f90 [ 307.244071][T14718] ? ext4_find_extent+0x6cf/0x7f0 [ 307.249198][T14718] ? ext4_ext_search_right+0x300/0x540 [ 307.255210][T14718] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 307.262949][T14718] ext4_ext_map_blocks+0x1569/0x1f00 [ 307.268674][T14718] ? __down_read_common+0x16b/0x5a0 [ 307.274222][T14718] ? percpu_counter_add_batch+0x69/0xd0 [ 307.280199][T14718] ? ext4_es_lookup_extent+0x206/0x490 [ 307.285833][T14718] ext4_map_blocks+0x70d/0xef0 [ 307.290584][T14718] ext4_getblk+0xb1/0x3d0 [ 307.295081][T14718] ext4_bread+0x28/0x130 [ 307.299570][T14718] ext4_append+0xd1/0x1c0 [ 307.303933][T14718] ext4_init_new_dir+0x177/0x500 [ 307.308990][T14718] ext4_mkdir+0x329/0x760 [ 307.313489][T14718] vfs_mkdir+0x2a4/0x370 [ 307.317714][T14718] do_mkdirat+0x11d/0x200 [ 307.322327][T14718] __x64_sys_mkdir+0x32/0x40 [ 307.327227][T14718] do_syscall_64+0x4a/0x90 [ 307.331812][T14718] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 307.338048][T14718] RIP: 0033:0x4656e7 [ 307.342116][T14718] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 307.362229][T14718] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 06:32:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x23f94}], 0x1}, 0x700) [ 307.372725][T14718] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 307.381064][T14718] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 307.390037][T14718] RBP: 00007faddd5a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 307.399933][T14718] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 307.408943][T14718] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 307.422031][T14725] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 307.434148][T14725] EXT4-fs (loop4): group descriptors corrupted! [ 307.449130][T14724] FAULT_INJECTION: forcing a failure. [ 307.449130][T14724] name failslab, interval 1, probability 0, space 0, times 0 [ 307.463710][T14724] CPU: 1 PID: 14724 Comm: syz-executor.3 Not tainted 5.13.0-rc2-syzkaller #0 [ 307.473482][T14724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.485826][T14724] Call Trace: [ 307.490402][T14724] dump_stack+0x137/0x19d [ 307.496231][T14724] should_fail+0x23c/0x250 [ 307.501100][T14724] ? __kernfs_new_node+0x6a/0x330 [ 307.507755][T14724] __should_failslab+0x81/0x90 [ 307.512771][T14724] should_failslab+0x5/0x20 [ 307.517484][T14724] kmem_cache_alloc+0x46/0x2f0 [ 307.522333][T14724] __kernfs_new_node+0x6a/0x330 [ 307.527314][T14724] ? __cond_resched+0x11/0x40 [ 307.532078][T14724] ? mutex_lock+0x9/0x30 [ 307.536358][T14724] kernfs_new_node+0x5b/0xd0 [ 307.543212][T14724] __kernfs_create_file+0x45/0x1a0 [ 307.548415][T14724] sysfs_add_file_mode_ns+0x1c1/0x250 [ 307.554173][T14724] internal_create_group+0x2e4/0x850 [ 307.559808][T14724] sysfs_create_group+0x1b/0x20 [ 307.564776][T14724] loop_configure+0xa21/0xcb0 [ 307.569575][T14724] lo_ioctl+0x555/0x11f0 [ 307.574534][T14724] ? path_openat+0x19ab/0x20b0 [ 307.579597][T14724] ? putname+0xa5/0xc0 [ 307.583925][T14724] ? ___cache_free+0x3c/0x300 [ 307.588775][T14724] ? blkdev_common_ioctl+0x9c3/0x1040 [ 307.594553][T14724] ? selinux_file_ioctl+0x8e0/0x970 [ 307.600225][T14724] ? lo_release+0x120/0x120 [ 307.604756][T14724] blkdev_ioctl+0x1d0/0x3c0 [ 307.609402][T14724] block_ioctl+0x6d/0x80 [ 307.613809][T14724] ? blkdev_iopoll+0x70/0x70 [ 307.618531][T14724] __se_sys_ioctl+0xcb/0x140 [ 307.623205][T14724] __x64_sys_ioctl+0x3f/0x50 [ 307.627825][T14724] do_syscall_64+0x4a/0x90 [ 307.632589][T14724] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 307.638886][T14724] RIP: 0033:0x466397 [ 307.643076][T14724] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 307.663658][T14724] RSP: 002b:00007ff264912f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 307.672237][T14724] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 06:32:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x388, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 307.680375][T14724] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 307.688425][T14724] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 307.696589][T14724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 307.704762][T14724] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 307.720435][T14724] loop3: detected capacity change from 0 to 131456 06:32:26 executing program 2 (fault-call:0 fault-nth:37): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 307.745005][T14725] loop4: detected capacity change from 0 to 131456 [ 307.776457][T14724] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 307.786915][T14724] EXT4-fs (loop3): group descriptors corrupted! 06:32:26 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 307.800883][T14725] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 307.811701][T14725] EXT4-fs (loop4): group descriptors corrupted! [ 307.815253][T14747] loop1: detected capacity change from 0 to 1 [ 307.829148][T14744] loop2: detected capacity change from 0 to 1 [ 307.843971][T14747] FAT-fs (loop1): Directory bread(block 3) failed [ 307.852579][T14744] FAULT_INJECTION: forcing a failure. [ 307.852579][T14744] name failslab, interval 1, probability 0, space 0, times 0 [ 307.866677][T14744] CPU: 1 PID: 14744 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 307.875966][T14744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.886284][T14744] Call Trace: [ 307.889159][T14747] FAT-fs (loop1): Directory bread(block 4) failed [ 307.889856][T14744] dump_stack+0x137/0x19d [ 307.902415][T14744] should_fail+0x23c/0x250 [ 307.906934][T14744] ? ext4_mb_new_blocks+0x70f/0x1f90 [ 307.912488][T14744] __should_failslab+0x81/0x90 [ 307.917445][T14744] should_failslab+0x5/0x20 [ 307.922348][T14744] kmem_cache_alloc+0x46/0x2f0 [ 307.927394][T14744] ext4_mb_new_blocks+0x70f/0x1f90 [ 307.932717][T14744] ? ext4_find_extent+0x6cf/0x7f0 [ 307.937839][T14744] ? ext4_ext_search_right+0x300/0x540 [ 307.943418][T14744] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 307.949222][T14744] ext4_ext_map_blocks+0x1569/0x1f00 [ 307.954956][T14744] ? __down_read_common+0x16b/0x5a0 [ 307.960494][T14744] ? percpu_counter_add_batch+0x69/0xd0 [ 307.966197][T14744] ? ext4_es_lookup_extent+0x206/0x490 [ 307.971801][T14744] ext4_map_blocks+0x70d/0xef0 [ 307.976748][T14744] ext4_getblk+0xb1/0x3d0 [ 307.981495][T14744] ext4_bread+0x28/0x130 [ 307.985824][T14744] ext4_append+0xd1/0x1c0 [ 307.990248][T14744] ext4_init_new_dir+0x177/0x500 [ 307.995892][T14744] ext4_mkdir+0x329/0x760 [ 308.000503][T14744] vfs_mkdir+0x2a4/0x370 [ 308.005004][T14744] do_mkdirat+0x11d/0x200 [ 308.009522][T14744] __x64_sys_mkdir+0x32/0x40 [ 308.014342][T14744] do_syscall_64+0x4a/0x90 [ 308.018749][T14744] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 308.024876][T14744] RIP: 0033:0x4656e7 [ 308.028932][T14744] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:32:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 308.050279][T14744] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 308.059119][T14744] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 308.067884][T14744] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 308.076021][T14744] RBP: 00007faddd5a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 308.084340][T14744] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 308.092775][T14744] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x20180, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:26 executing program 2 (fault-call:0 fault-nth:38): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3cb, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43a, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 308.112826][T14747] FAT-fs (loop1): Directory bread(block 5) failed [ 308.127404][T14747] FAT-fs (loop1): Directory bread(block 6) failed [ 308.134332][T14747] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/390/file0 supports timestamps until 2107 (0x10391447e) 06:32:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030110, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 308.179192][T14766] loop2: detected capacity change from 0 to 1 [ 308.196993][T14766] FAULT_INJECTION: forcing a failure. [ 308.196993][T14766] name failslab, interval 1, probability 0, space 0, times 0 [ 308.210006][T14766] CPU: 1 PID: 14766 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 308.218942][T14766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.229348][T14766] Call Trace: [ 308.232642][T14766] dump_stack+0x137/0x19d [ 308.237525][T14766] should_fail+0x23c/0x250 [ 308.242206][T14766] ? __es_insert_extent+0x51f/0xe70 [ 308.247553][T14766] __should_failslab+0x81/0x90 [ 308.252489][T14766] should_failslab+0x5/0x20 [ 308.257064][T14766] kmem_cache_alloc+0x46/0x2f0 [ 308.262269][T14766] __es_insert_extent+0x51f/0xe70 [ 308.267648][T14766] ? ext4_ext_map_blocks+0x10a8/0x1f00 [ 308.273193][T14766] ext4_es_insert_extent+0x1bb/0x19d0 [ 308.279164][T14766] ? percpu_counter_add_batch+0x69/0xd0 [ 308.284941][T14766] ? ext4_es_lookup_extent+0x206/0x490 [ 308.290548][T14766] ext4_map_blocks+0xa4c/0xef0 [ 308.295856][T14766] ext4_getblk+0xb1/0x3d0 [ 308.300320][T14766] ext4_bread+0x28/0x130 [ 308.304567][T14766] ext4_append+0xd1/0x1c0 [ 308.309473][T14766] ext4_init_new_dir+0x177/0x500 [ 308.314842][T14766] ext4_mkdir+0x329/0x760 [ 308.319316][T14766] vfs_mkdir+0x2a4/0x370 [ 308.323654][T14766] do_mkdirat+0x11d/0x200 06:32:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x2574c}], 0x1}, 0x700) [ 308.328037][T14766] __x64_sys_mkdir+0x32/0x40 [ 308.332929][T14766] do_syscall_64+0x4a/0x90 [ 308.337717][T14766] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 308.344254][T14766] RIP: 0033:0x4656e7 [ 308.348378][T14766] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 308.368990][T14766] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 308.377673][T14766] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 308.386231][T14766] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 308.394721][T14766] RBP: 00007faddd5a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 308.403218][T14766] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 308.411659][T14766] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 308.421266][T14766] FAT-fs (loop2): Directory bread(block 3) failed [ 308.428115][T14766] FAT-fs (loop2): Directory bread(block 4) failed [ 308.429305][T14773] loop3: detected capacity change from 0 to 8 [ 308.435333][T14766] FAT-fs (loop2): Directory bread(block 5) failed [ 308.443669][T14776] loop1: detected capacity change from 0 to 1 [ 308.449879][T14766] FAT-fs (loop2): Directory bread(block 6) failed [ 308.466250][T14766] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/302/file0 supports timestamps until 2107 (0x10391447e) [ 308.467042][T14776] FAT-fs (loop1): Directory bread(block 3) failed [ 308.490222][T14776] FAT-fs (loop1): Directory bread(block 4) failed [ 308.497231][T14776] FAT-fs (loop1): Directory bread(block 5) failed [ 308.504268][T14776] FAT-fs (loop1): Directory bread(block 6) failed [ 308.511628][T14776] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/391/file0 supports timestamps until 2107 (0x10391447e) 06:32:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3cc, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:27 executing program 2 (fault-call:0 fault-nth:39): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 308.527397][T14773] EXT4-fs (loop3): bad geometry: block count 288 exceeds size of device (4 blocks) [ 308.542643][T14790] loop4: detected capacity change from 0 to 131456 [ 308.555003][T14790] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 308.565383][T14790] EXT4-fs (loop4): group descriptors corrupted! [ 308.620055][T14790] loop4: detected capacity change from 0 to 131456 [ 308.636243][T14773] loop3: detected capacity change from 0 to 8 [ 308.642971][T14790] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 308.645622][T14809] loop1: detected capacity change from 0 to 1 [ 308.653457][T14790] EXT4-fs (loop4): group descriptors corrupted! [ 308.662222][T14809] FAT-fs (loop1): Directory bread(block 3) failed [ 308.674486][T14773] EXT4-fs (loop3): bad geometry: block count 288 exceeds size of device (4 blocks) [ 308.684116][T14809] FAT-fs (loop1): Directory bread(block 4) failed [ 308.690832][T14809] FAT-fs (loop1): Directory bread(block 5) failed [ 308.691353][T14813] loop2: detected capacity change from 0 to 1 [ 308.698325][T14809] FAT-fs (loop1): Directory bread(block 6) failed 06:32:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x801, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 308.711594][T14809] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/392/file0 supports timestamps until 2107 (0x10391447e) [ 308.740699][T14813] FAULT_INJECTION: forcing a failure. [ 308.740699][T14813] name failslab, interval 1, probability 0, space 0, times 0 [ 308.754401][T14813] CPU: 1 PID: 14813 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 06:32:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3cd, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 308.763450][T14813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.773613][T14813] Call Trace: [ 308.776554][T14821] loop3: detected capacity change from 0 to 8 [ 308.776892][T14813] dump_stack+0x137/0x19d [ 308.787705][T14813] should_fail+0x23c/0x250 [ 308.790475][T14821] EXT4-fs (loop3): bad geometry: block count 288 exceeds size of device (4 blocks) [ 308.792997][T14813] ? __se_sys_mount+0x4e/0x2e0 [ 308.807539][T14813] __should_failslab+0x81/0x90 [ 308.812335][T14813] should_failslab+0x5/0x20 [ 308.817216][T14813] __kmalloc_track_caller+0x64/0x340 [ 308.822786][T14813] ? strnlen_user+0x137/0x1c0 [ 308.827536][T14813] strndup_user+0x73/0x120 [ 308.832052][T14813] __se_sys_mount+0x4e/0x2e0 [ 308.836800][T14813] ? mntput+0x45/0x70 [ 308.840875][T14813] ? __fpregs_load_activate+0x103/0x1b0 [ 308.846676][T14813] __x64_sys_mount+0x63/0x70 [ 308.851635][T14813] do_syscall_64+0x4a/0x90 [ 308.856844][T14813] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 308.863622][T14813] RIP: 0033:0x467afa [ 308.867686][T14813] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 308.888852][T14813] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 308.897444][T14813] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 308.906155][T14813] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 06:32:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030004, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 308.914529][T14813] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 308.923087][T14813] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 308.931342][T14813] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030500, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 309.002574][T14831] loop1: detected capacity change from 0 to 1 [ 309.016975][T14831] FAT-fs (loop1): Directory bread(block 3) failed [ 309.023942][T14833] loop3: detected capacity change from 0 to 131456 [ 309.041028][T14831] FAT-fs (loop1): Directory bread(block 4) failed [ 309.051670][T14833] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 309.062453][T14833] EXT4-fs (loop3): group descriptors corrupted! [ 309.087209][T14831] FAT-fs (loop1): Directory bread(block 5) failed [ 309.094050][T14831] FAT-fs (loop1): Directory bread(block 6) failed 06:32:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="08000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:27 executing program 2 (fault-call:0 fault-nth:40): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 309.098004][T14841] loop4: detected capacity change from 0 to 131458 [ 309.109079][T14831] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/393/file0 supports timestamps until 2107 (0x10391447e) [ 309.110527][T14841] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 309.137488][T14841] EXT4-fs (loop4): group descriptors corrupted! 06:32:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3ce, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x28000}], 0x1}, 0x700) [ 309.162291][T14833] loop3: detected capacity change from 0 to 131456 [ 309.210444][T14833] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 309.219615][T14853] loop5: detected capacity change from 0 to 131456 [ 309.221586][T14833] EXT4-fs (loop3): group descriptors corrupted! [ 309.228491][T14855] loop2: detected capacity change from 0 to 1 [ 309.244644][T14853] EXT4-fs (loop5): inodes count not valid: 8 vs 32 [ 309.255778][T14841] loop4: detected capacity change from 0 to 131458 [ 309.261975][T14855] FAULT_INJECTION: forcing a failure. [ 309.261975][T14855] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 309.276707][T14855] CPU: 0 PID: 14855 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 309.286061][T14855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.296392][T14855] Call Trace: [ 309.299840][T14855] dump_stack+0x137/0x19d [ 309.304161][T14855] should_fail+0x23c/0x250 [ 309.308847][T14855] should_fail_usercopy+0x16/0x20 [ 309.313922][T14855] _copy_from_user+0x1c/0xd0 [ 309.318600][T14855] strndup_user+0xb0/0x120 [ 309.323113][T14855] __se_sys_mount+0x4e/0x2e0 [ 309.327784][T14855] ? mntput+0x45/0x70 [ 309.331922][T14855] ? __fpregs_load_activate+0x103/0x1b0 [ 309.337604][T14855] __x64_sys_mount+0x63/0x70 [ 309.342542][T14855] do_syscall_64+0x4a/0x90 [ 309.347303][T14855] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 309.353646][T14855] RIP: 0033:0x467afa [ 309.357722][T14855] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 309.379800][T14855] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 309.388303][T14855] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 309.396584][T14855] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 309.405171][T14855] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 309.413618][T14855] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 309.422020][T14855] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 309.442233][T14868] loop1: detected capacity change from 0 to 1 06:32:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8800000, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 309.458587][T14868] FAT-fs (loop1): Directory bread(block 3) failed [ 309.467520][T14868] FAT-fs (loop1): Directory bread(block 4) failed [ 309.474578][T14853] loop5: detected capacity change from 0 to 131456 [ 309.474683][T14868] FAT-fs (loop1): Directory bread(block 5) failed [ 309.489355][T14868] FAT-fs (loop1): Directory bread(block 6) failed [ 309.496773][T14868] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/394/file0 supports timestamps until 2107 (0x10391447e) 06:32:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="0a000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 309.508636][T14853] EXT4-fs (loop5): inodes count not valid: 8 vs 32 [ 309.518399][T14841] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 309.529460][T14841] EXT4-fs (loop4): group descriptors corrupted! 06:32:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030900, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:28 executing program 2 (fault-call:0 fault-nth:41): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3cf, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 309.581696][T14884] loop3: detected capacity change from 0 to 264192 [ 309.591507][T14884] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 309.602009][T14884] EXT4-fs (loop3): group descriptors corrupted! [ 309.614563][T14890] loop5: detected capacity change from 0 to 131456 [ 309.634008][T14897] loop2: detected capacity change from 0 to 1 [ 309.644219][T14890] EXT4-fs (loop5): inodes count not valid: 10 vs 32 [ 309.659166][T14897] FAULT_INJECTION: forcing a failure. [ 309.659166][T14897] name failslab, interval 1, probability 0, space 0, times 0 [ 309.674125][T14897] CPU: 0 PID: 14897 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 06:32:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="0e000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 309.683127][T14897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.694497][T14897] Call Trace: [ 309.698135][T14897] dump_stack+0x137/0x19d [ 309.702953][T14897] should_fail+0x23c/0x250 [ 309.707386][T14897] ? __se_sys_mount+0x91/0x2e0 [ 309.712581][T14897] __should_failslab+0x81/0x90 [ 309.713244][T14909] loop4: detected capacity change from 0 to 131460 [ 309.717767][T14897] should_failslab+0x5/0x20 [ 309.717796][T14897] __kmalloc_track_caller+0x64/0x340 [ 309.735294][T14897] ? strnlen_user+0x137/0x1c0 [ 309.740080][T14897] strndup_user+0x73/0x120 [ 309.744515][T14897] __se_sys_mount+0x91/0x2e0 [ 309.746144][T14909] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 309.749114][T14897] ? mntput+0x45/0x70 [ 309.749140][T14897] ? __fpregs_load_activate+0x103/0x1b0 [ 309.759645][T14909] EXT4-fs (loop4): group descriptors corrupted! [ 309.763686][T14897] __x64_sys_mount+0x63/0x70 [ 309.771700][T14908] loop1: detected capacity change from 0 to 1 [ 309.776501][T14897] do_syscall_64+0x4a/0x90 [ 309.776528][T14897] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 309.776551][T14897] RIP: 0033:0x467afa [ 309.788147][T14908] FAT-fs (loop1): Directory bread(block 3) failed [ 309.792218][T14897] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 309.798483][T14908] FAT-fs (loop1): Directory bread(block 4) failed [ 309.802367][T14897] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 309.802389][T14897] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 309.802401][T14897] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 309.810721][T14908] FAT-fs (loop1): Directory bread(block 5) failed [ 309.830807][T14897] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 309.830824][T14897] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 309.830836][T14897] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 309.853833][T14907] loop3: detected capacity change from 0 to 264192 [ 309.856172][T14908] FAT-fs (loop1): Directory bread(block 6) failed [ 309.888973][T14907] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! 06:32:28 executing program 2 (fault-call:0 fault-nth:42): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 309.899333][T14908] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/395/file0 supports timestamps until 2107 (0x10391447e) [ 309.905635][T14907] EXT4-fs (loop3): group descriptors corrupted! [ 309.941885][T14920] loop2: detected capacity change from 0 to 1 [ 309.953147][T14920] FAULT_INJECTION: forcing a failure. [ 309.953147][T14920] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 309.967041][T14920] CPU: 0 PID: 14920 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 309.976558][T14920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.987637][T14920] Call Trace: [ 309.991096][T14920] dump_stack+0x137/0x19d [ 309.996272][T14920] should_fail+0x23c/0x250 [ 310.000953][T14920] should_fail_usercopy+0x16/0x20 [ 310.006033][T14920] _copy_from_user+0x1c/0xd0 [ 310.011036][T14920] strndup_user+0xb0/0x120 [ 310.015690][T14920] __se_sys_mount+0x91/0x2e0 [ 310.021553][T14920] ? mntput+0x45/0x70 [ 310.025679][T14920] ? __fpregs_load_activate+0x103/0x1b0 06:32:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3d0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x2cf28}], 0x1}, 0x700) [ 310.031611][T14920] __x64_sys_mount+0x63/0x70 [ 310.032605][T14926] loop5: detected capacity change from 0 to 131456 [ 310.036297][T14920] do_syscall_64+0x4a/0x90 [ 310.036326][T14920] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 310.036349][T14920] RIP: 0033:0x467afa [ 310.050690][T14926] EXT4-fs (loop5): inodes count not valid: 14 vs 32 [ 310.054903][T14920] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 310.054927][T14920] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 310.054945][T14920] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 310.054957][T14920] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 310.116601][T14920] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 310.127163][T14920] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 310.136475][T14920] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 310.186426][T14907] loop3: detected capacity change from 0 to 264192 [ 310.190855][T14909] loop4: detected capacity change from 0 to 131460 [ 310.193457][T14926] loop5: detected capacity change from 0 to 131456 [ 310.210542][T14909] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 310.221467][T14909] EXT4-fs (loop4): group descriptors corrupted! 06:32:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 310.230046][T14907] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 310.231367][T14926] EXT4-fs (loop5): inodes count not valid: 14 vs 32 [ 310.240899][T14907] EXT4-fs (loop3): group descriptors corrupted! 06:32:28 executing program 2 (fault-call:0 fault-nth:43): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 310.304985][T14954] loop1: detected capacity change from 0 to 1 [ 310.315669][T14960] loop2: detected capacity change from 0 to 1 [ 310.322985][T14954] FAT-fs (loop1): Directory bread(block 3) failed [ 310.330860][T14960] FAULT_INJECTION: forcing a failure. [ 310.330860][T14960] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 310.343163][T14954] FAT-fs (loop1): Directory bread(block 4) failed [ 310.344146][T14960] CPU: 0 PID: 14960 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 310.351712][T14954] FAT-fs (loop1): Directory bread(block 5) failed [ 310.360777][T14960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.360836][T14960] Call Trace: [ 310.360844][T14960] dump_stack+0x137/0x19d [ 310.360867][T14960] should_fail+0x23c/0x250 [ 310.390905][T14960] should_fail_usercopy+0x16/0x20 [ 310.396873][T14960] _copy_from_user+0x1c/0xd0 [ 310.401904][T14960] strndup_user+0xb0/0x120 [ 310.406537][T14960] __se_sys_mount+0x91/0x2e0 [ 310.411256][T14960] ? mntput+0x45/0x70 [ 310.415590][T14960] ? __fpregs_load_activate+0x103/0x1b0 [ 310.421401][T14960] __x64_sys_mount+0x63/0x70 [ 310.426272][T14960] do_syscall_64+0x4a/0x90 [ 310.430866][T14960] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 310.437041][T14960] RIP: 0033:0x467afa [ 310.441104][T14960] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 310.461387][T14960] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 310.470452][T14960] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 310.478942][T14960] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 310.487173][T14960] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 310.495226][T14960] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 06:32:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030b00, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="0f000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x4, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 310.503710][T14960] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 310.512134][T14956] loop3: detected capacity change from 0 to 131456 [ 310.522868][T14956] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 310.534136][T14956] EXT4-fs (loop3): group descriptors corrupted! [ 310.535272][T14954] FAT-fs (loop1): Directory bread(block 6) failed 06:32:29 executing program 2 (fault-call:0 fault-nth:44): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 310.573965][T14954] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/396/file0 supports timestamps until 2107 (0x10391447e) 06:32:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3d1, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 310.618555][T14970] loop5: detected capacity change from 0 to 131456 [ 310.628285][T14970] EXT4-fs (loop5): inodes count not valid: 15 vs 32 [ 310.642108][T14973] loop3: detected capacity change from 0 to 131456 [ 310.651063][T14986] loop2: detected capacity change from 0 to 1 [ 310.651281][T14985] loop4: detected capacity change from 0 to 131461 [ 310.660318][T14986] FAULT_INJECTION: forcing a failure. [ 310.660318][T14986] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 310.666878][T14973] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 310.679581][T14986] CPU: 1 PID: 14986 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 310.689687][T14973] EXT4-fs (loop3): group descriptors corrupted! [ 310.700715][T14986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.700731][T14986] Call Trace: [ 310.700738][T14986] dump_stack+0x137/0x19d [ 310.714134][T14985] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 310.717280][T14986] should_fail+0x23c/0x250 [ 310.720669][T14985] EXT4-fs (loop4): group descriptors corrupted! [ 310.725673][T14986] should_fail_usercopy+0x16/0x20 [ 310.751901][T14986] _copy_from_user+0x1c/0xd0 [ 310.756848][T14986] __se_sys_mount+0x115/0x2e0 [ 310.762698][T14986] ? mntput+0x45/0x70 [ 310.766773][T14986] ? __fpregs_load_activate+0x103/0x1b0 [ 310.772590][T14986] __x64_sys_mount+0x63/0x70 [ 310.777303][T14986] do_syscall_64+0x4a/0x90 [ 310.781738][T14986] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 310.787841][T14986] RIP: 0033:0x467afa [ 310.791720][T14986] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:32:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="25000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 310.811855][T14986] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 310.820537][T14986] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 310.829040][T14986] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 310.837235][T14986] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 310.845481][T14986] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 310.853692][T14986] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 310.869490][T14986] FAT-fs (loop2): Directory bread(block 3) failed [ 310.876898][T14986] FAT-fs (loop2): Directory bread(block 4) failed [ 310.883806][T14986] FAT-fs (loop2): Directory bread(block 5) failed [ 310.891377][T14986] FAT-fs (loop2): Directory bread(block 6) failed [ 310.898443][T14986] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/308/file0 supports timestamps until 2107 (0x10391447e) [ 310.909553][T14998] loop1: detected capacity change from 0 to 1 06:32:29 executing program 2 (fault-call:0 fault-nth:45): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 310.926233][T14985] loop4: detected capacity change from 0 to 131461 [ 310.933967][T14985] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 310.935983][T14973] loop3: detected capacity change from 0 to 131456 [ 310.944799][T14985] EXT4-fs (loop4): group descriptors corrupted! [ 310.958503][T14997] loop5: detected capacity change from 0 to 131456 06:32:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x6, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 310.972106][T14973] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 310.973775][T14998] FAT-fs (loop1): Directory bread(block 3) failed [ 310.982652][T14973] EXT4-fs (loop3): group descriptors corrupted! [ 311.013402][T14998] FAT-fs (loop1): Directory bread(block 4) failed [ 311.013541][T14997] EXT4-fs (loop5): inodes count not valid: 37 vs 32 [ 311.020020][T14998] FAT-fs (loop1): Directory bread(block 5) failed [ 311.040996][T14998] FAT-fs (loop1): Directory bread(block 6) failed [ 311.055999][T14998] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/397/file0 supports timestamps until 2107 (0x10391447e) 06:32:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4031001, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 311.072707][T15017] loop2: detected capacity change from 0 to 1 [ 311.106687][T15017] FAULT_INJECTION: forcing a failure. [ 311.106687][T15017] name failslab, interval 1, probability 0, space 0, times 0 [ 311.116466][T15023] loop4: detected capacity change from 0 to 131464 [ 311.119941][T15017] CPU: 1 PID: 15017 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 311.137507][T15017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.147756][T15017] Call Trace: [ 311.151118][T15017] dump_stack+0x137/0x19d [ 311.155547][T15017] should_fail+0x23c/0x250 [ 311.160454][T15017] ? getname_flags+0x84/0x3d0 [ 311.165297][T15017] __should_failslab+0x81/0x90 [ 311.170249][T15017] should_failslab+0x5/0x20 [ 311.175507][T15017] kmem_cache_alloc+0x46/0x2f0 [ 311.180361][T15017] getname_flags+0x84/0x3d0 [ 311.184855][T15017] ? should_fail+0xd6/0x250 [ 311.189471][T15017] user_path_at_empty+0x28/0x50 [ 311.194403][T15017] __se_sys_mount+0x209/0x2e0 [ 311.199070][T15017] ? mntput+0x45/0x70 [ 311.203385][T15017] ? __fpregs_load_activate+0x103/0x1b0 [ 311.209043][T15017] __x64_sys_mount+0x63/0x70 [ 311.213793][T15017] do_syscall_64+0x4a/0x90 [ 311.218399][T15017] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 311.224503][T15017] RIP: 0033:0x467afa [ 311.228762][T15017] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 311.250620][T15017] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 311.259860][T15017] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 311.268097][T15017] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 311.276418][T15017] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 311.284921][T15017] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 311.293251][T15017] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x2f71c}], 0x1}, 0x700) 06:32:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="29000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3d2, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 311.304221][T15023] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 311.315268][T15023] EXT4-fs (loop4): group descriptors corrupted! [ 311.335982][T15021] loop3: detected capacity change from 0 to 131456 [ 311.348856][T15021] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 311.348854][T15034] loop5: detected capacity change from 0 to 131456 [ 311.359551][T15021] EXT4-fs (loop3): group descriptors corrupted! [ 311.368402][T15034] EXT4-fs (loop5): inodes count not valid: 41 vs 32 06:32:30 executing program 2 (fault-call:0 fault-nth:46): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="00200000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 311.403001][T15045] loop1: detected capacity change from 0 to 1 [ 311.407726][T15023] loop4: detected capacity change from 0 to 131464 [ 311.437454][T15045] FAT-fs (loop1): Directory bread(block 3) failed [ 311.439560][T15023] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 311.446554][T15045] FAT-fs (loop1): Directory bread(block 4) failed [ 311.455209][T15023] EXT4-fs (loop4): group descriptors corrupted! [ 311.470292][T15045] FAT-fs (loop1): Directory bread(block 5) failed [ 311.474424][T15054] loop2: detected capacity change from 0 to 1 [ 311.479311][T15045] FAT-fs (loop1): Directory bread(block 6) failed [ 311.494402][T15054] FAULT_INJECTION: forcing a failure. 06:32:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x7, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 311.494402][T15054] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.501094][T15045] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/398/file0 supports timestamps until 2107 (0x10391447e) [ 311.507812][T15054] CPU: 0 PID: 15054 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 311.507830][T15054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.507839][T15054] Call Trace: [ 311.507845][T15054] dump_stack+0x137/0x19d [ 311.550328][T15054] should_fail+0x23c/0x250 [ 311.555341][T15054] should_fail_usercopy+0x16/0x20 [ 311.560399][T15054] strncpy_from_user+0x21/0x250 [ 311.565488][T15054] getname_flags+0xb8/0x3d0 [ 311.571004][T15054] ? should_fail+0xd6/0x250 [ 311.576179][T15054] user_path_at_empty+0x28/0x50 [ 311.581545][T15054] __se_sys_mount+0x209/0x2e0 [ 311.586754][T15054] ? mntput+0x45/0x70 [ 311.591002][T15054] ? __fpregs_load_activate+0x103/0x1b0 [ 311.597353][T15054] __x64_sys_mount+0x63/0x70 [ 311.602051][T15054] do_syscall_64+0x4a/0x90 [ 311.606872][T15054] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 311.614139][T15054] RIP: 0033:0x467afa [ 311.618367][T15054] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 311.638901][T15054] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:32:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403ff01, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 311.647572][T15054] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 311.655819][T15054] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 311.664798][T15054] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 311.673042][T15054] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 311.682468][T15054] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3d3, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:30 executing program 2 (fault-call:0 fault-nth:47): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 311.759563][T15062] loop3: detected capacity change from 0 to 131456 [ 311.784550][T15070] loop5: detected capacity change from 0 to 131456 [ 311.789132][T15068] loop4: detected capacity change from 0 to 131583 [ 311.807462][T15068] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 311.813421][T15062] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 311.818060][T15068] EXT4-fs (loop4): group descriptors corrupted! [ 311.828387][T15062] EXT4-fs (loop3): group descriptors corrupted! [ 311.842292][T15070] EXT4-fs (loop5): inodes count not valid: 8192 vs 32 [ 311.844990][T15075] loop2: detected capacity change from 0 to 1 [ 311.861398][T15075] FAULT_INJECTION: forcing a failure. [ 311.861398][T15075] name failslab, interval 1, probability 0, space 0, times 0 [ 311.874379][T15075] CPU: 1 PID: 15075 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 311.883569][T15075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.894545][T15075] Call Trace: [ 311.897875][T15075] dump_stack+0x137/0x19d [ 311.902217][T15075] should_fail+0x23c/0x250 [ 311.906618][T15075] __should_failslab+0x81/0x90 [ 311.911542][T15075] ? alloc_fs_context+0x46/0x500 [ 311.916617][T15075] should_failslab+0x5/0x20 [ 311.921236][T15075] kmem_cache_alloc_trace+0x49/0x310 [ 311.926914][T15075] alloc_fs_context+0x46/0x500 [ 311.932454][T15075] ? strncmp+0x34/0x70 [ 311.936595][T15075] fs_context_for_mount+0x1d/0x20 [ 311.941607][T15075] path_mount+0xdf5/0x1ce0 [ 311.946132][T15075] __se_sys_mount+0x23d/0x2e0 [ 311.951007][T15075] ? mntput+0x45/0x70 [ 311.955001][T15075] ? __fpregs_load_activate+0x103/0x1b0 [ 311.960793][T15075] __x64_sys_mount+0x63/0x70 [ 311.965554][T15075] do_syscall_64+0x4a/0x90 [ 311.970054][T15075] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 311.976293][T15075] RIP: 0033:0x467afa [ 311.980738][T15075] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 312.000802][T15075] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:32:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000020000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403fffe, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:30 executing program 2 (fault-call:0 fault-nth:48): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 312.009408][T15075] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 312.017448][T15075] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 312.025795][T15075] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 312.034106][T15075] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 312.042268][T15075] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 312.096405][T15088] loop1: detected capacity change from 0 to 1 [ 312.096924][T15091] loop2: detected capacity change from 0 to 1 [ 312.109060][T15088] FAT-fs (loop1): Directory bread(block 3) failed [ 312.115257][T15091] FAULT_INJECTION: forcing a failure. [ 312.115257][T15091] name failslab, interval 1, probability 0, space 0, times 0 [ 312.116685][T15088] FAT-fs (loop1): Directory bread(block 4) failed [ 312.130710][T15091] CPU: 1 PID: 15091 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 312.137887][T15088] FAT-fs (loop1): Directory bread(block 5) failed [ 312.146077][T15091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.146093][T15091] Call Trace: [ 312.146100][T15091] dump_stack+0x137/0x19d [ 312.153484][T15088] FAT-fs (loop1): Directory bread(block 6) failed [ 312.162671][T15091] should_fail+0x23c/0x250 [ 312.162694][T15091] __should_failslab+0x81/0x90 06:32:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x30000}], 0x1}, 0x700) 06:32:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="0e000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3d4, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 312.167448][T15088] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/399/file0 supports timestamps until 2107 (0x10391447e) [ 312.170536][T15091] ? legacy_init_fs_context+0x2d/0x70 [ 312.207564][T15091] should_failslab+0x5/0x20 [ 312.212269][T15091] kmem_cache_alloc_trace+0x49/0x310 [ 312.217757][T15091] ? kmem_cache_alloc_trace+0x215/0x310 [ 312.223450][T15091] ? alloc_fs_context+0x46/0x500 [ 312.228577][T15091] legacy_init_fs_context+0x2d/0x70 [ 312.233796][T15091] alloc_fs_context+0x419/0x500 [ 312.238815][T15091] fs_context_for_mount+0x1d/0x20 [ 312.243273][T15103] loop3: detected capacity change from 0 to 131456 [ 312.244030][T15091] path_mount+0xdf5/0x1ce0 [ 312.244051][T15091] __se_sys_mount+0x23d/0x2e0 [ 312.251089][T15084] loop5: detected capacity change from 0 to 131456 [ 312.255431][T15091] ? mntput+0x45/0x70 [ 312.271467][T15091] ? __fpregs_load_activate+0x103/0x1b0 [ 312.277190][T15091] __x64_sys_mount+0x63/0x70 [ 312.282500][T15091] do_syscall_64+0x4a/0x90 [ 312.287007][T15091] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 312.293089][T15091] RIP: 0033:0x467afa [ 312.297063][T15091] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 312.316946][T15091] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 312.325604][T15091] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 312.333904][T15091] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 312.341956][T15091] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 312.350200][T15091] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 312.358245][T15091] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="0f000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 312.389885][T15103] EXT4-fs (loop3): inodes count not valid: 14 vs 32 [ 312.401812][T15084] EXT4-fs (loop5): inodes count not valid: 536870944 vs 32 [ 312.420502][T15113] loop4: detected capacity change from 0 to 131583 06:32:31 executing program 2 (fault-call:0 fault-nth:49): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 312.438539][T15113] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 312.449661][T15113] EXT4-fs (loop4): group descriptors corrupted! [ 312.460552][T15084] loop5: detected capacity change from 0 to 131456 [ 312.480396][T15084] EXT4-fs (loop5): inodes count not valid: 536870944 vs 32 [ 312.488128][T15115] loop1: detected capacity change from 0 to 1 [ 312.489828][T15129] loop2: detected capacity change from 0 to 1 [ 312.494676][T15122] loop3: detected capacity change from 0 to 131456 [ 312.501875][T15129] FAULT_INJECTION: forcing a failure. [ 312.501875][T15129] name failslab, interval 1, probability 0, space 0, times 0 [ 312.523481][T15129] CPU: 1 PID: 15129 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 312.528632][T15115] FAT-fs (loop1): Directory bread(block 3) failed [ 312.532499][T15129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.532512][T15129] Call Trace: [ 312.532520][T15129] dump_stack+0x137/0x19d [ 312.539738][T15122] EXT4-fs (loop3): inodes count not valid: 15 vs 32 [ 312.549553][T15129] should_fail+0x23c/0x250 [ 312.549580][T15129] ? vfs_parse_fs_string+0x5e/0xc0 [ 312.555226][T15115] FAT-fs (loop1): Directory bread(block 4) failed [ 312.557650][T15129] __should_failslab+0x81/0x90 06:32:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3d5, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 312.557675][T15129] should_failslab+0x5/0x20 [ 312.564666][T15115] FAT-fs (loop1): Directory bread(block 5) failed [ 312.569196][T15129] __kmalloc_track_caller+0x64/0x340 [ 312.569266][T15129] kmemdup_nul+0x27/0x70 [ 312.569281][T15129] vfs_parse_fs_string+0x5e/0xc0 [ 312.576730][T15115] FAT-fs (loop1): Directory bread(block 6) failed [ 312.581661][T15129] path_mount+0xf99/0x1ce0 [ 312.581683][T15129] __se_sys_mount+0x23d/0x2e0 [ 312.587521][T15115] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/400/file0 supports timestamps until 2107 (0x10391447e) [ 312.591540][T15129] ? mntput+0x45/0x70 [ 312.591568][T15129] __x64_sys_mount+0x63/0x70 [ 312.655836][T15129] do_syscall_64+0x4a/0x90 [ 312.660643][T15129] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 312.666703][T15129] RIP: 0033:0x467afa [ 312.670734][T15129] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 312.692512][T15129] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 312.702431][T15129] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 312.710581][T15129] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 312.719039][T15129] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 312.727344][T15129] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 06:32:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000080100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 312.735891][T15129] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:31 executing program 2 (fault-call:0 fault-nth:50): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 312.815647][T15138] loop4: detected capacity change from 0 to 131456 [ 312.819845][T15122] loop3: detected capacity change from 0 to 131456 [ 312.830299][T15122] EXT4-fs (loop3): inodes count not valid: 15 vs 32 [ 312.841612][T15138] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 312.845245][T15148] loop5: detected capacity change from 0 to 131456 [ 312.851865][T15138] EXT4-fs (loop4): group descriptors corrupted! 06:32:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="10000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 312.859293][T15147] loop1: detected capacity change from 0 to 1 [ 312.873027][T15147] FAT-fs (loop1): Directory bread(block 3) failed [ 312.879786][T15147] FAT-fs (loop1): Directory bread(block 4) failed [ 312.886363][T15147] FAT-fs (loop1): Directory bread(block 5) failed [ 312.893161][T15147] FAT-fs (loop1): Directory bread(block 6) failed [ 312.900268][T15147] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/401/file0 supports timestamps until 2107 (0x10391447e) 06:32:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3d6, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 312.917016][T15156] loop2: detected capacity change from 0 to 1 [ 312.925840][T15156] FAULT_INJECTION: forcing a failure. [ 312.925840][T15156] name failslab, interval 1, probability 0, space 0, times 0 [ 312.939247][T15156] CPU: 1 PID: 15156 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 312.945927][T15148] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 312.948144][T15156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.948157][T15156] Call Trace: [ 312.948164][T15156] dump_stack+0x137/0x19d [ 312.958526][T15148] EXT4-fs (loop5): group descriptors corrupted! [ 312.968820][T15156] should_fail+0x23c/0x250 [ 312.988787][T15156] ? vfat_mount+0x40/0x40 [ 312.994048][T15156] ? getname_kernel+0x37/0x1d0 [ 312.999663][T15156] __should_failslab+0x81/0x90 [ 313.004908][T15156] should_failslab+0x5/0x20 [ 313.009663][T15156] kmem_cache_alloc+0x46/0x2f0 [ 313.014691][T15156] ? avc_has_perm_noaudit+0x19a/0x240 [ 313.020841][T15156] ? vfat_mount+0x40/0x40 [ 313.025372][T15156] getname_kernel+0x37/0x1d0 [ 313.030351][T15156] ? vfat_mount+0x40/0x40 [ 313.034862][T15156] kern_path+0x19/0x40 [ 313.039020][T15156] blkdev_get_by_path+0x54/0x1b0 [ 313.044138][T15156] mount_bdev+0x47/0x290 [ 313.048768][T15156] ? tsan.module_ctor+0x10/0x10 [ 313.053691][T15156] vfat_mount+0x2d/0x40 [ 313.058686][T15156] legacy_get_tree+0x70/0xc0 06:32:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x34704}], 0x1}, 0x700) [ 313.063763][T15156] vfs_get_tree+0x4a/0x1a0 [ 313.068751][T15156] path_mount+0x11d4/0x1ce0 [ 313.073684][T15156] __se_sys_mount+0x23d/0x2e0 [ 313.078751][T15156] ? mntput+0x45/0x70 [ 313.083337][T15156] ? __fpregs_load_activate+0x103/0x1b0 [ 313.089186][T15156] __x64_sys_mount+0x63/0x70 [ 313.093773][T15156] do_syscall_64+0x4a/0x90 [ 313.098204][T15156] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 313.104286][T15156] RIP: 0033:0x467afa [ 313.108570][T15156] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 313.133284][T15156] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 313.142305][T15156] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 313.150607][T15156] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 313.159177][T15156] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 313.167368][T15156] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 313.175808][T15156] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:31 executing program 2 (fault-call:0 fault-nth:51): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 313.242918][T15138] loop4: detected capacity change from 0 to 131456 [ 313.245633][T15148] loop5: detected capacity change from 0 to 131456 [ 313.261115][T15138] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 313.270978][T15148] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 313.271937][T15138] EXT4-fs (loop4): group descriptors corrupted! [ 313.282263][T15148] EXT4-fs (loop5): group descriptors corrupted! [ 313.295723][T15172] loop3: detected capacity change from 0 to 131456 [ 313.302989][T15179] loop2: detected capacity change from 0 to 1 [ 313.312212][T15179] FAULT_INJECTION: forcing a failure. [ 313.312212][T15179] name failslab, interval 1, probability 0, space 0, times 0 [ 313.314029][T15172] EXT4-fs (loop3): inodes count not valid: 16 vs 32 [ 313.325647][T15179] CPU: 1 PID: 15179 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 313.325671][T15179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.325681][T15179] Call Trace: [ 313.354564][T15179] dump_stack+0x137/0x19d [ 313.358974][T15179] should_fail+0x23c/0x250 [ 313.363465][T15179] __should_failslab+0x81/0x90 [ 313.368589][T15179] ? alloc_super+0x3a/0x520 [ 313.373258][T15179] should_failslab+0x5/0x20 [ 313.378111][T15179] kmem_cache_alloc_trace+0x49/0x310 [ 313.384124][T15179] ? __blkdev_get+0x8c/0x6c0 [ 313.389041][T15179] ? disk_block_events+0x94/0xd0 [ 313.394461][T15179] ? mount_bdev+0x290/0x290 [ 313.399058][T15179] alloc_super+0x3a/0x520 [ 313.403550][T15179] ? mount_bdev+0x290/0x290 [ 313.408130][T15179] sget+0x1a5/0x400 [ 313.412187][T15179] ? test_bdev_super+0x30/0x30 [ 313.417396][T15179] mount_bdev+0xd3/0x290 [ 313.421974][T15179] ? vfat_mount+0x40/0x40 [ 313.426493][T15179] ? tsan.module_ctor+0x10/0x10 [ 313.431618][T15179] vfat_mount+0x2d/0x40 [ 313.435967][T15179] legacy_get_tree+0x70/0xc0 [ 313.440749][T15179] vfs_get_tree+0x4a/0x1a0 [ 313.445325][T15179] path_mount+0x11d4/0x1ce0 [ 313.449814][T15179] __se_sys_mount+0x23d/0x2e0 [ 313.455065][T15179] ? mntput+0x45/0x70 [ 313.459237][T15179] ? __fpregs_load_activate+0x103/0x1b0 [ 313.464865][T15179] __x64_sys_mount+0x63/0x70 [ 313.469530][T15179] do_syscall_64+0x4a/0x90 [ 313.474144][T15179] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 313.480223][T15179] RIP: 0033:0x467afa [ 313.484362][T15179] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 313.505151][T15179] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 313.514328][T15179] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 313.522478][T15179] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 313.530891][T15179] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 06:32:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x4, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 313.539414][T15179] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 313.548364][T15179] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 313.578967][T15188] loop1: detected capacity change from 0 to 1 06:32:32 executing program 2 (fault-call:0 fault-nth:52): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 313.623692][T15188] FAT-fs (loop1): Directory bread(block 3) failed [ 313.648974][T15188] FAT-fs (loop1): Directory bread(block 4) failed [ 313.655878][T15172] loop3: detected capacity change from 0 to 131456 [ 313.662085][T15188] FAT-fs (loop1): Directory bread(block 5) failed [ 313.670213][T15202] loop5: detected capacity change from 0 to 131456 [ 313.680339][T15202] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 313.691152][T15202] EXT4-fs (loop5): group descriptors corrupted! [ 313.697801][T15188] FAT-fs (loop1): Directory bread(block 6) failed [ 313.704635][T15203] loop4: detected capacity change from 0 to 131456 [ 313.706725][T15188] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/402/file0 supports timestamps until 2107 (0x10391447e) [ 313.726922][T15210] loop2: detected capacity change from 0 to 1 [ 313.743058][T15172] EXT4-fs (loop3): inodes count not valid: 16 vs 32 [ 313.743131][T15210] FAULT_INJECTION: forcing a failure. [ 313.743131][T15210] name failslab, interval 1, probability 0, space 0, times 0 [ 313.763585][T15210] CPU: 1 PID: 15210 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 06:32:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 313.768296][T15203] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 313.772553][T15210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.772566][T15210] Call Trace: [ 313.772572][T15210] dump_stack+0x137/0x19d [ 313.783002][T15203] EXT4-fs (loop4): group descriptors corrupted! [ 313.793205][T15210] should_fail+0x23c/0x250 [ 313.793229][T15210] ? kzalloc+0x1d/0x30 [ 313.816050][T15210] __should_failslab+0x81/0x90 [ 313.820909][T15210] should_failslab+0x5/0x20 [ 313.825840][T15210] __kmalloc+0x66/0x340 [ 313.830337][T15210] kzalloc+0x1d/0x30 [ 313.834559][T15210] security_sb_alloc+0x3c/0x180 [ 313.839888][T15210] alloc_super+0x10b/0x520 [ 313.844375][T15210] ? mount_bdev+0x290/0x290 [ 313.848964][T15210] sget+0x1a5/0x400 [ 313.853105][T15210] ? test_bdev_super+0x30/0x30 [ 313.858020][T15210] mount_bdev+0xd3/0x290 [ 313.862582][T15210] ? vfat_mount+0x40/0x40 [ 313.867003][T15210] ? tsan.module_ctor+0x10/0x10 [ 313.872188][T15210] vfat_mount+0x2d/0x40 [ 313.876757][T15210] legacy_get_tree+0x70/0xc0 [ 313.881747][T15210] vfs_get_tree+0x4a/0x1a0 [ 313.886391][T15210] path_mount+0x11d4/0x1ce0 [ 313.891407][T15210] __se_sys_mount+0x23d/0x2e0 [ 313.896094][T15210] ? mntput+0x45/0x70 [ 313.900082][T15210] ? __fpregs_load_activate+0x103/0x1b0 [ 313.906232][T15210] __x64_sys_mount+0x63/0x70 [ 313.910922][T15210] do_syscall_64+0x4a/0x90 [ 313.915583][T15210] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 313.922189][T15210] RIP: 0033:0x467afa [ 313.926342][T15210] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 313.950353][T15210] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 313.959843][T15210] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa 06:32:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x402, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 313.968614][T15210] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 313.976677][T15210] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 313.984928][T15210] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 313.993604][T15210] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 314.010853][T15203] loop4: detected capacity change from 0 to 131456 06:32:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="30000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:32 executing program 2 (fault-call:0 fault-nth:53): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 314.018512][T15203] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 314.030343][T15203] EXT4-fs (loop4): group descriptors corrupted! [ 314.039216][T15220] loop5: detected capacity change from 0 to 131456 [ 314.047429][T15220] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 314.058309][T15220] EXT4-fs (loop5): group descriptors corrupted! [ 314.062415][T15225] loop2: detected capacity change from 0 to 1 06:32:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x7, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 314.086694][T15231] loop1: detected capacity change from 0 to 2 [ 314.109918][T15225] FAULT_INJECTION: forcing a failure. [ 314.109918][T15225] name failslab, interval 1, probability 0, space 0, times 0 [ 314.116502][T15231] FAT-fs (loop1): Directory bread(block 3) failed [ 314.125553][T15225] CPU: 0 PID: 15225 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 314.133052][T15231] FAT-fs (loop1): Directory bread(block 4) failed [ 314.141355][T15225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.141370][T15225] Call Trace: [ 314.141378][T15225] dump_stack+0x137/0x19d [ 314.141428][T15225] should_fail+0x23c/0x250 [ 314.150013][T15231] FAT-fs (loop1): Directory bread(block 5) failed [ 314.158510][T15225] ? kzalloc+0x1d/0x30 06:32:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x38000}], 0x1}, 0x700) 06:32:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x406, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 314.162972][T15231] FAT-fs (loop1): Directory bread(block 6) failed [ 314.166587][T15225] __should_failslab+0x81/0x90 [ 314.166613][T15225] should_failslab+0x5/0x20 [ 314.172007][T15231] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/403/file0 supports timestamps until 2107 (0x10391447e) [ 314.177622][T15225] __kmalloc+0x66/0x340 [ 314.177647][T15225] kzalloc+0x1d/0x30 [ 314.177666][T15225] security_sb_alloc+0x3c/0x180 [ 314.209480][T15239] loop4: detected capacity change from 0 to 131456 [ 314.213142][T15225] alloc_super+0x10b/0x520 [ 314.213167][T15225] ? mount_bdev+0x290/0x290 [ 314.242575][T15225] sget+0x1a5/0x400 [ 314.247174][T15225] ? test_bdev_super+0x30/0x30 [ 314.251468][T15239] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 314.252062][T15225] mount_bdev+0xd3/0x290 [ 314.262787][T15239] EXT4-fs (loop4): group descriptors corrupted! [ 314.267158][T15225] ? vfat_mount+0x40/0x40 [ 314.267185][T15225] ? tsan.module_ctor+0x10/0x10 [ 314.283113][T15225] vfat_mount+0x2d/0x40 [ 314.287374][T15225] legacy_get_tree+0x70/0xc0 [ 314.292005][T15220] loop5: detected capacity change from 0 to 131456 [ 314.292355][T15225] vfs_get_tree+0x4a/0x1a0 [ 314.292381][T15225] path_mount+0x11d4/0x1ce0 [ 314.308856][T15225] __se_sys_mount+0x23d/0x2e0 [ 314.313698][T15225] ? mntput+0x45/0x70 [ 314.317902][T15225] ? __fpregs_load_activate+0x103/0x1b0 [ 314.323700][T15225] __x64_sys_mount+0x63/0x70 [ 314.328300][T15225] do_syscall_64+0x4a/0x90 06:32:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0xf, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 314.332726][T15225] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 314.338811][T15225] RIP: 0033:0x467afa [ 314.342806][T15225] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 314.362712][T15225] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 314.369148][T15249] loop3: detected capacity change from 0 to 131456 [ 314.371312][T15225] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa 06:32:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x3bee0}], 0x1}, 0x700) 06:32:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 314.371328][T15225] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 314.371341][T15225] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 314.402703][T15225] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 314.410938][T15225] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 314.412627][T15249] EXT4-fs (loop3): inodes count not valid: 48 vs 32 06:32:33 executing program 2 (fault-call:0 fault-nth:54): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 314.493444][T15265] loop4: detected capacity change from 0 to 131456 [ 314.500325][T15263] loop1: detected capacity change from 0 to 2 [ 314.515893][T15265] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 314.516979][T15263] FAT-fs (loop1): Directory bread(block 3) failed [ 314.526476][T15265] EXT4-fs (loop4): group descriptors corrupted! [ 314.534468][T15280] loop5: detected capacity change from 0 to 131456 [ 314.540530][T15263] FAT-fs (loop1): Directory bread(block 4) failed [ 314.553562][T15275] loop3: detected capacity change from 0 to 131456 [ 314.556333][T15263] FAT-fs (loop1): Directory bread(block 5) failed [ 314.573552][T15280] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 314.578480][T15263] FAT-fs (loop1): Directory bread(block 6) failed 06:32:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x10, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 314.583993][T15280] EXT4-fs (loop5): group descriptors corrupted! [ 314.590644][T15263] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/404/file0 supports timestamps until 2107 (0x10391447e) [ 314.620842][T15277] loop2: detected capacity change from 0 to 1 [ 314.627862][T15275] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! 06:32:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x500, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 314.638276][T15275] EXT4-fs (loop3): group descriptors corrupted! [ 314.646454][T15277] FAULT_INJECTION: forcing a failure. [ 314.646454][T15277] name failslab, interval 1, probability 0, space 0, times 0 [ 314.659113][T15277] CPU: 1 PID: 15277 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 314.668246][T15277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.678877][T15277] Call Trace: [ 314.682485][T15277] dump_stack+0x137/0x19d [ 314.687021][T15277] should_fail+0x23c/0x250 [ 314.692018][T15277] ? __list_lru_init+0x70/0x680 [ 314.697514][T15277] __should_failslab+0x81/0x90 [ 314.702803][T15277] should_failslab+0x5/0x20 [ 314.707411][T15277] __kmalloc+0x66/0x340 [ 314.711685][T15277] ? prealloc_memcg_shrinker+0x444/0x460 [ 314.717402][T15277] __list_lru_init+0x70/0x680 [ 314.722338][T15277] alloc_super+0x490/0x520 [ 314.727287][T15277] ? mount_bdev+0x290/0x290 [ 314.731783][T15277] sget+0x1a5/0x400 [ 314.735916][T15277] ? test_bdev_super+0x30/0x30 [ 314.741528][T15277] mount_bdev+0xd3/0x290 [ 314.746237][T15277] ? vfat_mount+0x40/0x40 [ 314.750655][T15277] ? tsan.module_ctor+0x10/0x10 [ 314.755601][T15277] vfat_mount+0x2d/0x40 [ 314.760040][T15277] legacy_get_tree+0x70/0xc0 [ 314.764726][T15277] vfs_get_tree+0x4a/0x1a0 [ 314.769238][T15277] path_mount+0x11d4/0x1ce0 [ 314.773927][T15277] __se_sys_mount+0x23d/0x2e0 [ 314.778990][T15277] ? mntput+0x45/0x70 [ 314.783321][T15277] ? __fpregs_load_activate+0x103/0x1b0 [ 314.788997][T15277] __x64_sys_mount+0x63/0x70 [ 314.793595][T15277] do_syscall_64+0x4a/0x90 [ 314.798230][T15277] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 314.805198][T15277] RIP: 0033:0x467afa [ 314.809224][T15277] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 314.832086][T15277] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:32:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20020000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 314.840898][T15277] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 314.849035][T15277] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 314.857345][T15277] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 314.866842][T15277] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 314.875145][T15277] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:33 executing program 2 (fault-call:0 fault-nth:55): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 314.926223][T15292] loop4: detected capacity change from 0 to 131456 [ 314.949424][T15295] loop5: detected capacity change from 0 to 131456 [ 314.959404][T15275] loop3: detected capacity change from 0 to 131456 [ 314.980586][T15292] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 314.991050][T15292] EXT4-fs (loop4): group descriptors corrupted! [ 314.992826][T15295] EXT4-fs (loop5): inodes count not valid: 544 vs 32 [ 315.012382][T15275] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 315.021636][T15306] loop1: detected capacity change from 0 to 2 [ 315.022812][T15275] EXT4-fs (loop3): group descriptors corrupted! [ 315.060495][T15309] loop2: detected capacity change from 0 to 1 [ 315.061112][T15295] loop5: detected capacity change from 0 to 131456 [ 315.074213][T15306] FAT-fs (loop1): Directory bread(block 3) failed [ 315.081554][T15306] FAT-fs (loop1): Directory bread(block 4) failed [ 315.084670][T15292] loop4: detected capacity change from 0 to 131456 [ 315.088576][T15306] FAT-fs (loop1): Directory bread(block 5) failed [ 315.104569][T15309] FAULT_INJECTION: forcing a failure. [ 315.104569][T15309] name failslab, interval 1, probability 0, space 0, times 0 [ 315.118250][T15309] CPU: 0 PID: 15309 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 315.129601][T15309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.140011][T15309] Call Trace: [ 315.143329][T15309] dump_stack+0x137/0x19d [ 315.145126][T15292] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! 06:32:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 315.147690][T15309] should_fail+0x23c/0x250 [ 315.157951][T15292] EXT4-fs (loop4): group descriptors corrupted! [ 315.162315][T15309] ? __list_lru_init+0x70/0x680 [ 315.173477][T15309] __should_failslab+0x81/0x90 [ 315.178468][T15309] should_failslab+0x5/0x20 [ 315.182196][T15306] FAT-fs (loop1): Directory bread(block 6) failed [ 315.183273][T15309] __kmalloc+0x66/0x340 [ 315.183304][T15309] __list_lru_init+0x70/0x680 06:32:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x600, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 315.194363][T15306] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/405/file0 supports timestamps until 2107 (0x10391447e) [ 315.199316][T15309] alloc_super+0x4bf/0x520 [ 315.219267][T15309] ? mount_bdev+0x290/0x290 [ 315.224067][T15309] sget+0x1a5/0x400 [ 315.227890][T15309] ? test_bdev_super+0x30/0x30 [ 315.232856][T15309] mount_bdev+0xd3/0x290 [ 315.237139][T15309] ? vfat_mount+0x40/0x40 [ 315.241905][T15309] ? tsan.module_ctor+0x10/0x10 [ 315.247007][T15309] vfat_mount+0x2d/0x40 [ 315.251167][T15309] legacy_get_tree+0x70/0xc0 [ 315.256492][T15309] vfs_get_tree+0x4a/0x1a0 06:32:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x40000}], 0x1}, 0x700) [ 315.261185][T15309] path_mount+0x11d4/0x1ce0 [ 315.265806][T15309] __se_sys_mount+0x23d/0x2e0 [ 315.270560][T15309] ? mntput+0x45/0x70 [ 315.274815][T15309] ? __fpregs_load_activate+0x103/0x1b0 [ 315.280452][T15309] __x64_sys_mount+0x63/0x70 [ 315.285230][T15309] do_syscall_64+0x4a/0x90 [ 315.290227][T15309] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 315.296303][T15309] RIP: 0033:0x467afa [ 315.300317][T15309] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 315.320624][T15309] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 315.329591][T15309] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 315.337924][T15309] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 315.346042][T15309] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 06:32:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20030000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 315.354365][T15309] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 315.362452][T15309] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 315.373895][T15295] EXT4-fs (loop5): inodes count not valid: 544 vs 32 06:32:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2e, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:34 executing program 2 (fault-call:0 fault-nth:56): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000100100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 315.415762][T15321] loop3: detected capacity change from 0 to 131456 [ 315.425261][T15321] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 315.435822][T15321] EXT4-fs (loop3): group descriptors corrupted! [ 315.493743][T15336] loop1: detected capacity change from 0 to 3 [ 315.501990][T15336] FAT-fs (loop1): Directory bread(block 3) failed [ 315.509194][T15336] FAT-fs (loop1): Directory bread(block 4) failed [ 315.519349][T15336] FAT-fs (loop1): Directory bread(block 5) failed [ 315.526075][T15336] FAT-fs (loop1): Directory bread(block 6) failed [ 315.533124][T15343] loop2: detected capacity change from 0 to 1 06:32:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x604, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 315.533302][T15336] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/406/file0 supports timestamps until 2107 (0x10391447e) [ 315.539813][T15344] loop5: detected capacity change from 0 to 131456 [ 315.570787][T15353] loop4: detected capacity change from 0 to 131456 [ 315.576158][T15343] FAULT_INJECTION: forcing a failure. [ 315.576158][T15343] name failslab, interval 1, probability 0, space 0, times 0 [ 315.590628][T15343] CPU: 0 PID: 15343 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 315.599944][T15343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.602435][T15353] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 315.610823][T15343] Call Trace: [ 315.610835][T15343] dump_stack+0x137/0x19d [ 315.610859][T15343] should_fail+0x23c/0x250 [ 315.610877][T15343] __should_failslab+0x81/0x90 [ 315.620981][T15353] EXT4-fs (loop4): group descriptors corrupted! [ 315.624295][T15343] should_failslab+0x5/0x20 [ 315.630634][T15355] loop3: detected capacity change from 0 to 131456 [ 315.633127][T15343] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 315.633155][T15343] ? __list_lru_init+0x70/0x680 [ 315.633176][T15343] ? __kmalloc_node+0x30/0x40 [ 315.642133][T15355] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 315.644411][T15343] __kmalloc_node+0x30/0x40 [ 315.644440][T15343] kvmalloc_node+0x81/0xf0 [ 315.649168][T15355] EXT4-fs (loop3): group descriptors corrupted! [ 315.653885][T15344] EXT4-fs (loop5): inodes count not valid: 800 vs 32 [ 315.655899][T15343] __list_lru_init+0x2d7/0x680 [ 315.655926][T15343] alloc_super+0x4bf/0x520 [ 315.715070][T15343] ? mount_bdev+0x290/0x290 [ 315.719915][T15343] sget+0x1a5/0x400 [ 315.724661][T15343] ? test_bdev_super+0x30/0x30 [ 315.730070][T15343] mount_bdev+0xd3/0x290 [ 315.734927][T15343] ? vfat_mount+0x40/0x40 [ 315.739292][T15343] ? tsan.module_ctor+0x10/0x10 [ 315.744239][T15343] vfat_mount+0x2d/0x40 [ 315.748663][T15343] legacy_get_tree+0x70/0xc0 [ 315.754113][T15343] vfs_get_tree+0x4a/0x1a0 [ 315.758647][T15343] path_mount+0x11d4/0x1ce0 [ 315.763773][T15343] __se_sys_mount+0x23d/0x2e0 [ 315.768473][T15343] ? mntput+0x45/0x70 [ 315.772939][T15343] ? __fpregs_load_activate+0x103/0x1b0 [ 315.778974][T15343] __x64_sys_mount+0x63/0x70 [ 315.784136][T15343] do_syscall_64+0x4a/0x90 [ 315.788554][T15343] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 315.794434][T15343] RIP: 0033:0x467afa [ 315.798431][T15343] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 315.818963][T15343] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 315.827539][T15343] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 315.835684][T15343] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 315.843936][T15343] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 315.851893][T15343] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 315.860114][T15343] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:34 executing program 2 (fault-call:0 fault-nth:57): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 315.898290][T15353] loop4: detected capacity change from 0 to 131456 [ 315.912522][T15344] loop5: detected capacity change from 0 to 131456 [ 315.912729][T15366] loop1: detected capacity change from 0 to 3 [ 315.921482][T15353] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 315.936191][T15353] EXT4-fs (loop4): group descriptors corrupted! 06:32:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20020000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 315.940332][T15355] loop3: detected capacity change from 0 to 131456 [ 315.950397][T15355] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 315.960625][T15355] EXT4-fs (loop3): group descriptors corrupted! [ 315.979087][T15366] FAT-fs (loop1): Directory bread(block 3) failed [ 315.991434][T15344] EXT4-fs (loop5): inodes count not valid: 800 vs 32 06:32:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0xfe, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20030000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20040000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 315.992589][T15366] FAT-fs (loop1): Directory bread(block 4) failed [ 316.006077][T15366] FAT-fs (loop1): Directory bread(block 5) failed [ 316.013716][T15366] FAT-fs (loop1): Directory bread(block 6) failed [ 316.015301][T15381] loop2: detected capacity change from 0 to 1 [ 316.029666][T15366] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/407/file0 supports timestamps until 2107 (0x10391447e) 06:32:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x700, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 316.080302][T15381] FAULT_INJECTION: forcing a failure. [ 316.080302][T15381] name failslab, interval 1, probability 0, space 0, times 0 [ 316.094101][T15381] CPU: 1 PID: 15381 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 316.103313][T15381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.113708][T15381] Call Trace: [ 316.116987][T15381] dump_stack+0x137/0x19d [ 316.124127][T15381] should_fail+0x23c/0x250 06:32:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x436bc}], 0x1}, 0x700) [ 316.128863][T15381] __should_failslab+0x81/0x90 [ 316.134148][T15381] should_failslab+0x5/0x20 [ 316.138657][T15381] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 316.144545][T15381] ? __list_lru_init+0x70/0x680 [ 316.149472][T15381] ? __kmalloc_node+0x30/0x40 [ 316.154287][T15381] __kmalloc_node+0x30/0x40 [ 316.158907][T15381] kvmalloc_node+0x81/0xf0 [ 316.163334][T15381] __list_lru_init+0x2d7/0x680 [ 316.168465][T15381] alloc_super+0x4bf/0x520 [ 316.173204][T15381] ? mount_bdev+0x290/0x290 [ 316.177841][T15381] sget+0x1a5/0x400 [ 316.182298][T15381] ? test_bdev_super+0x30/0x30 [ 316.187237][T15381] mount_bdev+0xd3/0x290 [ 316.192145][T15381] ? vfat_mount+0x40/0x40 [ 316.196559][T15381] ? tsan.module_ctor+0x10/0x10 [ 316.201411][T15381] vfat_mount+0x2d/0x40 [ 316.205773][T15381] legacy_get_tree+0x70/0xc0 [ 316.210865][T15381] vfs_get_tree+0x4a/0x1a0 [ 316.215746][T15381] path_mount+0x11d4/0x1ce0 [ 316.220562][T15381] __se_sys_mount+0x23d/0x2e0 [ 316.225312][T15381] ? mntput+0x45/0x70 [ 316.229378][T15381] ? __fpregs_load_activate+0x103/0x1b0 [ 316.235029][T15381] __x64_sys_mount+0x63/0x70 [ 316.239605][T15381] do_syscall_64+0x4a/0x90 [ 316.244220][T15381] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 316.250545][T15381] RIP: 0033:0x467afa [ 316.254636][T15381] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 316.274937][T15381] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 316.284519][T15381] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 316.292606][T15381] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 316.302318][T15381] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 316.310399][T15381] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 316.318663][T15381] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:35 executing program 2 (fault-call:0 fault-nth:58): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x10e, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 316.395295][T15398] loop3: detected capacity change from 0 to 131456 [ 316.395598][T15407] loop5: detected capacity change from 0 to 131456 [ 316.410122][T15405] loop1: detected capacity change from 0 to 3 [ 316.418158][T15398] EXT4-fs (loop3): inodes count not valid: 800 vs 32 [ 316.426139][T15412] loop2: detected capacity change from 0 to 1 [ 316.429680][T15414] loop4: detected capacity change from 0 to 131456 [ 316.441772][T15407] EXT4-fs (loop5): inodes count not valid: 1056 vs 32 [ 316.454953][T15405] FAT-fs (loop1): Directory bread(block 3) failed [ 316.461720][T15405] FAT-fs (loop1): Directory bread(block 4) failed [ 316.462284][T15412] FAULT_INJECTION: forcing a failure. [ 316.462284][T15412] name failslab, interval 1, probability 0, space 0, times 0 [ 316.483242][T15412] CPU: 1 PID: 15412 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 316.492442][T15412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.503038][T15412] Call Trace: [ 316.506458][T15412] dump_stack+0x137/0x19d [ 316.510978][T15412] should_fail+0x23c/0x250 [ 316.515389][T15412] ? mempool_alloc_slab+0x16/0x20 [ 316.520756][T15412] __should_failslab+0x81/0x90 [ 316.525780][T15412] should_failslab+0x5/0x20 [ 316.530272][T15412] kmem_cache_alloc+0x46/0x2f0 [ 316.535165][T15412] ? PageHuge+0x59/0xc0 [ 316.539787][T15412] mempool_alloc_slab+0x16/0x20 [ 316.545325][T15412] ? mempool_free+0x130/0x130 [ 316.550091][T15412] mempool_alloc+0x8c/0x300 [ 316.554758][T15412] ? __find_get_block+0x82c/0x900 [ 316.560303][T15412] bio_alloc_bioset+0xcc/0x480 [ 316.565211][T15412] submit_bh_wbc+0x130/0x330 [ 316.569981][T15412] __bread_gfp+0x110/0x220 [ 316.574705][T15412] fat_fill_super+0xe77/0x2a80 [ 316.579706][T15412] ? vfat_fill_super+0x40/0x40 [ 316.584909][T15412] ? snprintf+0x6f/0x90 [ 316.589375][T15412] ? register_shrinker_prepared+0xc2/0xd0 [ 316.595347][T15412] vfat_fill_super+0x2c/0x40 [ 316.600107][T15412] mount_bdev+0x1e8/0x290 [ 316.604511][T15412] ? vfat_mount+0x40/0x40 [ 316.609346][T15412] ? tsan.module_ctor+0x10/0x10 [ 316.614739][T15412] vfat_mount+0x2d/0x40 [ 316.619029][T15412] legacy_get_tree+0x70/0xc0 [ 316.623874][T15412] vfs_get_tree+0x4a/0x1a0 [ 316.628692][T15412] path_mount+0x11d4/0x1ce0 [ 316.633287][T15412] __se_sys_mount+0x23d/0x2e0 [ 316.638061][T15412] ? mntput+0x45/0x70 [ 316.642224][T15412] ? __fpregs_load_activate+0x103/0x1b0 [ 316.648038][T15412] __x64_sys_mount+0x63/0x70 [ 316.652620][T15412] do_syscall_64+0x4a/0x90 [ 316.657143][T15412] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 316.663125][T15412] RIP: 0033:0x467afa [ 316.667267][T15412] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:32:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20040000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 316.688752][T15412] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 316.697689][T15412] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 316.706334][T15412] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 316.714586][T15412] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 316.723235][T15412] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 316.731196][T15412] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20050000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 316.750074][T15412] FAT-fs (loop2): Directory bread(block 3) failed [ 316.756977][T15405] FAT-fs (loop1): Directory bread(block 5) failed [ 316.764536][T15414] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 316.774742][T15414] EXT4-fs (loop4): group descriptors corrupted! [ 316.778097][T15412] FAT-fs (loop2): Directory bread(block 4) failed [ 316.790001][T15412] FAT-fs (loop2): Directory bread(block 5) failed [ 316.791833][T15405] FAT-fs (loop1): Directory bread(block 6) failed [ 316.797205][T15412] FAT-fs (loop2): Directory bread(block 6) failed [ 316.810926][T15412] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/322/file0 supports timestamps until 2107 (0x10391447e) [ 316.826153][T15405] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/408/file0 supports timestamps until 2107 (0x10391447e) [ 316.843259][T15425] loop5: detected capacity change from 0 to 131456 06:32:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x7800, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:35 executing program 2 (fault-call:0 fault-nth:59): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x900, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 316.876804][T15425] EXT4-fs (loop5): inodes count not valid: 1312 vs 32 [ 316.898884][T15434] loop3: detected capacity change from 0 to 131456 [ 316.918208][T15425] loop5: detected capacity change from 0 to 131456 06:32:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20050000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 316.920276][T15434] EXT4-fs (loop3): inodes count not valid: 1056 vs 32 [ 316.925716][T15425] EXT4-fs (loop5): inodes count not valid: 1312 vs 32 06:32:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20060000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x48000}], 0x1}, 0x700) [ 317.000391][T15448] loop1: detected capacity change from 0 to 4 [ 317.007128][T15452] loop2: detected capacity change from 0 to 1 [ 317.020266][T15450] loop3: detected capacity change from 0 to 131456 [ 317.034591][T15452] FAULT_INJECTION: forcing a failure. [ 317.034591][T15452] name failslab, interval 1, probability 0, space 0, times 0 [ 317.048074][T15452] CPU: 0 PID: 15452 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 317.056954][T15452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.067725][T15452] Call Trace: [ 317.071006][T15452] dump_stack+0x137/0x19d [ 317.075942][T15452] should_fail+0x23c/0x250 [ 317.081410][T15452] __should_failslab+0x81/0x90 [ 317.086558][T15452] should_failslab+0x5/0x20 [ 317.091401][T15452] kmem_cache_alloc_node+0x58/0x2b0 [ 317.097251][T15452] ? create_task_io_context+0x36/0x210 [ 317.103120][T15452] ? __mod_memcg_lruvec_state+0xaa/0x190 [ 317.108754][T15452] create_task_io_context+0x36/0x210 [ 317.114116][T15452] submit_bio_checks+0x778/0x800 [ 317.119527][T15452] ? kmem_cache_alloc+0x201/0x2f0 [ 317.126673][T15452] ? mempool_alloc_slab+0x16/0x20 [ 317.131795][T15452] submit_bio_noacct+0x33/0x7e0 [ 317.136876][T15452] ? mempool_alloc_slab+0x16/0x20 [ 317.142689][T15452] ? mempool_free+0x130/0x130 [ 317.147536][T15452] ? mempool_alloc+0x99/0x300 [ 317.152393][T15452] ? __bio_add_page+0x1a3/0x210 [ 317.157391][T15452] submit_bio+0x16d/0x2b0 [ 317.161805][T15452] ? bio_add_page+0x1fc/0x260 [ 317.166502][T15452] ? bio_alloc_bioset+0x402/0x480 [ 317.171853][T15452] submit_bh_wbc+0x2f3/0x330 [ 317.177538][T15452] __bread_gfp+0x110/0x220 [ 317.182015][T15452] fat_fill_super+0xe77/0x2a80 [ 317.187141][T15452] ? vfat_fill_super+0x40/0x40 [ 317.192190][T15452] ? snprintf+0x6f/0x90 [ 317.196795][T15452] ? register_shrinker_prepared+0xc2/0xd0 [ 317.202663][T15452] vfat_fill_super+0x2c/0x40 [ 317.207450][T15452] mount_bdev+0x1e8/0x290 [ 317.211958][T15452] ? vfat_mount+0x40/0x40 [ 317.216390][T15452] ? tsan.module_ctor+0x10/0x10 [ 317.221581][T15452] vfat_mount+0x2d/0x40 [ 317.225907][T15452] legacy_get_tree+0x70/0xc0 [ 317.230661][T15452] vfs_get_tree+0x4a/0x1a0 [ 317.235400][T15452] path_mount+0x11d4/0x1ce0 [ 317.240419][T15452] __se_sys_mount+0x23d/0x2e0 [ 317.245442][T15452] ? mntput+0x45/0x70 [ 317.249500][T15452] ? __fpregs_load_activate+0x103/0x1b0 [ 317.255245][T15452] __x64_sys_mount+0x63/0x70 [ 317.260102][T15452] do_syscall_64+0x4a/0x90 [ 317.264831][T15452] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 317.271295][T15452] RIP: 0033:0x467afa [ 317.275461][T15452] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 317.295596][T15452] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 317.304105][T15452] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 317.312321][T15452] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 317.320548][T15452] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 317.328608][T15452] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 317.336794][T15452] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 317.374664][T15450] EXT4-fs (loop3): inodes count not valid: 1312 vs 32 [ 317.426305][T15452] FAT-fs (loop2): Directory bread(block 3) failed [ 317.433033][T15467] loop5: detected capacity change from 0 to 131456 [ 317.441147][T15437] loop4: detected capacity change from 0 to 131456 [ 317.445107][T15467] EXT4-fs (loop5): inodes count not valid: 1568 vs 32 [ 317.451377][T15437] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 317.465492][T15437] EXT4-fs (loop4): group descriptors corrupted! [ 317.465726][T15452] FAT-fs (loop2): Directory bread(block 4) failed [ 317.486283][T15448] FAT-fs (loop1): Directory bread(block 4) failed [ 317.488745][T15452] FAT-fs (loop2): Directory bread(block 5) failed [ 317.494589][T15448] FAT-fs (loop1): Directory bread(block 5) failed [ 317.500867][T15452] FAT-fs (loop2): Directory bread(block 6) failed [ 317.506622][T15448] FAT-fs (loop1): Directory bread(block 6) failed 06:32:36 executing program 2 (fault-call:0 fault-nth:60): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xa00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 317.506731][T15448] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/409/file0 supports timestamps until 2107 (0x10391447e) [ 317.534996][T15452] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/323/file0 supports timestamps until 2107 (0x10391447e) [ 317.557130][T15450] loop3: detected capacity change from 0 to 131456 [ 317.567283][T15450] EXT4-fs (loop3): inodes count not valid: 1312 vs 32 06:32:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20060000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20070000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 317.641944][T15487] loop2: detected capacity change from 0 to 1 [ 317.650810][T15491] loop5: detected capacity change from 0 to 131456 [ 317.663153][T15493] loop1: detected capacity change from 0 to 5 [ 317.670033][T15487] FAULT_INJECTION: forcing a failure. [ 317.670033][T15487] name failslab, interval 1, probability 0, space 0, times 0 06:32:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0xfffe, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 317.683640][T15487] CPU: 0 PID: 15487 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 317.683919][T15493] FAT-fs (loop1): Directory bread(block 5) failed [ 317.692892][T15487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.692906][T15487] Call Trace: [ 317.692913][T15487] dump_stack+0x137/0x19d [ 317.692936][T15487] should_fail+0x23c/0x250 [ 317.692953][T15487] ? fat_alloc_inode+0x25/0x90 [ 317.699942][T15493] FAT-fs (loop1): Directory bread(block 6) failed [ 317.710401][T15487] __should_failslab+0x81/0x90 [ 317.710431][T15487] ? fat_get_block_bmap+0x1d0/0x1d0 [ 317.710454][T15487] should_failslab+0x5/0x20 [ 317.713985][T15493] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/410/file0 supports timestamps until 2107 (0x10391447e) [ 317.718263][T15487] kmem_cache_alloc+0x46/0x2f0 [ 317.744190][T15501] loop3: detected capacity change from 0 to 131456 [ 317.744624][T15487] ? fat_get_block_bmap+0x1d0/0x1d0 [ 317.753806][T15491] EXT4-fs (loop5): inodes count not valid: 1824 vs 32 [ 317.764036][T15487] fat_alloc_inode+0x25/0x90 06:32:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xb00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 317.764071][T15487] ? fat_get_block_bmap+0x1d0/0x1d0 [ 317.797931][T15487] new_inode_pseudo+0x38/0x1c0 [ 317.802983][T15487] new_inode+0x21/0x120 [ 317.807501][T15487] fat_fill_super+0x1d86/0x2a80 [ 317.812858][T15487] ? snprintf+0x6f/0x90 [ 317.817284][T15487] ? register_shrinker_prepared+0xc2/0xd0 [ 317.821982][T15501] EXT4-fs (loop3): inodes count not valid: 1568 vs 32 [ 317.823209][T15487] vfat_fill_super+0x2c/0x40 [ 317.835253][T15487] mount_bdev+0x1e8/0x290 [ 317.839690][T15487] ? vfat_mount+0x40/0x40 [ 317.844208][T15487] ? tsan.module_ctor+0x10/0x10 [ 317.849338][T15487] vfat_mount+0x2d/0x40 [ 317.853649][T15487] legacy_get_tree+0x70/0xc0 [ 317.858526][T15487] vfs_get_tree+0x4a/0x1a0 [ 317.863297][T15487] path_mount+0x11d4/0x1ce0 [ 317.867812][T15487] __se_sys_mount+0x23d/0x2e0 [ 317.872583][T15487] ? mntput+0x45/0x70 [ 317.876676][T15487] ? __fpregs_load_activate+0x103/0x1b0 [ 317.882337][T15487] __x64_sys_mount+0x63/0x70 [ 317.886940][T15487] do_syscall_64+0x4a/0x90 [ 317.891364][T15487] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 317.897613][T15487] RIP: 0033:0x467afa [ 317.901512][T15487] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 317.921935][T15487] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 317.930529][T15487] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 317.938845][T15487] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 317.947644][T15487] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 317.955968][T15487] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 317.964303][T15487] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:36 executing program 2 (fault-call:0 fault-nth:61): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20070000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 318.021680][T15501] loop3: detected capacity change from 0 to 131456 [ 318.028922][T15501] EXT4-fs (loop3): inodes count not valid: 1568 vs 32 [ 318.069875][T15491] loop5: detected capacity change from 0 to 131456 [ 318.087724][T15523] loop2: detected capacity change from 0 to 1 [ 318.117188][T15523] FAULT_INJECTION: forcing a failure. [ 318.117188][T15523] name failslab, interval 1, probability 0, space 0, times 0 [ 318.127487][T15491] EXT4-fs (loop5): inodes count not valid: 1824 vs 32 [ 318.131980][T15523] CPU: 1 PID: 15523 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 318.148087][T15523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.158751][T15523] Call Trace: [ 318.162031][T15523] dump_stack+0x137/0x19d [ 318.166375][T15523] should_fail+0x23c/0x250 [ 318.170898][T15523] ? security_inode_alloc+0x30/0x180 [ 318.176793][T15523] __should_failslab+0x81/0x90 [ 318.181664][T15523] should_failslab+0x5/0x20 [ 318.186276][T15523] kmem_cache_alloc+0x46/0x2f0 [ 318.191046][T15523] security_inode_alloc+0x30/0x180 [ 318.196150][T15523] inode_init_always+0x20b/0x420 [ 318.201227][T15523] ? fat_get_block_bmap+0x1d0/0x1d0 [ 318.206566][T15523] new_inode_pseudo+0x73/0x1c0 [ 318.211321][T15523] new_inode+0x21/0x120 [ 318.215745][T15523] fat_fill_super+0x1d86/0x2a80 [ 318.220757][T15523] ? snprintf+0x6f/0x90 [ 318.225368][T15523] ? register_shrinker_prepared+0xc2/0xd0 [ 318.231391][T15523] vfat_fill_super+0x2c/0x40 [ 318.236250][T15523] mount_bdev+0x1e8/0x290 [ 318.240659][T15523] ? vfat_mount+0x40/0x40 [ 318.245486][T15523] ? tsan.module_ctor+0x10/0x10 [ 318.250757][T15523] vfat_mount+0x2d/0x40 [ 318.255072][T15523] legacy_get_tree+0x70/0xc0 [ 318.259973][T15523] vfs_get_tree+0x4a/0x1a0 [ 318.264443][T15523] path_mount+0x11d4/0x1ce0 [ 318.269156][T15523] __se_sys_mount+0x23d/0x2e0 [ 318.273982][T15523] ? mntput+0x45/0x70 [ 318.278230][T15523] ? __fpregs_load_activate+0x103/0x1b0 [ 318.284627][T15523] __x64_sys_mount+0x63/0x70 [ 318.289344][T15523] do_syscall_64+0x4a/0x90 [ 318.293750][T15523] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.299830][T15523] RIP: 0033:0x467afa [ 318.303777][T15523] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.324399][T15523] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 318.332819][T15523] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 318.341098][T15523] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 318.349143][T15523] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 318.357925][T15523] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 06:32:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x4ae98}], 0x1}, 0x700) 06:32:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20080000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 318.366427][T15523] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 318.378206][T15530] loop1: detected capacity change from 0 to 5 [ 318.385044][T15533] loop3: detected capacity change from 0 to 131456 [ 318.403479][T15533] EXT4-fs (loop3): inodes count not valid: 1824 vs 32 06:32:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xc00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 318.430866][T15530] FAT-fs (loop1): Directory bread(block 5) failed [ 318.442121][T15530] FAT-fs (loop1): Directory bread(block 6) failed [ 318.449493][T15530] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/411/file0 supports timestamps until 2107 (0x10391447e) 06:32:37 executing program 2 (fault-call:0 fault-nth:62): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 318.505453][T15533] loop3: detected capacity change from 0 to 131456 [ 318.513034][T15533] EXT4-fs (loop3): inodes count not valid: 1824 vs 32 [ 318.548775][T15555] loop2: detected capacity change from 0 to 1 [ 318.549679][T15551] loop5: detected capacity change from 0 to 131456 [ 318.574661][T15555] FAULT_INJECTION: forcing a failure. [ 318.574661][T15555] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 318.580918][T15551] EXT4-fs (loop5): inodes count not valid: 2080 vs 32 [ 318.588455][T15555] CPU: 0 PID: 15555 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 318.588479][T15555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.588489][T15555] Call Trace: [ 318.588496][T15555] dump_stack+0x137/0x19d [ 318.624207][T15555] should_fail+0x23c/0x250 [ 318.628809][T15555] __alloc_pages+0x102/0x320 [ 318.629745][T15513] loop4: detected capacity change from 0 to 131456 [ 318.633655][T15555] kmem_getpages+0x1a/0xd0 [ 318.646495][T15513] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 318.646996][T15555] cache_grow_begin+0x4c/0x1a0 [ 318.647021][T15555] cache_alloc_refill+0x326/0x3d0 [ 318.647038][T15555] ? should_fail+0xd6/0x250 [ 318.647054][T15555] ? fat_alloc_inode+0x25/0x90 [ 318.657762][T15513] EXT4-fs (loop4): group descriptors corrupted! [ 318.662678][T15555] ? fat_get_block_bmap+0x1d0/0x1d0 [ 318.689148][T15555] kmem_cache_alloc+0x26c/0x2f0 [ 318.694037][T15555] ? fat_alloc_inode+0x25/0x90 [ 318.699002][T15555] ? fat_get_block_bmap+0x1d0/0x1d0 [ 318.704395][T15555] fat_alloc_inode+0x25/0x90 [ 318.709296][T15555] ? fat_get_block_bmap+0x1d0/0x1d0 [ 318.715117][T15555] new_inode_pseudo+0x38/0x1c0 [ 318.720165][T15555] new_inode+0x21/0x120 [ 318.724524][T15555] fat_fill_super+0x1d86/0x2a80 [ 318.729548][T15555] ? snprintf+0x6f/0x90 [ 318.733700][T15555] ? register_shrinker_prepared+0xc2/0xd0 [ 318.739777][T15555] vfat_fill_super+0x2c/0x40 [ 318.744601][T15555] mount_bdev+0x1e8/0x290 [ 318.749048][T15555] ? vfat_mount+0x40/0x40 [ 318.753641][T15555] ? tsan.module_ctor+0x10/0x10 [ 318.758689][T15555] vfat_mount+0x2d/0x40 [ 318.762839][T15555] legacy_get_tree+0x70/0xc0 [ 318.767693][T15555] vfs_get_tree+0x4a/0x1a0 [ 318.772378][T15555] path_mount+0x11d4/0x1ce0 [ 318.776863][T15555] __se_sys_mount+0x23d/0x2e0 [ 318.781741][T15555] ? mntput+0x45/0x70 [ 318.785843][T15555] ? __fpregs_load_activate+0x103/0x1b0 [ 318.791584][T15555] __x64_sys_mount+0x63/0x70 [ 318.796612][T15555] do_syscall_64+0x4a/0x90 [ 318.801269][T15555] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.807324][T15555] RIP: 0033:0x467afa [ 318.811359][T15555] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.831754][T15555] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 318.840242][T15555] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa 06:32:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20090000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 318.848935][T15555] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 318.857243][T15555] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 318.865713][T15555] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 318.873672][T15555] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 318.886778][T15564] loop1: detected capacity change from 0 to 6 06:32:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20080000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x100c0, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 318.945231][T15564] FAT-fs (loop1): Directory bread(block 6) failed [ 318.979795][T15580] loop5: detected capacity change from 0 to 131456 [ 318.989366][T15580] EXT4-fs (loop5): inodes count not valid: 2336 vs 32 [ 318.996593][T15579] loop3: detected capacity change from 0 to 131456 [ 318.997509][T15564] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/412/file0 supports timestamps until 2107 (0x10391447e) [ 319.010286][T15579] EXT4-fs (loop3): inodes count not valid: 2080 vs 32 [ 319.025356][T15555] FAT-fs (loop2): Directory bread(block 3) failed [ 319.032495][T15555] FAT-fs (loop2): Directory bread(block 4) failed [ 319.039786][T15555] FAT-fs (loop2): Directory bread(block 5) failed [ 319.046986][T15555] FAT-fs (loop2): Directory bread(block 6) failed [ 319.054802][T15555] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/326/file0 supports timestamps until 2107 (0x10391447e) 06:32:37 executing program 2 (fault-call:0 fault-nth:63): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xd00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 319.091260][T15579] loop3: detected capacity change from 0 to 131456 [ 319.109316][T15579] EXT4-fs (loop3): inodes count not valid: 2080 vs 32 06:32:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200a0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200a0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 319.166661][T15598] loop2: detected capacity change from 0 to 1 [ 319.186354][T15606] loop1: detected capacity change from 0 to 6 [ 319.201135][T15610] loop5: detected capacity change from 0 to 131456 [ 319.201272][T15598] FAULT_INJECTION: forcing a failure. [ 319.201272][T15598] name failslab, interval 1, probability 0, space 0, times 0 [ 319.210067][T15610] EXT4-fs (loop5): inodes count not valid: 2592 vs 32 [ 319.220917][T15598] CPU: 0 PID: 15598 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 319.237923][T15598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.248272][T15598] Call Trace: [ 319.251642][T15598] dump_stack+0x137/0x19d [ 319.256252][T15598] should_fail+0x23c/0x250 [ 319.260791][T15598] ? security_inode_alloc+0x30/0x180 [ 319.266463][T15598] __should_failslab+0x81/0x90 [ 319.271323][T15598] should_failslab+0x5/0x20 [ 319.275969][T15598] kmem_cache_alloc+0x46/0x2f0 [ 319.281052][T15598] security_inode_alloc+0x30/0x180 [ 319.286371][T15598] inode_init_always+0x20b/0x420 [ 319.291405][T15598] ? fat_get_block_bmap+0x1d0/0x1d0 [ 319.296607][T15598] new_inode_pseudo+0x73/0x1c0 [ 319.301668][T15598] new_inode+0x21/0x120 [ 319.306028][T15598] fat_fill_super+0x1daf/0x2a80 [ 319.311087][T15598] ? snprintf+0x6f/0x90 [ 319.315536][T15598] ? register_shrinker_prepared+0xc2/0xd0 [ 319.321487][T15598] vfat_fill_super+0x2c/0x40 [ 319.326361][T15598] mount_bdev+0x1e8/0x290 [ 319.330822][T15598] ? vfat_mount+0x40/0x40 [ 319.335414][T15598] ? tsan.module_ctor+0x10/0x10 [ 319.340562][T15598] vfat_mount+0x2d/0x40 [ 319.344784][T15598] legacy_get_tree+0x70/0xc0 [ 319.349484][T15598] vfs_get_tree+0x4a/0x1a0 [ 319.354057][T15598] path_mount+0x11d4/0x1ce0 [ 319.358723][T15598] __se_sys_mount+0x23d/0x2e0 [ 319.363399][T15598] ? mntput+0x45/0x70 06:32:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x50000}], 0x1}, 0x700) [ 319.367375][T15598] ? __fpregs_load_activate+0x103/0x1b0 [ 319.373171][T15598] __x64_sys_mount+0x63/0x70 [ 319.377932][T15598] do_syscall_64+0x4a/0x90 [ 319.382347][T15598] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.388767][T15598] RIP: 0033:0x467afa [ 319.392754][T15598] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 319.413270][T15598] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 319.422464][T15598] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 319.430522][T15598] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 319.438586][T15598] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 319.446640][T15598] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 319.454783][T15598] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 319.489623][T15606] FAT-fs (loop1): Directory bread(block 6) failed [ 319.495467][T15616] loop3: detected capacity change from 0 to 131456 [ 319.496580][T15606] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/413/file0 supports timestamps until 2107 (0x10391447e) [ 319.503529][T15590] loop4: detected capacity change from 0 to 131456 [ 319.526163][T15610] loop5: detected capacity change from 0 to 131456 06:32:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200b0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 319.545558][T15616] EXT4-fs (loop3): inodes count not valid: 2592 vs 32 [ 319.549221][T15610] EXT4-fs (loop5): inodes count not valid: 2592 vs 32 [ 319.574418][T15590] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 319.586964][T15590] EXT4-fs (loop4): group descriptors corrupted! 06:32:38 executing program 2 (fault-call:0 fault-nth:64): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 319.652871][T15639] loop2: detected capacity change from 0 to 1 [ 319.664338][T15639] FAULT_INJECTION: forcing a failure. [ 319.664338][T15639] name failslab, interval 1, probability 0, space 0, times 0 [ 319.677809][T15639] CPU: 1 PID: 15639 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 319.679097][T15635] loop5: detected capacity change from 0 to 131456 06:32:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xe00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 319.687035][T15639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.687050][T15639] Call Trace: [ 319.687056][T15639] dump_stack+0x137/0x19d [ 319.687128][T15639] should_fail+0x23c/0x250 [ 319.687146][T15639] ? fat_alloc_inode+0x25/0x90 [ 319.722012][T15639] __should_failslab+0x81/0x90 [ 319.727958][T15639] ? fat_get_block_bmap+0x1d0/0x1d0 [ 319.728886][T15635] EXT4-fs (loop5): inodes count not valid: 2848 vs 32 [ 319.733754][T15639] should_failslab+0x5/0x20 [ 319.745421][T15639] kmem_cache_alloc+0x46/0x2f0 [ 319.750289][T15639] ? security_inode_alloc+0x138/0x180 [ 319.755991][T15639] ? fat_get_block_bmap+0x1d0/0x1d0 [ 319.761552][T15639] fat_alloc_inode+0x25/0x90 [ 319.763421][T15616] loop3: detected capacity change from 0 to 131456 [ 319.766193][T15639] ? fat_get_block_bmap+0x1d0/0x1d0 [ 319.766221][T15639] new_inode_pseudo+0x38/0x1c0 [ 319.783073][T15639] new_inode+0x21/0x120 [ 319.787346][T15639] fat_fill_super+0x1e08/0x2a80 [ 319.791386][T15616] EXT4-fs (loop3): inodes count not valid: 2592 vs 32 [ 319.792477][T15639] ? snprintf+0x6f/0x90 [ 319.803996][T15639] ? register_shrinker_prepared+0xc2/0xd0 [ 319.810270][T15639] vfat_fill_super+0x2c/0x40 [ 319.815938][T15639] mount_bdev+0x1e8/0x290 [ 319.820928][T15639] ? vfat_mount+0x40/0x40 [ 319.825378][T15639] ? tsan.module_ctor+0x10/0x10 [ 319.831102][T15639] vfat_mount+0x2d/0x40 [ 319.835684][T15639] legacy_get_tree+0x70/0xc0 [ 319.840507][T15639] vfs_get_tree+0x4a/0x1a0 [ 319.845610][T15639] path_mount+0x11d4/0x1ce0 [ 319.850461][T15639] __se_sys_mount+0x23d/0x2e0 [ 319.855587][T15639] ? mntput+0x45/0x70 [ 319.860255][T15639] ? __fpregs_load_activate+0x103/0x1b0 [ 319.866157][T15639] __x64_sys_mount+0x63/0x70 [ 319.871332][T15639] do_syscall_64+0x4a/0x90 [ 319.877199][T15639] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.883304][T15639] RIP: 0033:0x467afa [ 319.887190][T15639] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 319.907597][T15639] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 319.916392][T15639] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 319.925297][T15639] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 319.933950][T15639] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 319.942887][T15639] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 319.952472][T15639] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 319.992941][T15654] loop1: detected capacity change from 0 to 7 06:32:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200c0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200b0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2017c, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 320.006433][T15654] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/414/file0 supports timestamps until 2107 (0x10391447e) 06:32:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xe01, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:38 executing program 2 (fault-call:0 fault-nth:65): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 320.082639][T15669] loop3: detected capacity change from 0 to 131456 [ 320.093897][T15669] EXT4-fs (loop3): inodes count not valid: 2848 vs 32 [ 320.101407][T15671] loop5: detected capacity change from 0 to 131456 [ 320.112497][T15671] EXT4-fs (loop5): inodes count not valid: 3104 vs 32 [ 320.122108][T15682] loop1: detected capacity change from 0 to 7 [ 320.146371][T15682] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/415/file0 supports timestamps until 2107 (0x10391447e) [ 320.155522][T15669] loop3: detected capacity change from 0 to 131456 [ 320.179255][T15669] EXT4-fs (loop3): inodes count not valid: 2848 vs 32 [ 320.189251][T15686] loop2: detected capacity change from 0 to 1 06:32:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xf00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 320.189541][T15671] loop5: detected capacity change from 0 to 131456 [ 320.213706][T15671] EXT4-fs (loop5): inodes count not valid: 3104 vs 32 [ 320.234147][T15686] FAULT_INJECTION: forcing a failure. [ 320.234147][T15686] name failslab, interval 1, probability 0, space 0, times 0 06:32:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200d0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 320.247261][T15686] CPU: 0 PID: 15686 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 320.256423][T15686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.266670][T15686] Call Trace: [ 320.270034][T15686] dump_stack+0x137/0x19d [ 320.274476][T15686] should_fail+0x23c/0x250 [ 320.279231][T15686] ? fat_alloc_inode+0x25/0x90 [ 320.284011][T15686] __should_failslab+0x81/0x90 [ 320.289131][T15686] ? fat_get_block_bmap+0x1d0/0x1d0 06:32:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200e0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 320.294518][T15686] should_failslab+0x5/0x20 [ 320.299215][T15686] kmem_cache_alloc+0x46/0x2f0 [ 320.304194][T15686] ? security_inode_alloc+0x138/0x180 [ 320.309881][T15686] ? fat_get_block_bmap+0x1d0/0x1d0 [ 320.315150][T15686] fat_alloc_inode+0x25/0x90 [ 320.319936][T15686] ? fat_get_block_bmap+0x1d0/0x1d0 [ 320.325352][T15686] new_inode_pseudo+0x38/0x1c0 [ 320.330214][T15686] new_inode+0x21/0x120 [ 320.334488][T15686] fat_fill_super+0x1e08/0x2a80 [ 320.339453][T15686] ? snprintf+0x6f/0x90 [ 320.343639][T15686] ? register_shrinker_prepared+0xc2/0xd0 [ 320.349549][T15686] vfat_fill_super+0x2c/0x40 [ 320.354528][T15686] mount_bdev+0x1e8/0x290 [ 320.358966][T15686] ? vfat_mount+0x40/0x40 [ 320.363402][T15686] ? tsan.module_ctor+0x10/0x10 [ 320.368255][T15686] vfat_mount+0x2d/0x40 [ 320.372619][T15686] legacy_get_tree+0x70/0xc0 [ 320.377387][T15686] vfs_get_tree+0x4a/0x1a0 [ 320.381898][T15686] path_mount+0x11d4/0x1ce0 [ 320.386717][T15686] __se_sys_mount+0x23d/0x2e0 [ 320.391571][T15686] ? mntput+0x45/0x70 [ 320.396175][T15686] ? __fpregs_load_activate+0x103/0x1b0 [ 320.401819][T15686] __x64_sys_mount+0x63/0x70 [ 320.406683][T15686] do_syscall_64+0x4a/0x90 [ 320.411220][T15686] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 320.418062][T15686] RIP: 0033:0x467afa [ 320.421967][T15686] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.442242][T15686] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 320.450800][T15686] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 320.459036][T15686] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 320.467536][T15686] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 320.475913][T15686] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 320.484162][T15686] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20180000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x52674}], 0x1}, 0x700) 06:32:39 executing program 2 (fault-call:0 fault-nth:66): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 320.528116][T15702] loop5: detected capacity change from 0 to 131456 [ 320.559404][T15702] EXT4-fs (loop5): inodes count not valid: 3616 vs 32 [ 320.580437][T15713] loop1: detected capacity change from 0 to 7 [ 320.591466][T15713] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/416/file0 supports timestamps until 2107 (0x10391447e) [ 320.598393][T15722] loop3: detected capacity change from 0 to 131456 [ 320.614092][T15724] loop2: detected capacity change from 0 to 1 [ 320.623730][T15724] FAT-fs (loop2): Directory bread(block 3) failed [ 320.659436][T15702] loop5: detected capacity change from 0 to 131456 [ 320.670862][T15722] EXT4-fs (loop3): inodes count not valid: 6176 vs 32 06:32:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x1020, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 320.703772][T15724] FAT-fs (loop2): Directory bread(block 4) failed [ 320.712289][T15724] FAT-fs (loop2): Directory bread(block 5) failed [ 320.722370][T15702] EXT4-fs (loop5): inodes count not valid: 3616 vs 32 [ 320.736032][T15724] FAT-fs (loop2): Directory bread(block 6) failed [ 320.757032][T15724] FAULT_INJECTION: forcing a failure. [ 320.757032][T15724] name failslab, interval 1, probability 0, space 0, times 0 [ 320.770263][T15724] CPU: 0 PID: 15724 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 320.779026][T15724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.789254][T15724] Call Trace: [ 320.792857][T15724] dump_stack+0x137/0x19d [ 320.797192][T15724] should_fail+0x23c/0x250 [ 320.801613][T15724] ? __d_alloc+0x36/0x370 06:32:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200f0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 320.806018][T15724] __should_failslab+0x81/0x90 [ 320.811017][T15724] should_failslab+0x5/0x20 [ 320.815829][T15724] kmem_cache_alloc+0x46/0x2f0 [ 320.820773][T15724] __d_alloc+0x36/0x370 [ 320.824996][T15724] ? __list_add_valid+0x28/0x90 [ 320.829936][T15724] d_make_root+0x24/0x60 [ 320.834343][T15724] fat_fill_super+0x257f/0x2a80 [ 320.839345][T15724] ? snprintf+0x6f/0x90 [ 320.843508][T15724] ? register_shrinker_prepared+0xc2/0xd0 [ 320.849794][T15724] vfat_fill_super+0x2c/0x40 [ 320.854491][T15724] mount_bdev+0x1e8/0x290 [ 320.859263][T15724] ? vfat_mount+0x40/0x40 [ 320.863598][T15724] ? tsan.module_ctor+0x10/0x10 [ 320.868439][T15724] vfat_mount+0x2d/0x40 [ 320.872691][T15724] legacy_get_tree+0x70/0xc0 [ 320.877320][T15724] vfs_get_tree+0x4a/0x1a0 [ 320.882859][T15724] path_mount+0x11d4/0x1ce0 [ 320.887629][T15724] __se_sys_mount+0x23d/0x2e0 [ 320.892564][T15724] ? mntput+0x45/0x70 [ 320.897234][T15724] ? __fpregs_load_activate+0x103/0x1b0 [ 320.902883][T15724] __x64_sys_mount+0x63/0x70 [ 320.908197][T15724] do_syscall_64+0x4a/0x90 [ 320.913117][T15724] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 320.914995][T15722] loop3: detected capacity change from 0 to 131456 [ 320.919303][T15724] RIP: 0033:0x467afa [ 320.929886][T15724] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.934783][T15722] EXT4-fs (loop3): inodes count not valid: 6176 vs 32 [ 320.950754][T15724] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 320.950819][T15724] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 320.974459][T15724] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 320.982436][T15724] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 320.990588][T15724] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 320.999090][T15724] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="201c0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 321.020081][T15724] FAT-fs (loop2): get root inode failed 06:32:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2017e, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 321.064407][T15748] loop1: detected capacity change from 0 to 8 [ 321.075755][T15748] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/417/file0 supports timestamps until 2107 (0x10391447e) [ 321.082690][T15747] loop5: detected capacity change from 0 to 131456 [ 321.102013][T15750] loop3: detected capacity change from 0 to 131456 06:32:39 executing program 2 (fault-call:0 fault-nth:67): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 321.112016][T15750] EXT4-fs (loop3): inodes count not valid: 7200 vs 32 [ 321.138548][T15747] EXT4-fs (loop5): inodes count not valid: 3872 vs 32 06:32:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x1100, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20100000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 321.182036][T15767] loop2: detected capacity change from 0 to 1 [ 321.213698][T15767] FAT-fs (loop2): Directory bread(block 3) failed [ 321.222905][T15750] loop3: detected capacity change from 0 to 131456 [ 321.230592][T15750] EXT4-fs (loop3): inodes count not valid: 7200 vs 32 [ 321.242208][T15767] FAT-fs (loop2): Directory bread(block 4) failed [ 321.245052][T15781] loop1: detected capacity change from 0 to 8 [ 321.249800][T15767] FAT-fs (loop2): Directory bread(block 5) failed [ 321.259509][T15781] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/418/file0 supports timestamps until 2107 (0x10391447e) [ 321.277264][T15767] FAT-fs (loop2): Directory bread(block 6) failed [ 321.284221][T15767] FAULT_INJECTION: forcing a failure. [ 321.284221][T15767] name failslab, interval 1, probability 0, space 0, times 0 [ 321.297296][T15767] CPU: 1 PID: 15767 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 321.306679][T15767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.316823][T15767] Call Trace: [ 321.320115][T15767] dump_stack+0x137/0x19d [ 321.324730][T15767] should_fail+0x23c/0x250 [ 321.329235][T15767] ? mempool_alloc_slab+0x16/0x20 [ 321.334371][T15767] __should_failslab+0x81/0x90 [ 321.339158][T15767] should_failslab+0x5/0x20 [ 321.344509][T15767] kmem_cache_alloc+0x46/0x2f0 [ 321.349911][T15767] ? pagecache_get_page+0x77a/0x900 [ 321.355283][T15767] mempool_alloc_slab+0x16/0x20 [ 321.360325][T15767] ? mempool_free+0x130/0x130 [ 321.365412][T15767] mempool_alloc+0x8c/0x300 [ 321.370190][T15767] ? cgroup_rstat_updated+0x60/0x1c0 [ 321.375551][T15767] bio_alloc_bioset+0xcc/0x480 [ 321.380497][T15767] submit_bh_wbc+0x130/0x330 [ 321.385554][T15767] __sync_dirty_buffer+0x136/0x1e0 [ 321.391044][T15767] sync_dirty_buffer+0x16/0x20 [ 321.395943][T15767] fat_set_state+0x180/0x1d0 [ 321.401348][T15767] fat_fill_super+0x263a/0x2a80 [ 321.406643][T15767] ? snprintf+0x6f/0x90 [ 321.411551][T15767] ? register_shrinker_prepared+0xc2/0xd0 [ 321.417562][T15767] vfat_fill_super+0x2c/0x40 [ 321.422165][T15767] mount_bdev+0x1e8/0x290 [ 321.426490][T15767] ? vfat_mount+0x40/0x40 [ 321.430945][T15767] ? tsan.module_ctor+0x10/0x10 [ 321.436166][T15767] vfat_mount+0x2d/0x40 [ 321.440321][T15767] legacy_get_tree+0x70/0xc0 [ 321.445284][T15767] vfs_get_tree+0x4a/0x1a0 [ 321.449790][T15767] path_mount+0x11d4/0x1ce0 [ 321.454578][T15767] __se_sys_mount+0x23d/0x2e0 [ 321.459687][T15767] ? mntput+0x45/0x70 [ 321.463667][T15767] ? __fpregs_load_activate+0x103/0x1b0 [ 321.469674][T15767] __x64_sys_mount+0x63/0x70 [ 321.474735][T15767] do_syscall_64+0x4a/0x90 [ 321.479331][T15767] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 321.485602][T15767] RIP: 0033:0x467afa [ 321.489503][T15767] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 321.509987][T15767] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 321.518700][T15767] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa 06:32:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x1200, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x58000}], 0x1}, 0x700) [ 321.527286][T15767] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 321.535639][T15767] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 321.544131][T15767] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 321.553420][T15767] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20260000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 321.600883][T15784] loop5: detected capacity change from 0 to 131456 [ 321.618003][T15784] EXT4-fs (loop5): inodes count not valid: 4128 vs 32 [ 321.629945][T15798] loop1: detected capacity change from 0 to 9 06:32:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20110000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x1800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 321.640881][T15798] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/419/file0 supports timestamps until 2107 (0x10391447e) [ 321.658762][T15767] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/331/file0 supports timestamps until 2107 (0x10391447e) [ 321.682667][T15802] loop3: detected capacity change from 0 to 131456 06:32:40 executing program 2 (fault-call:0 fault-nth:68): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 321.719834][T15802] EXT4-fs (loop3): inodes count not valid: 9760 vs 32 [ 321.770345][T15816] loop1: detected capacity change from 0 to 12 [ 321.774940][T15814] loop5: detected capacity change from 0 to 131456 [ 321.786502][T15814] EXT4-fs (loop5): inodes count not valid: 4384 vs 32 [ 321.791930][T15816] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/420/file0 supports timestamps until 2107 (0x10391447e) 06:32:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x1900, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20120000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 321.851021][T15814] loop5: detected capacity change from 0 to 131456 [ 321.858112][T15827] loop2: detected capacity change from 0 to 1 [ 321.864688][T15802] loop3: detected capacity change from 0 to 131456 [ 321.879515][T15814] EXT4-fs (loop5): inodes count not valid: 4384 vs 32 [ 321.908631][T15802] EXT4-fs (loop3): inodes count not valid: 9760 vs 32 [ 321.909372][T15827] FAT-fs (loop2): Directory bread(block 3) failed [ 321.942987][T15827] FAT-fs (loop2): Directory bread(block 4) failed [ 321.966945][T15827] FAT-fs (loop2): Directory bread(block 5) failed [ 321.984603][T15827] FAT-fs (loop2): Directory bread(block 6) failed [ 321.992081][T15846] loop1: detected capacity change from 0 to 12 [ 322.007934][T15843] loop5: detected capacity change from 0 to 131456 [ 322.031848][T15846] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/421/file0 supports timestamps until 2107 (0x10391447e) [ 322.051214][T15843] EXT4-fs (loop5): inodes count not valid: 4640 vs 32 [ 322.063104][T15827] FAULT_INJECTION: forcing a failure. [ 322.063104][T15827] name failslab, interval 1, probability 0, space 0, times 0 06:32:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x20180, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20fe0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 322.076776][T15827] CPU: 1 PID: 15827 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 322.086323][T15827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.096742][T15827] Call Trace: [ 322.100293][T15827] dump_stack+0x137/0x19d [ 322.105063][T15827] should_fail+0x23c/0x250 [ 322.109635][T15827] ? alloc_vfsmnt+0x2b/0x2e0 [ 322.114308][T15827] __should_failslab+0x81/0x90 [ 322.119442][T15827] should_failslab+0x5/0x20 [ 322.126046][T15827] kmem_cache_alloc+0x46/0x2f0 [ 322.131337][T15827] alloc_vfsmnt+0x2b/0x2e0 [ 322.136118][T15827] vfs_create_mount+0x45/0x270 [ 322.140928][T15827] path_mount+0x1918/0x1ce0 [ 322.146502][T15827] __se_sys_mount+0x23d/0x2e0 [ 322.151354][T15827] ? mntput+0x45/0x70 [ 322.155387][T15827] ? __fpregs_load_activate+0x103/0x1b0 [ 322.162062][T15827] __x64_sys_mount+0x63/0x70 [ 322.166725][T15827] do_syscall_64+0x4a/0x90 [ 322.171395][T15827] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 322.177488][T15827] RIP: 0033:0x467afa [ 322.181470][T15827] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 322.202507][T15827] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 322.211134][T15827] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 322.219179][T15827] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 06:32:40 executing program 2 (fault-call:0 fault-nth:69): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 322.227132][T15827] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 322.235367][T15827] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 322.243687][T15827] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 322.263937][T15855] loop3: detected capacity change from 0 to 131456 [ 322.274457][T15855] EXT4-fs (loop3): inodes count not valid: 65056 vs 32 06:32:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20140000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 322.327516][T15855] loop3: detected capacity change from 0 to 131456 [ 322.342212][T15855] EXT4-fs (loop3): inodes count not valid: 65056 vs 32 [ 322.383267][T15870] loop1: detected capacity change from 0 to 16 [ 322.399763][T15874] loop2: detected capacity change from 0 to 1 [ 322.406878][T15870] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/422/file0 supports timestamps until 2107 (0x10391447e) [ 322.412240][T15874] FAT-fs (loop2): Directory bread(block 3) failed [ 322.431423][T15874] FAT-fs (loop2): Directory bread(block 4) failed [ 322.440460][T15874] FAT-fs (loop2): Directory bread(block 5) failed [ 322.447079][T15882] loop5: detected capacity change from 0 to 131456 [ 322.448514][T15874] FAT-fs (loop2): Directory bread(block 6) failed [ 322.466233][T15882] EXT4-fs (loop5): inodes count not valid: 5152 vs 32 [ 322.497209][T15874] FAULT_INJECTION: forcing a failure. [ 322.497209][T15874] name failslab, interval 1, probability 0, space 0, times 0 [ 322.510386][T15874] CPU: 1 PID: 15874 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 322.519532][T15874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.530191][T15874] Call Trace: [ 322.533472][T15874] dump_stack+0x137/0x19d [ 322.538180][T15874] should_fail+0x23c/0x250 [ 322.542681][T15874] ? alloc_vfsmnt+0x2b/0x2e0 [ 322.547466][T15874] __should_failslab+0x81/0x90 [ 322.552316][T15874] should_failslab+0x5/0x20 [ 322.556938][T15874] kmem_cache_alloc+0x46/0x2f0 [ 322.561961][T15874] alloc_vfsmnt+0x2b/0x2e0 [ 322.566481][T15874] vfs_create_mount+0x45/0x270 [ 322.571493][T15874] path_mount+0x1918/0x1ce0 [ 322.576074][T15874] __se_sys_mount+0x23d/0x2e0 [ 322.580846][T15874] ? mntput+0x45/0x70 [ 322.584914][T15874] ? __fpregs_load_activate+0x103/0x1b0 [ 322.590551][T15874] __x64_sys_mount+0x63/0x70 [ 322.595204][T15874] do_syscall_64+0x4a/0x90 [ 322.599886][T15874] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 322.605860][T15874] RIP: 0033:0x467afa [ 322.609756][T15874] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 322.630442][T15874] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 322.639516][T15874] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa 06:32:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x2010, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20040200200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x59e50}], 0x1}, 0x700) [ 322.647775][T15874] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 322.656013][T15874] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 322.664396][T15874] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 322.672632][T15874] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:41 executing program 2 (fault-call:0 fault-nth:70): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 322.735055][T15882] loop5: detected capacity change from 0 to 131456 [ 322.741901][T15897] loop1: detected capacity change from 0 to 16 [ 322.749589][T15882] EXT4-fs (loop5): inodes count not valid: 5152 vs 32 [ 322.762982][T15903] loop3: detected capacity change from 0 to 131456 06:32:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20220000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 322.776046][T15897] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/423/file0 supports timestamps until 2107 (0x10391447e) [ 322.805634][T15910] loop2: detected capacity change from 0 to 1 [ 322.820823][T15910] FAT-fs (loop2): Directory bread(block 3) failed [ 322.828764][T15910] FAT-fs (loop2): Directory bread(block 4) failed [ 322.837272][T15910] FAT-fs (loop2): Directory bread(block 5) failed [ 322.844107][T15910] FAT-fs (loop2): Directory bread(block 6) failed [ 322.851999][T15910] FAULT_INJECTION: forcing a failure. [ 322.851999][T15910] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 322.865370][T15910] CPU: 1 PID: 15910 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 322.870924][T15916] loop5: detected capacity change from 0 to 131456 [ 322.874514][T15910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.874529][T15910] Call Trace: [ 322.874536][T15910] dump_stack+0x137/0x19d [ 322.900034][T15910] should_fail+0x23c/0x250 [ 322.904644][T15910] __alloc_pages+0x102/0x320 [ 322.909421][T15910] alloc_pages+0x21d/0x310 [ 322.916053][T15910] __get_free_pages+0x8/0x30 [ 322.920962][T15910] mnt_warn_timestamp_expiry+0xea/0x1e0 [ 322.926599][T15910] ? __list_add_valid+0x28/0x90 [ 322.931934][T15910] path_mount+0x1940/0x1ce0 [ 322.936701][T15910] __se_sys_mount+0x23d/0x2e0 [ 322.941636][T15910] ? mntput+0x45/0x70 [ 322.945708][T15910] ? __fpregs_load_activate+0x103/0x1b0 [ 322.951504][T15910] __x64_sys_mount+0x63/0x70 [ 322.956817][T15910] do_syscall_64+0x4a/0x90 [ 322.961583][T15910] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 322.968459][T15910] RIP: 0033:0x467afa [ 322.972342][T15910] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 322.992483][T15910] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:32:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x2200, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 323.000922][T15910] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 323.009114][T15910] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 323.017251][T15910] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 323.025531][T15910] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 323.034280][T15910] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 323.042472][T15910] vfat filesystem being mounted at (efault) supports timestamps until 2107 (0x10391447e) [ 323.052990][T15903] EXT4-fs (loop3): inodes count not valid: 132128 vs 32 06:32:41 executing program 2 (fault-call:0 fault-nth:71): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 323.080732][T15916] EXT4-fs (loop5): inodes count not valid: 8736 vs 32 [ 323.152947][T15931] loop1: detected capacity change from 0 to 17 [ 323.174312][T15931] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/424/file0 supports timestamps until 2107 (0x10391447e) [ 323.174334][T15934] loop2: detected capacity change from 0 to 1 [ 323.178652][T15934] FAT-fs (loop2): Directory bread(block 3) failed 06:32:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0xfffffffe, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000300200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20250000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 323.203112][T15934] FAT-fs (loop2): Directory bread(block 4) failed [ 323.210343][T15934] FAT-fs (loop2): Directory bread(block 5) failed [ 323.217306][T15934] FAT-fs (loop2): Directory bread(block 6) failed [ 323.224286][T15934] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/335/file0 supports timestamps until 2107 (0x10391447e) [ 323.248300][T15945] loop3: detected capacity change from 0 to 131456 06:32:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x2500, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 323.279290][T15934] FAULT_INJECTION: forcing a failure. [ 323.279290][T15934] name failslab, interval 1, probability 0, space 0, times 0 [ 323.292553][T15934] CPU: 0 PID: 15934 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 323.301965][T15934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.306478][T15945] EXT4-fs (loop3): inodes count not valid: 196640 vs 32 [ 323.312843][T15934] Call Trace: [ 323.312853][T15934] dump_stack+0x137/0x19d [ 323.312898][T15934] should_fail+0x23c/0x250 [ 323.332341][T15934] __should_failslab+0x81/0x90 [ 323.337122][T15934] ? get_mountpoint+0x1ab/0x350 [ 323.337159][T15950] loop5: detected capacity change from 0 to 131456 [ 323.341972][T15934] should_failslab+0x5/0x20 [ 323.342010][T15934] kmem_cache_alloc_trace+0x49/0x310 [ 323.342032][T15934] ? __legitimize_mnt+0xa4/0x240 [ 323.364060][T15934] get_mountpoint+0x1ab/0x350 [ 323.368758][T15934] lock_mount+0x86/0x1d0 [ 323.373441][T15934] path_mount+0x1948/0x1ce0 [ 323.378241][T15934] __se_sys_mount+0x23d/0x2e0 [ 323.383030][T15934] ? mntput+0x45/0x70 [ 323.387010][T15934] __x64_sys_mount+0x63/0x70 [ 323.391947][T15934] do_syscall_64+0x4a/0x90 [ 323.396462][T15934] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 323.402634][T15934] RIP: 0033:0x467afa [ 323.406897][T15934] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:32:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20020400200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 323.426937][T15934] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 323.435856][T15934] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 323.444396][T15934] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 323.452709][T15934] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 323.460851][T15934] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 323.468813][T15934] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 323.493113][T15950] EXT4-fs (loop5): inodes count not valid: 9504 vs 32 [ 323.519179][T15960] loop1: detected capacity change from 0 to 18 06:32:42 executing program 2 (fault-call:0 fault-nth:72): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 323.543966][T15958] loop3: detected capacity change from 0 to 131456 [ 323.556680][T15960] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/425/file0 supports timestamps until 2107 (0x10391447e) [ 323.583763][T15950] loop5: detected capacity change from 0 to 131456 [ 323.590775][T15958] EXT4-fs (loop3): inodes count not valid: 262688 vs 32 06:32:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x60000}], 0x1}, 0x700) 06:32:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x26c8, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 323.615217][T15972] loop2: detected capacity change from 0 to 1 [ 323.625238][T15950] EXT4-fs (loop5): inodes count not valid: 9504 vs 32 [ 323.628562][T15972] FAT-fs (loop2): Directory bread(block 3) failed [ 323.639111][T15972] FAT-fs (loop2): Directory bread(block 4) failed [ 323.649472][T15972] FAT-fs (loop2): Directory bread(block 5) failed [ 323.656371][T15958] loop3: detected capacity change from 0 to 131456 [ 323.664036][T15958] EXT4-fs (loop3): inodes count not valid: 262688 vs 32 [ 323.671240][T15972] FAT-fs (loop2): Directory bread(block 6) failed [ 323.678250][T15972] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/336/file0 supports timestamps until 2107 (0x10391447e) [ 323.693432][T15972] FAULT_INJECTION: forcing a failure. [ 323.693432][T15972] name failslab, interval 1, probability 0, space 0, times 0 [ 323.706513][T15972] CPU: 1 PID: 15972 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 323.715549][T15972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.725697][T15972] Call Trace: [ 323.729017][T15972] dump_stack+0x137/0x19d [ 323.733551][T15972] should_fail+0x23c/0x250 [ 323.738057][T15972] __should_failslab+0x81/0x90 [ 323.743057][T15972] ? get_mountpoint+0x1ab/0x350 [ 323.746119][T15988] loop1: detected capacity change from 0 to 19 [ 323.747969][T15972] should_failslab+0x5/0x20 [ 323.758726][T15972] kmem_cache_alloc_trace+0x49/0x310 [ 323.764453][T15972] ? __legitimize_mnt+0xa4/0x240 [ 323.769410][T15972] get_mountpoint+0x1ab/0x350 [ 323.772869][T15988] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/426/file0 supports timestamps until 2107 (0x10391447e) [ 323.774240][T15972] lock_mount+0x86/0x1d0 [ 323.774266][T15972] path_mount+0x1948/0x1ce0 [ 323.797850][T15972] __se_sys_mount+0x23d/0x2e0 [ 323.802877][T15972] ? mntput+0x45/0x70 [ 323.806883][T15972] ? __fpregs_load_activate+0x103/0x1b0 [ 323.812469][T15972] __x64_sys_mount+0x63/0x70 [ 323.817327][T15972] do_syscall_64+0x4a/0x90 [ 323.821769][T15972] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 323.827839][T15972] RIP: 0033:0x467afa [ 323.831728][T15972] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 323.851857][T15972] RSP: 002b:00007faddd5a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:32:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="202e0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x26d0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20060400200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 323.860411][T15972] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 323.868649][T15972] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007faddd5a7000 [ 323.876889][T15972] RBP: 00007faddd5a7040 R08: 00007faddd5a7040 R09: 0000000020000000 [ 323.885290][T15972] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 323.893361][T15972] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:42 executing program 2 (fault-call:0 fault-nth:73): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 323.957870][T15997] loop5: detected capacity change from 0 to 131456 [ 323.998257][T15998] loop3: detected capacity change from 0 to 131456 [ 324.012022][T16008] loop1: detected capacity change from 0 to 19 [ 324.022124][T16008] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/427/file0 supports timestamps until 2107 (0x10391447e) [ 324.042234][T15997] EXT4-fs (loop5): inodes count not valid: 11808 vs 32 [ 324.050124][T15998] EXT4-fs (loop3): inodes count not valid: 263712 vs 32 [ 324.058897][T16012] loop2: detected capacity change from 0 to 1 [ 324.094213][T16012] FAT-fs (loop2): Directory bread(block 3) failed [ 324.103258][T16012] FAT-fs (loop2): Directory bread(block 4) failed [ 324.110659][T16012] FAT-fs (loop2): Directory bread(block 5) failed [ 324.119764][T16012] FAT-fs (loop2): Directory bread(block 6) failed [ 324.135016][T16012] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/337/file0 supports timestamps until 2107 (0x10391447e) [ 324.149845][T15997] loop5: detected capacity change from 0 to 131456 [ 324.157775][T15997] EXT4-fs (loop5): inodes count not valid: 11808 vs 32 [ 324.174937][T16012] FAULT_INJECTION: forcing a failure. [ 324.174937][T16012] name failslab, interval 1, probability 0, space 0, times 0 [ 324.188864][T16012] CPU: 1 PID: 16012 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 324.198306][T16012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.208532][T16012] Call Trace: [ 324.211910][T16012] dump_stack+0x137/0x19d [ 324.216339][T16012] should_fail+0x23c/0x250 [ 324.220962][T16012] ? getname_flags+0x84/0x3d0 [ 324.225734][T16012] __should_failslab+0x81/0x90 [ 324.231249][T16012] should_failslab+0x5/0x20 [ 324.235873][T16012] kmem_cache_alloc+0x46/0x2f0 [ 324.241225][T16012] getname_flags+0x84/0x3d0 [ 324.246002][T16012] getname+0x15/0x20 [ 324.250203][T16012] do_sys_openat2+0x5b/0x250 [ 324.255239][T16012] ? __se_sys_mount+0x261/0x2e0 [ 324.260088][T16012] ? mntput+0x45/0x70 [ 324.264156][T16012] __x64_sys_openat+0xef/0x110 [ 324.269083][T16012] do_syscall_64+0x4a/0x90 [ 324.273581][T16012] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 324.279665][T16012] RIP: 0033:0x4196c4 [ 324.283548][T16012] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 324.304981][T16012] RSP: 002b:00007faddd5a6f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 324.313576][T16012] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004196c4 [ 324.321802][T16012] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 324.329865][T16012] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020000000 06:32:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0xfffffffffffffffe, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x26d4, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20800400200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:43 executing program 2 (fault-call:0 fault-nth:74): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 324.338007][T16012] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 324.346240][T16012] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20480000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 324.398691][T16028] loop1: detected capacity change from 0 to 19 [ 324.427189][T16027] loop3: detected capacity change from 0 to 131456 [ 324.436949][T16028] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/428/file0 supports timestamps until 2107 (0x10391447e) [ 324.454566][T16027] EXT4-fs (loop3): inodes count not valid: 294944 vs 32 [ 324.462770][T16044] loop2: detected capacity change from 0 to 1 [ 324.484991][T16043] loop5: detected capacity change from 0 to 131456 06:32:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000500200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x6162c}], 0x1}, 0x700) 06:32:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 324.510556][T16044] FAT-fs (loop2): Directory bread(block 3) failed [ 324.527303][T16043] EXT4-fs (loop5): inodes count not valid: 18464 vs 32 [ 324.533102][T16044] FAT-fs (loop2): Directory bread(block 4) failed 06:32:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="204c0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 324.606210][T16044] FAT-fs (loop2): Directory bread(block 5) failed [ 324.613236][T16044] FAT-fs (loop2): Directory bread(block 6) failed [ 324.613416][T16063] loop3: detected capacity change from 0 to 131456 [ 324.627592][T16067] loop1: detected capacity change from 0 to 31 [ 324.630331][T16044] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/338/file0 supports timestamps until 2107 (0x10391447e) [ 324.650111][T16044] FAULT_INJECTION: forcing a failure. [ 324.650111][T16044] name failslab, interval 1, probability 0, space 0, times 0 [ 324.658213][T16063] EXT4-fs (loop3): inodes count not valid: 327712 vs 32 [ 324.662935][T16044] CPU: 0 PID: 16044 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 324.674983][T16069] loop5: detected capacity change from 0 to 131456 [ 324.679010][T16044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.679023][T16044] Call Trace: [ 324.679030][T16044] dump_stack+0x137/0x19d [ 324.703836][T16044] should_fail+0x23c/0x250 [ 324.708340][T16044] ? getname_flags+0x84/0x3d0 [ 324.713302][T16044] __should_failslab+0x81/0x90 [ 324.718427][T16044] should_failslab+0x5/0x20 [ 324.723221][T16044] kmem_cache_alloc+0x46/0x2f0 [ 324.728808][T16044] getname_flags+0x84/0x3d0 [ 324.733719][T16044] getname+0x15/0x20 [ 324.737708][T16044] do_sys_openat2+0x5b/0x250 [ 324.739958][T16069] EXT4-fs (loop5): inodes count not valid: 19488 vs 32 [ 324.742484][T16044] ? __se_sys_mount+0x261/0x2e0 [ 324.742504][T16044] ? mntput+0x45/0x70 [ 324.758474][T16044] __x64_sys_openat+0xef/0x110 [ 324.763253][T16044] do_syscall_64+0x4a/0x90 [ 324.767676][T16044] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 324.773578][T16044] RIP: 0033:0x4196c4 [ 324.777557][T16044] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 324.797708][T16044] RSP: 002b:00007faddd5a6f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 324.806463][T16044] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004196c4 [ 324.814445][T16044] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 324.822734][T16044] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020000000 [ 324.825439][T16067] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/429/file0 supports timestamps until 2107 (0x10391447e) [ 324.831139][T16044] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 06:32:43 executing program 2 (fault-call:0 fault-nth:75): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 324.831155][T16044] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 324.904652][T16069] loop5: detected capacity change from 0 to 131456 [ 324.928092][T16063] loop3: detected capacity change from 0 to 131456 [ 324.930981][T16069] EXT4-fs (loop5): inodes count not valid: 19488 vs 32 [ 324.942749][T16063] EXT4-fs (loop3): inodes count not valid: 327712 vs 32 06:32:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20600000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 324.954472][T16095] loop1: detected capacity change from 0 to 32 [ 324.973790][T16092] loop2: detected capacity change from 0 to 1 [ 324.991787][T16095] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/430/file0 supports timestamps until 2107 (0x10391447e) [ 325.009934][T16106] loop5: detected capacity change from 0 to 131456 [ 325.025629][T16092] FAT-fs (loop2): Directory bread(block 3) failed [ 325.032470][T16092] FAT-fs (loop2): Directory bread(block 4) failed [ 325.043884][T16092] FAT-fs (loop2): Directory bread(block 5) failed [ 325.055767][T16106] EXT4-fs (loop5): inodes count not valid: 24608 vs 32 [ 325.070673][T16092] FAT-fs (loop2): Directory bread(block 6) failed [ 325.077679][T16092] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/339/file0 supports timestamps until 2107 (0x10391447e) [ 325.093044][T16092] FAULT_INJECTION: forcing a failure. [ 325.093044][T16092] name failslab, interval 1, probability 0, space 0, times 0 [ 325.106817][T16092] CPU: 0 PID: 16092 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 325.115759][T16092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.127037][T16092] Call Trace: [ 325.130728][T16092] dump_stack+0x137/0x19d [ 325.135842][T16092] should_fail+0x23c/0x250 [ 325.140537][T16092] ? __alloc_file+0x2e/0x1a0 [ 325.145403][T16092] __should_failslab+0x81/0x90 [ 325.150423][T16092] should_failslab+0x5/0x20 [ 325.155216][T16092] kmem_cache_alloc+0x46/0x2f0 [ 325.160749][T16092] __alloc_file+0x2e/0x1a0 [ 325.165377][T16092] alloc_empty_file+0xcd/0x1c0 [ 325.170689][T16092] path_openat+0x6a/0x20b0 [ 325.175126][T16092] ? llist_add_batch+0x51/0x60 [ 325.180312][T16092] ? tick_nohz_tick_stopped+0x2e/0x40 [ 325.185926][T16092] ? irq_work_queue+0xf3/0x130 [ 325.190885][T16092] ? ___cache_free+0x3c/0x300 [ 325.195816][T16092] ? kfree+0xf0/0x1d0 [ 325.199979][T16092] do_filp_open+0xd9/0x1f0 [ 325.204977][T16092] ? __virt_addr_valid+0x15a/0x1a0 [ 325.210433][T16092] ? __check_object_size+0x253/0x310 [ 325.216009][T16092] ? _find_next_bit+0x16a/0x190 [ 325.220860][T16092] ? alloc_fd+0x388/0x3e0 [ 325.225278][T16092] do_sys_openat2+0xa3/0x250 [ 325.230019][T16092] ? __se_sys_mount+0x261/0x2e0 [ 325.235292][T16092] ? mntput+0x45/0x70 [ 325.239509][T16092] __x64_sys_openat+0xef/0x110 [ 325.244500][T16092] do_syscall_64+0x4a/0x90 [ 325.249028][T16092] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 325.255057][T16092] RIP: 0033:0x4196c4 [ 325.258972][T16092] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 325.279448][T16092] RSP: 002b:00007faddd5a6f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 325.288374][T16092] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004196c4 [ 325.296478][T16092] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c 06:32:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="202c0500200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 325.305024][T16092] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020000000 [ 325.313561][T16092] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 325.322032][T16092] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:44 executing program 2 (fault-call:0 fault-nth:76): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 325.372248][T16106] loop5: detected capacity change from 0 to 131456 [ 325.384356][T16106] EXT4-fs (loop5): inodes count not valid: 24608 vs 32 [ 325.394801][T16120] loop1: detected capacity change from 0 to 36 06:32:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20680000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 325.423089][T16120] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/431/file0 supports timestamps until 2107 (0x10391447e) [ 325.425867][T16124] loop3: detected capacity change from 0 to 131456 06:32:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x68000}], 0x1}, 0x700) [ 325.493493][T16124] EXT4-fs (loop3): inodes count not valid: 338976 vs 32 [ 325.517874][T16134] loop2: detected capacity change from 0 to 1 [ 325.526691][T16139] loop5: detected capacity change from 0 to 131456 [ 325.539221][T16141] loop1: detected capacity change from 0 to 38 [ 325.550972][T16134] FAT-fs (loop2): Directory bread(block 3) failed [ 325.559574][T16139] EXT4-fs (loop5): inodes count not valid: 26656 vs 32 [ 325.569961][T16124] loop3: detected capacity change from 0 to 131456 [ 325.582309][T16141] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/432/file0 supports timestamps until 2107 (0x10391447e) [ 325.598756][T16134] FAT-fs (loop2): Directory bread(block 4) failed [ 325.606338][T16124] EXT4-fs (loop3): inodes count not valid: 338976 vs 32 [ 325.633731][T16134] FAT-fs (loop2): Directory bread(block 5) failed [ 325.641519][T16134] FAT-fs (loop2): Directory bread(block 6) failed [ 325.649887][T16134] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/340/file0 supports timestamps until 2107 (0x10391447e) [ 325.665709][T16134] FAULT_INJECTION: forcing a failure. [ 325.665709][T16134] name failslab, interval 1, probability 0, space 0, times 0 [ 325.679199][T16134] CPU: 1 PID: 16134 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 325.688153][T16134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.698391][T16134] Call Trace: [ 325.702715][T16134] dump_stack+0x137/0x19d [ 325.707396][T16134] should_fail+0x23c/0x250 [ 325.711813][T16134] ? __alloc_file+0x2e/0x1a0 [ 325.716772][T16134] __should_failslab+0x81/0x90 [ 325.722126][T16134] should_failslab+0x5/0x20 [ 325.726963][T16134] kmem_cache_alloc+0x46/0x2f0 [ 325.731825][T16134] __alloc_file+0x2e/0x1a0 [ 325.736549][T16134] alloc_empty_file+0xcd/0x1c0 [ 325.741700][T16134] path_openat+0x6a/0x20b0 [ 325.746123][T16134] ? llist_add_batch+0x51/0x60 [ 325.752811][T16134] ? tick_nohz_tick_stopped+0x2e/0x40 [ 325.758564][T16134] ? irq_work_queue+0xf3/0x130 [ 325.763338][T16134] ? ___cache_free+0x3c/0x300 [ 325.768094][T16134] ? kfree+0xf0/0x1d0 [ 325.772166][T16134] do_filp_open+0xd9/0x1f0 [ 325.776940][T16134] ? __virt_addr_valid+0x15a/0x1a0 [ 325.782406][T16134] ? __check_object_size+0x253/0x310 [ 325.787882][T16134] ? _find_next_bit+0x16a/0x190 [ 325.792900][T16134] ? alloc_fd+0x388/0x3e0 [ 325.797230][T16134] do_sys_openat2+0xa3/0x250 [ 325.801992][T16134] ? __se_sys_mount+0x261/0x2e0 [ 325.807561][T16134] ? mntput+0x45/0x70 [ 325.811560][T16134] __x64_sys_openat+0xef/0x110 [ 325.816414][T16134] do_syscall_64+0x4a/0x90 [ 325.821203][T16134] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 325.827233][T16134] RIP: 0033:0x4196c4 [ 325.831918][T16134] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 325.852332][T16134] RSP: 002b:00007faddd5a6f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 325.860995][T16134] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004196c4 [ 325.869743][T16134] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 325.877975][T16134] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020000000 [ 325.886227][T16134] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 06:32:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x6000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000600200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 325.894581][T16134] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 [ 325.923528][T16139] loop5: detected capacity change from 0 to 131456 06:32:44 executing program 2 (fault-call:0 fault-nth:77): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="206c0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 325.964799][T16139] EXT4-fs (loop5): inodes count not valid: 26656 vs 32 [ 326.085708][T16172] loop2: detected capacity change from 0 to 1 [ 326.104944][T16173] loop1: detected capacity change from 0 to 48 [ 326.123164][T16172] FAT-fs (loop2): Directory bread(block 3) failed [ 326.143017][T16173] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/433/file0 supports timestamps until 2107 (0x10391447e) [ 326.158103][T16172] FAT-fs (loop2): Directory bread(block 4) failed [ 326.158187][T16179] loop5: detected capacity change from 0 to 131456 [ 326.165540][T16172] FAT-fs (loop2): Directory bread(block 5) failed [ 326.172443][T16178] loop3: detected capacity change from 0 to 131456 [ 326.179521][T16172] FAT-fs (loop2): Directory bread(block 6) failed [ 326.194571][T16179] EXT4-fs (loop5): inodes count not valid: 27680 vs 32 [ 326.194612][T16172] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/341/file0 supports timestamps until 2107 (0x10391447e) [ 326.217039][T16172] FAULT_INJECTION: forcing a failure. [ 326.217039][T16172] name failslab, interval 1, probability 0, space 0, times 0 [ 326.221675][T16178] EXT4-fs (loop3): inodes count not valid: 393248 vs 32 [ 326.230294][T16172] CPU: 0 PID: 16172 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 326.230317][T16172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.230327][T16172] Call Trace: [ 326.230334][T16172] dump_stack+0x137/0x19d [ 326.265182][T16172] should_fail+0x23c/0x250 [ 326.269624][T16172] ? __alloc_file+0x2e/0x1a0 [ 326.274369][T16172] __should_failslab+0x81/0x90 [ 326.279336][T16172] should_failslab+0x5/0x20 [ 326.284136][T16172] kmem_cache_alloc+0x46/0x2f0 [ 326.289092][T16172] __alloc_file+0x2e/0x1a0 [ 326.293516][T16172] alloc_empty_file+0xcd/0x1c0 [ 326.298771][T16172] path_openat+0x6a/0x20b0 [ 326.303293][T16172] ? llist_add_batch+0x51/0x60 [ 326.308250][T16172] ? tick_nohz_tick_stopped+0x2e/0x40 [ 326.314020][T16172] ? irq_work_queue+0xf3/0x130 [ 326.319174][T16172] ? ___cache_free+0x3c/0x300 [ 326.323998][T16172] ? kfree+0xf0/0x1d0 [ 326.328150][T16172] do_filp_open+0xd9/0x1f0 [ 326.332637][T16172] ? __virt_addr_valid+0x15a/0x1a0 [ 326.337956][T16172] ? __check_object_size+0x253/0x310 [ 326.343834][T16172] ? _find_next_bit+0x16a/0x190 [ 326.348758][T16172] ? alloc_fd+0x388/0x3e0 [ 326.353274][T16172] do_sys_openat2+0xa3/0x250 [ 326.358345][T16172] ? __se_sys_mount+0x261/0x2e0 [ 326.363920][T16172] ? mntput+0x45/0x70 [ 326.367975][T16172] __x64_sys_openat+0xef/0x110 [ 326.372997][T16172] do_syscall_64+0x4a/0x90 [ 326.377670][T16172] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 326.383991][T16172] RIP: 0033:0x4196c4 [ 326.388008][T16172] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 326.408575][T16172] RSP: 002b:00007faddd5a6f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 326.417172][T16172] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004196c4 [ 326.426191][T16172] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 326.434280][T16172] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020000000 06:32:45 executing program 2 (fault-call:0 fault-nth:78): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 326.442484][T16172] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 326.450525][T16172] R13: 00000000200001c0 R14: 00007faddd5a7000 R15: 00000000200004c0 06:32:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="08000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x6800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20740000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20040600200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x68e08}], 0x1}, 0x700) [ 326.514007][T16198] loop4: detected capacity change from 0 to 131456 [ 326.537448][T16198] EXT4-fs (loop4): inodes count not valid: 8 vs 32 [ 326.546609][T16212] loop3: detected capacity change from 0 to 131456 [ 326.554621][T16212] EXT4-fs (loop3): inodes count not valid: 394272 vs 32 [ 326.567245][T16215] loop2: detected capacity change from 0 to 1 [ 326.580886][T16219] loop1: detected capacity change from 0 to 52 [ 326.582235][T16218] loop5: detected capacity change from 0 to 131456 [ 326.601655][T16218] EXT4-fs (loop5): inodes count not valid: 29728 vs 32 [ 326.603537][T16212] loop3: detected capacity change from 0 to 131456 06:32:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="0a000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 326.609700][T16215] FAT-fs (loop2): Directory bread(block 3) failed [ 326.625494][T16212] EXT4-fs (loop3): inodes count not valid: 394272 vs 32 [ 326.633220][T16219] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/434/file0 supports timestamps until 2107 (0x10391447e) [ 326.636652][T16215] FAT-fs (loop2): Directory bread(block 4) failed [ 326.654930][T16215] FAT-fs (loop2): Directory bread(block 5) failed 06:32:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000700200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 326.661510][T16215] FAT-fs (loop2): Directory bread(block 6) failed 06:32:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 326.701774][T16218] loop5: detected capacity change from 0 to 131456 [ 326.703564][T16215] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/342/file0 supports timestamps until 2107 (0x10391447e) [ 326.724177][T16215] FAULT_INJECTION: forcing a failure. [ 326.724177][T16215] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 326.738074][T16215] CPU: 0 PID: 16215 Comm: syz-executor.2 Not tainted 5.13.0-rc2-syzkaller #0 [ 326.746507][T16239] loop4: detected capacity change from 0 to 131456 [ 326.747378][T16215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.764429][T16215] Call Trace: [ 326.767996][T16215] dump_stack+0x137/0x19d [ 326.772463][T16215] should_fail+0x23c/0x250 [ 326.777203][T16215] should_fail_usercopy+0x16/0x20 [ 326.782432][T16215] _copy_to_user+0x1c/0x90 [ 326.787240][T16215] simple_read_from_buffer+0xab/0x120 [ 326.792804][T16215] proc_fail_nth_read+0xf6/0x140 06:32:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000a00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 326.797932][T16215] ? rw_verify_area+0x136/0x250 [ 326.798299][T16239] EXT4-fs (loop4): inodes count not valid: 10 vs 32 [ 326.802868][T16215] ? proc_fault_inject_write+0x200/0x200 [ 326.815250][T16215] vfs_read+0x154/0x5d0 [ 326.819650][T16215] ? __fput+0x43e/0x4e0 [ 326.823964][T16215] ? __fget_light+0x21b/0x260 [ 326.828680][T16215] ? __cond_resched+0x11/0x40 [ 326.833441][T16215] ksys_read+0xce/0x180 [ 326.836075][T16218] EXT4-fs (loop5): inodes count not valid: 29728 vs 32 [ 326.837766][T16215] __x64_sys_read+0x3e/0x50 [ 326.837837][T16215] do_syscall_64+0x4a/0x90 [ 326.854137][T16215] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 326.860354][T16215] RIP: 0033:0x41935c [ 326.864247][T16215] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 326.886800][T16215] RSP: 002b:00007faddd5a7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 06:32:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 326.895447][T16215] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000041935c [ 326.904349][T16215] RDX: 000000000000000f RSI: 00007faddd5a71e0 RDI: 0000000000000003 [ 326.912661][T16215] RBP: 00007faddd5a71d0 R08: 0000000000000000 R09: 0000000020000000 [ 326.920964][T16215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 326.929399][T16215] R13: 00007fff3c4fb34f R14: 00007faddd5a7300 R15: 0000000000022000 06:32:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000b00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 326.961868][T16248] loop3: detected capacity change from 0 to 131456 [ 326.969895][T16248] EXT4-fs (loop3): inodes count not valid: 655392 vs 32 06:32:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="207a0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 327.005186][T16239] loop4: detected capacity change from 0 to 131456 [ 327.022486][T16259] loop2: detected capacity change from 0 to 1 [ 327.027479][T16258] loop1: detected capacity change from 0 to 54 [ 327.031581][T16239] EXT4-fs (loop4): inodes count not valid: 10 vs 32 06:32:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="15000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 327.043005][T16258] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/435/file0 supports timestamps until 2107 (0x10391447e) [ 327.063417][T16259] FAT-fs (loop2): Directory bread(block 3) failed [ 327.070703][T16259] FAT-fs (loop2): Directory bread(block 4) failed [ 327.079368][T16259] FAT-fs (loop2): Directory bread(block 5) failed [ 327.086688][T16259] FAT-fs (loop2): Directory bread(block 6) failed 06:32:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 327.093847][T16259] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/343/file0 supports timestamps until 2107 (0x10391447e) [ 327.110288][T16262] loop3: detected capacity change from 0 to 131456 [ 327.134974][T16271] loop4: detected capacity change from 0 to 131456 06:32:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 327.161406][T16277] loop5: detected capacity change from 0 to 131456 [ 327.178190][T16262] EXT4-fs (loop3): inodes count not valid: 720928 vs 32 [ 327.188128][T16271] EXT4-fs (loop4): inodes count not valid: 21 vs 32 06:32:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="1e000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 327.224045][T16277] EXT4-fs (loop5): inodes count not valid: 31264 vs 32 [ 327.224964][T16287] loop1: detected capacity change from 0 to 58 [ 327.247088][T16287] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/436/file0 supports timestamps until 2107 (0x10391447e) [ 327.265746][T16293] loop2: detected capacity change from 0 to 1 [ 327.273044][T16293] FAT-fs (loop2): Directory bread(block 3) failed [ 327.288538][T16293] FAT-fs (loop2): Directory bread(block 4) failed [ 327.295936][T16277] loop5: detected capacity change from 0 to 131456 [ 327.300299][T16293] FAT-fs (loop2): Directory bread(block 5) failed [ 327.310007][T16293] FAT-fs (loop2): Directory bread(block 6) failed [ 327.312586][T16277] EXT4-fs (loop5): inodes count not valid: 31264 vs 32 06:32:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x70000}], 0x1}, 0x700) 06:32:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20001800200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x7800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="21000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20fe0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 327.316507][T16303] loop4: detected capacity change from 0 to 131456 [ 327.330928][T16293] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/344/file0 supports timestamps until 2107 (0x10391447e) [ 327.347880][T16303] EXT4-fs (loop4): inodes count not valid: 30 vs 32 [ 327.430491][T16323] loop2: detected capacity change from 0 to 1 [ 327.430787][T16327] loop3: detected capacity change from 0 to 131456 [ 327.445158][T16327] EXT4-fs (loop3): inodes count not valid: 1572896 vs 32 [ 327.452178][T16326] loop1: detected capacity change from 0 to 60 [ 327.454677][T16331] loop4: detected capacity change from 0 to 131456 [ 327.466688][T16332] loop5: detected capacity change from 0 to 131456 [ 327.496508][T16331] EXT4-fs (loop4): inodes count not valid: 33 vs 32 [ 327.506211][T16332] EXT4-fs (loop5): inodes count not valid: 65056 vs 32 [ 327.513604][T16323] FAT-fs (loop2): Directory bread(block 3) failed [ 327.521962][T16326] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/437/file0 supports timestamps until 2107 (0x10391447e) [ 327.532264][T16323] FAT-fs (loop2): Directory bread(block 4) failed 06:32:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="25000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x7901, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 327.537294][T16327] loop3: detected capacity change from 0 to 131456 [ 327.544074][T16323] FAT-fs (loop2): Directory bread(block 5) failed [ 327.557131][T16323] FAT-fs (loop2): Directory bread(block 6) failed [ 327.563842][T16323] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/345/file0 supports timestamps until 2107 (0x10391447e) [ 327.579930][T16327] EXT4-fs (loop3): inodes count not valid: 1572896 vs 32 06:32:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="201f0100200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20001c00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 327.621900][T16332] loop5: detected capacity change from 0 to 131456 [ 327.631575][T16332] EXT4-fs (loop5): inodes count not valid: 65056 vs 32 [ 327.663515][T16360] loop4: detected capacity change from 0 to 131456 [ 327.673331][T16360] EXT4-fs (loop4): inodes count not valid: 37 vs 32 [ 327.681247][T16361] loop2: detected capacity change from 0 to 1 [ 327.695984][T16361] FAT-fs (loop2): Directory bread(block 3) failed [ 327.702829][T16361] FAT-fs (loop2): Directory bread(block 4) failed 06:32:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="29000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 327.702960][T16370] loop1: detected capacity change from 0 to 60 [ 327.710344][T16361] FAT-fs (loop2): Directory bread(block 5) failed [ 327.717492][T16369] loop5: detected capacity change from 0 to 131456 [ 327.723213][T16361] FAT-fs (loop2): Directory bread(block 6) failed [ 327.743484][T16369] EXT4-fs (loop5): inodes count not valid: 73504 vs 32 [ 327.764338][T16370] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/438/file0 supports timestamps until 2107 (0x10391447e) [ 327.768188][T16361] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/346/file0 supports timestamps until 2107 (0x10391447e) [ 327.787306][T16382] loop4: detected capacity change from 0 to 131456 [ 327.807611][T16383] loop3: detected capacity change from 0 to 131456 [ 327.841635][T16383] EXT4-fs (loop3): inodes count not valid: 1835040 vs 32 [ 327.859368][T16369] loop5: detected capacity change from 0 to 131456 [ 327.860720][T16382] EXT4-fs (loop4): inodes count not valid: 41 vs 32 [ 327.883984][T16369] EXT4-fs (loop5): inodes count not valid: 73504 vs 32 06:32:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x705e4}], 0x1}, 0x700) 06:32:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20002000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="fe000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20790100200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 328.264026][T16412] loop1: detected capacity change from 0 to 61 [ 328.266245][T16408] loop3: detected capacity change from 0 to 131456 [ 328.284117][T16412] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/439/file0 supports timestamps until 2107 (0x10391447e) [ 328.287124][T16408] EXT4-fs (loop3): inodes count not valid: 2097184 vs 32 06:32:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x8303, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 328.308355][T16413] loop2: detected capacity change from 0 to 1 [ 328.319055][T16422] loop4: detected capacity change from 0 to 131456 [ 328.326480][T16423] loop5: detected capacity change from 0 to 131456 [ 328.328190][T16413] FAT-fs (loop2): Directory bread(block 3) failed [ 328.352917][T16423] EXT4-fs (loop5): inodes count not valid: 96544 vs 32 06:32:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20002600200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20040200200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 328.353785][T16413] FAT-fs (loop2): Directory bread(block 4) failed [ 328.360348][T16422] EXT4-fs (loop4): inodes count not valid: 254 vs 32 06:32:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="00200000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 328.412719][T16413] FAT-fs (loop2): Directory bread(block 5) failed [ 328.420071][T16438] loop1: detected capacity change from 0 to 65 [ 328.430427][T16438] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/440/file0 supports timestamps until 2107 (0x10391447e) [ 328.455732][T16437] loop5: detected capacity change from 0 to 131456 06:32:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x8403, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20860200200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 328.461564][T16413] FAT-fs (loop2): Directory bread(block 6) failed [ 328.469365][T16450] loop4: detected capacity change from 0 to 131456 [ 328.472227][T16449] loop3: detected capacity change from 0 to 131456 [ 328.484260][T16437] EXT4-fs (loop5): inodes count not valid: 132128 vs 32 [ 328.492440][T16413] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/347/file0 supports timestamps until 2107 (0x10391447e) [ 328.544854][T16450] EXT4-fs (loop4): inodes count not valid: 8192 vs 32 [ 328.552098][T16449] EXT4-fs (loop3): inodes count not valid: 2490400 vs 32 [ 328.567022][T16462] loop1: detected capacity change from 0 to 66 [ 328.588816][T16462] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/441/file0 supports timestamps until 2107 (0x10391447e) [ 328.624576][T16450] loop4: detected capacity change from 0 to 131456 [ 328.631567][T16450] EXT4-fs (loop4): inodes count not valid: 8192 vs 32 [ 328.638931][T16470] loop5: detected capacity change from 0 to 131456 [ 328.650293][T16470] EXT4-fs (loop5): inodes count not valid: 165408 vs 32 06:32:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x77dc0}], 0x1}, 0x700) 06:32:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20052c00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x8602, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000300200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="feff0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 329.160914][T16489] loop5: detected capacity change from 0 to 131456 [ 329.169111][T16489] EXT4-fs (loop5): inodes count not valid: 196640 vs 32 [ 329.217780][T16489] loop5: detected capacity change from 0 to 131456 [ 329.225643][T16499] loop1: detected capacity change from 0 to 67 [ 329.228921][T16489] EXT4-fs (loop5): inodes count not valid: 196640 vs 32 [ 329.232371][T16500] loop4: detected capacity change from 0 to 131456 [ 329.246168][T16501] loop3: detected capacity change from 0 to 131456 [ 329.253914][T16490] loop2: detected capacity change from 0 to 1 06:32:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20020400200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 329.263959][T16490] FAT-fs (loop2): Directory bread(block 3) failed [ 329.273238][T16499] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/442/file0 supports timestamps until 2107 (0x10391447e) [ 329.290608][T16501] EXT4-fs (loop3): inodes count not valid: 2884896 vs 32 [ 329.309949][T16500] EXT4-fs (loop4): inodes count not valid: 65534 vs 32 06:32:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x8703, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20003f00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 329.322162][T16490] FAT-fs (loop2): Directory bread(block 4) failed [ 329.355611][T16490] FAT-fs (loop2): Directory bread(block 5) failed [ 329.358113][T16521] loop5: detected capacity change from 0 to 131456 [ 329.362820][T16490] FAT-fs (loop2): Directory bread(block 6) failed [ 329.379292][T16490] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/348/file0 supports timestamps until 2107 (0x10391447e) [ 329.380799][T16521] EXT4-fs (loop5): inodes count not valid: 262688 vs 32 06:32:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="feffffff200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 329.422850][T16500] loop4: detected capacity change from 0 to 131456 [ 329.433398][T16500] EXT4-fs (loop4): inodes count not valid: 65534 vs 32 [ 329.442004][T16532] loop3: detected capacity change from 0 to 131456 [ 329.445063][T16535] loop1: detected capacity change from 0 to 67 [ 329.463147][T16532] EXT4-fs (loop3): inodes count not valid: 4128800 vs 32 [ 329.488587][T16535] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/443/file0 supports timestamps until 2107 (0x10391447e) [ 329.489359][T16521] loop5: detected capacity change from 0 to 131456 [ 329.510309][T16521] EXT4-fs (loop5): inodes count not valid: 262688 vs 32 06:32:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20060400200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 329.537359][T16548] loop2: detected capacity change from 0 to 1 [ 329.556894][T16548] FAT-fs (loop2): Directory bread(block 3) failed [ 329.557485][T16554] loop4: detected capacity change from 0 to 131456 [ 329.571383][T16548] FAT-fs (loop2): Directory bread(block 4) failed [ 329.581835][T16554] EXT4-fs (loop4): inodes count not valid: 4294967294 vs 32 [ 329.591797][T16548] FAT-fs (loop2): Directory bread(block 5) failed [ 329.604973][T16561] loop5: detected capacity change from 0 to 131456 [ 329.611319][T16548] FAT-fs (loop2): Directory bread(block 6) failed [ 329.622388][T16548] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/349/file0 supports timestamps until 2107 (0x10391447e) [ 329.642804][T16561] EXT4-fs (loop5): inodes count not valid: 263712 vs 32 [ 329.723916][T16561] loop5: detected capacity change from 0 to 131456 [ 329.734503][T16561] EXT4-fs (loop5): inodes count not valid: 263712 vs 32 06:32:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x78000}], 0x1}, 0x700) 06:32:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20048000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x8803, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000020000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20100400200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 330.039477][T16583] loop5: detected capacity change from 0 to 131456 [ 330.046645][T16584] loop1: detected capacity change from 0 to 68 [ 330.055348][T16583] EXT4-fs (loop5): inodes count not valid: 266272 vs 32 [ 330.055775][T16581] loop4: detected capacity change from 0 to 131456 [ 330.070112][T16584] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/444/file0 supports timestamps until 2107 (0x10391447e) [ 330.075598][T16590] loop3: detected capacity change from 0 to 131456 [ 330.090205][T16589] loop2: detected capacity change from 0 to 1 [ 330.110135][T16590] EXT4-fs (loop3): inodes count not valid: 8389664 vs 32 [ 330.115981][T16581] EXT4-fs (loop4): inodes count not valid: 536870944 vs 32 [ 330.129798][T16589] FAT-fs (loop2): Directory bread(block 3) failed 06:32:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xc826, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 330.136715][T16583] loop5: detected capacity change from 0 to 131456 [ 330.142024][T16589] FAT-fs (loop2): Directory bread(block 4) failed [ 330.155128][T16583] EXT4-fs (loop5): inodes count not valid: 266272 vs 32 06:32:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000080100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 330.183070][T16590] loop3: detected capacity change from 0 to 131456 [ 330.187696][T16589] FAT-fs (loop2): Directory bread(block 5) failed [ 330.196842][T16589] FAT-fs (loop2): Directory bread(block 6) failed [ 330.204241][T16589] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/350/file0 supports timestamps until 2107 (0x10391447e) 06:32:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000500200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 330.230103][T16590] EXT4-fs (loop3): inodes count not valid: 8389664 vs 32 06:32:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20fffe00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 330.262822][T16621] loop4: detected capacity change from 0 to 131456 [ 330.269593][T16619] loop1: detected capacity change from 0 to 100 [ 330.278568][T16624] loop5: detected capacity change from 0 to 131456 [ 330.288454][T16619] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/445/file0 supports timestamps until 2107 (0x10391447e) 06:32:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xcb03, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 330.312337][T16621] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 330.322976][T16621] EXT4-fs (loop4): group descriptors corrupted! [ 330.330659][T16624] EXT4-fs (loop5): inodes count not valid: 327712 vs 32 [ 330.358478][T16599] ================================================================== [ 330.367207][T16599] BUG: KCSAN: data-race in __blkdev_get / __blkdev_put [ 330.374518][T16599] [ 330.375788][T16635] loop3: detected capacity change from 0 to 131456 [ 330.377034][T16599] write to 0xffff88810139f120 of 4 bytes by task 16624 on cpu 1: [ 330.377050][T16599] __blkdev_get+0x8c/0x6c0 [ 330.385388][T16635] EXT4-fs (loop3): inodes count not valid: 16711456 vs 32 [ 330.392419][T16599] blkdev_get_by_dev+0x9b/0x480 [ 330.397233][T16638] loop2: detected capacity change from 0 to 1 [ 330.404472][T16599] blkdev_open+0xb3/0x130 [ 330.404497][T16599] do_dentry_open+0x53e/0x830 [ 330.410716][T16638] FAT-fs (loop2): Directory bread(block 3) failed [ 330.415562][T16599] vfs_open+0x43/0x50 [ 330.415585][T16599] path_openat+0x184e/0x20b0 [ 330.415600][T16599] do_filp_open+0xd9/0x1f0 [ 330.420262][T16638] FAT-fs (loop2): Directory bread(block 4) failed [ 330.425013][T16599] do_sys_openat2+0xa3/0x250 [ 330.425038][T16599] __x64_sys_openat+0xef/0x110 [ 330.425055][T16599] do_syscall_64+0x4a/0x90 [ 330.431798][T16638] FAT-fs (loop2): Directory bread(block 5) failed [ 330.435621][T16599] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 330.435645][T16599] [ 330.435649][T16599] read to 0xffff88810139f120 of 4 bytes by task 16599 on cpu 0: [ 330.435663][T16599] __blkdev_put+0x5a/0x460 [ 330.440425][T16638] FAT-fs (loop2): Directory bread(block 6) failed [ 330.445101][T16599] blkdev_put+0x23e/0x2c0 [ 330.445122][T16599] blkdev_close+0x47/0x50 [ 330.445143][T16599] __fput+0x25b/0x4e0 [ 330.451790][T16638] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/351/file0 supports timestamps until 2107 (0x10391447e) [ 330.456154][T16599] ____fput+0x11/0x20 [ 330.456173][T16599] task_work_run+0xae/0x130 [ 330.456187][T16599] exit_to_user_mode_prepare+0x156/0x190 [ 330.543933][T16599] syscall_exit_to_user_mode+0x20/0x40 [ 330.549576][T16599] do_syscall_64+0x56/0x90 [ 330.554256][T16599] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 330.560380][T16599] [ 330.562944][T16599] Reported by Kernel Concurrency Sanitizer on: [ 330.569496][T16599] CPU: 0 PID: 16599 Comm: systemd-udevd Not tainted 5.13.0-rc2-syzkaller #0 [ 330.579269][T16599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.589879][T16599] ================================================================== [ 330.621992][T16645] loop1: detected capacity change from 0 to 101 [ 330.630615][T16645] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/446/file0 supports timestamps until 2107 (0x10391447e) [ 330.632968][T16635] loop3: detected capacity change from 0 to 131456 [ 330.657584][T16635] EXT4-fs (loop3): inodes count not valid: 16711456 vs 32 06:32:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x7f59c}], 0x1}, 0x700) 06:32:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000600200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xa, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xcc03, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20feff00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 330.923002][T16666] loop5: detected capacity change from 0 to 131456 [ 330.931404][T16666] EXT4-fs (loop5): inodes count not valid: 393248 vs 32 [ 330.936085][T16662] loop1: detected capacity change from 0 to 102 [ 330.971688][T16674] loop3: detected capacity change from 0 to 131456 [ 330.979469][T16662] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/447/file0 supports timestamps until 2107 (0x10391447e) [ 330.986910][T16675] loop2: detected capacity change from 0 to 1 [ 330.998800][T16666] loop5: detected capacity change from 0 to 131456 [ 331.002657][T16667] loop4: detected capacity change from 0 to 131456 [ 331.022766][T16675] FAT-fs (loop2): Directory bread(block 3) failed [ 331.030114][T16666] EXT4-fs (loop5): inodes count not valid: 393248 vs 32 [ 331.030905][T16667] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 331.047842][T16667] EXT4-fs (loop4): group descriptors corrupted! [ 331.047965][T16675] FAT-fs (loop2): Directory bread(block 4) failed [ 331.062134][T16675] FAT-fs (loop2): Directory bread(block 5) failed 06:32:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000150100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xcd03, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 331.070554][T16674] EXT4-fs (loop3): inodes count not valid: 16776736 vs 32 06:32:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20040600200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000300100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 331.115841][T16675] FAT-fs (loop2): Directory bread(block 6) failed [ 331.126771][T16675] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/352/file0 supports timestamps until 2107 (0x10391447e) [ 331.164500][T16701] loop3: detected capacity change from 0 to 131456 [ 331.165019][T16694] loop4: detected capacity change from 0 to 131456 [ 331.172271][T16701] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 331.188367][T16701] EXT4-fs (loop3): group descriptors corrupted! 06:32:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000200200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 331.206379][T16694] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 331.217765][T16694] EXT4-fs (loop4): group descriptors corrupted! [ 331.227647][T16706] loop1: detected capacity change from 0 to 102 [ 331.242624][T16712] loop5: detected capacity change from 0 to 131456 [ 331.263889][T16716] loop2: detected capacity change from 0 to 1 [ 331.265273][T16712] EXT4-fs (loop5): inodes count not valid: 394272 vs 32 [ 331.274054][T16706] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/448/file0 supports timestamps until 2107 (0x10391447e) [ 331.294363][T16716] FAT-fs (loop2): Directory bread(block 3) failed [ 331.301934][T16694] loop4: detected capacity change from 0 to 131456 [ 331.302096][T16716] FAT-fs (loop2): Directory bread(block 4) failed [ 331.309008][T16718] loop3: detected capacity change from 0 to 131456 [ 331.315690][T16716] FAT-fs (loop2): Directory bread(block 5) failed [ 331.329668][T16716] FAT-fs (loop2): Directory bread(block 6) failed [ 331.337133][T16718] EXT4-fs (loop3): inodes count not valid: 131104 vs 32 [ 331.346244][T16694] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 331.357223][T16694] EXT4-fs (loop4): group descriptors corrupted! [ 331.368809][T16716] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/353/file0 supports timestamps until 2107 (0x10391447e) 06:32:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x80000}], 0x1}, 0x700) 06:32:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000700200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xce03, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000300200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200000001e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xc, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 331.808553][T16746] loop5: detected capacity change from 0 to 131456 [ 331.816896][T16746] EXT4-fs (loop5): inodes count not valid: 458784 vs 32 [ 331.824342][T16747] loop2: detected capacity change from 0 to 1 [ 331.830085][T16752] loop3: detected capacity change from 0 to 131456 [ 331.838008][T16754] loop4: detected capacity change from 0 to 131456 [ 331.839565][T16747] FAT-fs (loop2): Directory bread(block 3) failed [ 331.848903][T16752] EXT4-fs (loop3): inodes count not valid: 196640 vs 32 [ 331.855755][T16754] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 331.863671][T16747] FAT-fs (loop2): Directory bread(block 4) failed [ 331.869490][T16754] EXT4-fs (loop4): group descriptors corrupted! [ 331.879410][T16757] loop1: detected capacity change from 0 to 103 [ 331.884186][T16747] FAT-fs (loop2): Directory bread(block 5) failed [ 331.896773][T16747] FAT-fs (loop2): Directory bread(block 6) failed 06:32:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200000001f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000900200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 331.904107][T16747] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/354/file0 supports timestamps until 2107 (0x10391447e) [ 331.941259][T16757] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/449/file0 supports timestamps until 2107 (0x10391447e) 06:32:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xd, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xcf03, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000a00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 331.971725][T16752] loop3: detected capacity change from 0 to 131456 [ 331.985253][T16774] loop5: detected capacity change from 0 to 131456 [ 331.997231][T16774] EXT4-fs (loop5): inodes count not valid: 589856 vs 32 [ 332.006061][T16752] EXT4-fs (loop3): inodes count not valid: 196640 vs 32 06:32:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000400200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 332.050033][T16776] loop4: detected capacity change from 0 to 131456 [ 332.061387][T16776] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 332.071746][T16776] EXT4-fs (loop4): group descriptors corrupted! [ 332.094993][T16786] loop2: detected capacity change from 0 to 1 [ 332.102938][T16786] FAT-fs (loop2): Directory bread(block 3) failed [ 332.109664][T16796] loop1: detected capacity change from 0 to 103 [ 332.110581][T16786] FAT-fs (loop2): Directory bread(block 4) failed [ 332.124605][T16786] FAT-fs (loop2): Directory bread(block 5) failed [ 332.135429][T16796] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/450/file0 supports timestamps until 2107 (0x10391447e) [ 332.137218][T16799] loop5: detected capacity change from 0 to 131456 [ 332.150040][T16803] loop3: detected capacity change from 0 to 131456 [ 332.157803][T16776] loop4: detected capacity change from 0 to 131456 [ 332.164071][T16786] FAT-fs (loop2): Directory bread(block 6) failed [ 332.185409][T16803] EXT4-fs (loop3): inodes count not valid: 262176 vs 32 [ 332.193205][T16776] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 332.203529][T16776] EXT4-fs (loop4): group descriptors corrupted! [ 332.219263][T16786] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/355/file0 supports timestamps until 2107 (0x10391447e) [ 332.237502][T16799] EXT4-fs (loop5): inodes count not valid: 655392 vs 32 [ 332.285729][T16803] loop3: detected capacity change from 0 to 131456 [ 332.293617][T16803] EXT4-fs (loop3): inodes count not valid: 262176 vs 32 06:32:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x86d78}], 0x1}, 0x700) 06:32:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xd003, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xe, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000b00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20020000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000500200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 332.710482][T16834] loop2: detected capacity change from 0 to 1 [ 332.715290][T16838] loop5: detected capacity change from 0 to 131456 [ 332.719996][T16841] loop1: detected capacity change from 0 to 104 [ 332.729367][T16838] EXT4-fs (loop5): inodes count not valid: 720928 vs 32 [ 332.732031][T16834] FAT-fs (loop2): Directory bread(block 3) failed [ 332.738098][T16842] loop3: detected capacity change from 0 to 131456 [ 332.745016][T16834] FAT-fs (loop2): Directory bread(block 4) failed [ 332.751295][T16843] loop4: detected capacity change from 0 to 131456 [ 332.759088][T16834] FAT-fs (loop2): Directory bread(block 5) failed [ 332.771159][T16834] FAT-fs (loop2): Directory bread(block 6) failed [ 332.780995][T16834] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/356/file0 supports timestamps until 2107 (0x10391447e) [ 332.798856][T16842] EXT4-fs (loop3): inodes count not valid: 327712 vs 32 06:32:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000c00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 332.800424][T16838] loop5: detected capacity change from 0 to 131456 [ 332.807029][T16841] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/451/file0 supports timestamps until 2107 (0x10391447e) [ 332.826466][T16838] EXT4-fs (loop5): inodes count not valid: 720928 vs 32 [ 332.827817][T16843] EXT4-fs (loop4): inodes count not valid: 544 vs 32 06:32:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000600200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xd026, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xf, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 332.901675][T16862] loop5: detected capacity change from 0 to 131456 [ 332.921507][T16862] EXT4-fs (loop5): inodes count not valid: 786464 vs 32 [ 332.929842][T16843] loop4: detected capacity change from 0 to 131456 [ 332.942272][T16872] loop3: detected capacity change from 0 to 131456 06:32:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20030000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 332.971161][T16843] EXT4-fs (loop4): inodes count not valid: 544 vs 32 [ 332.984547][T16872] EXT4-fs (loop3): inodes count not valid: 393248 vs 32 [ 333.004050][T16884] loop1: detected capacity change from 0 to 104 06:32:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000700200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 333.024272][T16884] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/452/file0 supports timestamps until 2107 (0x10391447e) [ 333.036480][T16886] loop2: detected capacity change from 0 to 1 [ 333.044176][T16862] loop5: detected capacity change from 0 to 131456 [ 333.053819][T16886] FAT-fs (loop2): Directory bread(block 3) failed [ 333.061006][T16886] FAT-fs (loop2): Directory bread(block 4) failed [ 333.068297][T16886] FAT-fs (loop2): Directory bread(block 5) failed [ 333.075706][T16886] FAT-fs (loop2): Directory bread(block 6) failed [ 333.082657][T16886] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/357/file0 supports timestamps until 2107 (0x10391447e) [ 333.085785][T16898] loop4: detected capacity change from 0 to 131456 [ 333.107372][T16898] EXT4-fs (loop4): inodes count not valid: 800 vs 32 [ 333.127190][T16897] loop3: detected capacity change from 0 to 131456 [ 333.136338][T16897] EXT4-fs (loop3): inodes count not valid: 458784 vs 32 [ 333.147851][T16898] loop4: detected capacity change from 0 to 131456 [ 333.155233][T16898] EXT4-fs (loop4): inodes count not valid: 800 vs 32 [ 333.201660][T16897] loop3: detected capacity change from 0 to 131456 [ 333.211324][T16897] EXT4-fs (loop3): inodes count not valid: 458784 vs 32 06:32:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x88000}], 0x1}, 0x700) 06:32:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xd103, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x10, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000d00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20040000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000800200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 333.580044][T16932] loop4: detected capacity change from 0 to 131456 [ 333.580555][T16931] loop3: detected capacity change from 0 to 131456 [ 333.588037][T16935] loop2: detected capacity change from 0 to 1 [ 333.594236][T16933] loop1: detected capacity change from 0 to 104 [ 333.604414][T16932] EXT4-fs (loop4): inodes count not valid: 1056 vs 32 [ 333.612420][T16931] EXT4-fs (loop3): inodes count not valid: 524320 vs 32 [ 333.614579][T16934] loop5: detected capacity change from 0 to 131456 06:32:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000a00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20050000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 333.634439][T16933] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/453/file0 supports timestamps until 2107 (0x10391447e) [ 333.639243][T16935] FAT-fs (loop2): Directory bread(block 3) failed [ 333.672438][T16934] EXT4-fs (loop5): inodes count not valid: 852000 vs 32 06:32:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000e00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xd203, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 333.736052][T16935] FAT-fs (loop2): Directory bread(block 4) failed [ 333.743513][T16935] FAT-fs (loop2): Directory bread(block 5) failed [ 333.750453][T16935] FAT-fs (loop2): Directory bread(block 6) failed [ 333.760666][T16959] loop3: detected capacity change from 0 to 131456 [ 333.768977][T16935] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/358/file0 supports timestamps until 2107 (0x10391447e) 06:32:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x11, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 333.769294][T16958] loop4: detected capacity change from 0 to 131456 [ 333.787089][T16959] EXT4-fs (loop3): inodes count not valid: 655392 vs 32 [ 333.794921][T16958] EXT4-fs (loop4): inodes count not valid: 1312 vs 32 [ 333.814742][T16968] loop1: detected capacity change from 0 to 105 [ 333.819287][T16961] loop5: detected capacity change from 0 to 131456 [ 333.833293][T16959] loop3: detected capacity change from 0 to 131456 [ 333.839486][T16968] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/454/file0 supports timestamps until 2107 (0x10391447e) [ 333.859377][T16959] EXT4-fs (loop3): inodes count not valid: 655392 vs 32 [ 333.867040][T16961] EXT4-fs (loop5): inodes count not valid: 917536 vs 32 06:32:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xd303, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 333.889124][T16958] loop4: detected capacity change from 0 to 131456 [ 333.923454][T16958] EXT4-fs (loop4): inodes count not valid: 1312 vs 32 [ 333.939996][T16987] loop2: detected capacity change from 0 to 1 [ 333.958241][T16987] FAT-fs (loop2): Directory bread(block 3) failed [ 333.965516][T16987] FAT-fs (loop2): Directory bread(block 4) failed [ 333.972378][T16987] FAT-fs (loop2): Directory bread(block 5) failed [ 333.979815][T16987] FAT-fs (loop2): Directory bread(block 6) failed [ 333.986871][T16987] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/359/file0 supports timestamps until 2107 (0x10391447e) [ 334.000412][T16994] loop1: detected capacity change from 0 to 105 [ 334.018238][T16994] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/455/file0 supports timestamps until 2107 (0x10391447e) 06:32:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000b00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000f00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20060000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x12, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x8e554}], 0x1}, 0x700) 06:32:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xd403, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 334.458022][T17019] loop3: detected capacity change from 0 to 131456 [ 334.465075][T17017] loop1: detected capacity change from 0 to 106 [ 334.468434][T17022] loop4: detected capacity change from 0 to 131456 [ 334.478794][T17023] loop5: detected capacity change from 0 to 131456 [ 334.482425][T17019] EXT4-fs (loop3): inodes count not valid: 720928 vs 32 [ 334.486443][T17024] loop2: detected capacity change from 0 to 1 06:32:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20001800200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 334.499897][T17017] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/456/file0 supports timestamps until 2107 (0x10391447e) [ 334.503158][T17023] EXT4-fs (loop5): inodes count not valid: 983072 vs 32 [ 334.525032][T17022] EXT4-fs (loop4): inodes count not valid: 1568 vs 32 06:32:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20041000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 334.575038][T17022] loop4: detected capacity change from 0 to 131456 [ 334.583239][T17024] FAT-fs (loop2): Directory bread(block 3) failed [ 334.609995][T17022] EXT4-fs (loop4): inodes count not valid: 1568 vs 32 06:32:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xd426, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20070000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 334.628083][T17024] FAT-fs (loop2): Directory bread(block 4) failed [ 334.647045][T17024] FAT-fs (loop2): Directory bread(block 5) failed [ 334.653715][T17048] loop3: detected capacity change from 0 to 131456 [ 334.654704][T17024] FAT-fs (loop2): Directory bread(block 6) failed [ 334.668442][T17024] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/360/file0 supports timestamps until 2107 (0x10391447e) 06:32:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x18, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 334.702699][T17049] loop5: detected capacity change from 0 to 131456 [ 334.707900][T17048] EXT4-fs (loop3): inodes count not valid: 1572896 vs 32 [ 334.717372][T17059] loop1: detected capacity change from 0 to 106 [ 334.737403][T17049] EXT4-fs (loop5): inodes count not valid: 1049632 vs 32 [ 334.742227][T17060] loop4: detected capacity change from 0 to 131456 [ 334.756618][T17059] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/457/file0 supports timestamps until 2107 (0x10391447e) [ 334.795826][T17060] EXT4-fs (loop4): inodes count not valid: 1824 vs 32 06:32:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xd503, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20201000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 334.802771][T17048] loop3: detected capacity change from 0 to 131456 [ 334.819600][T17073] loop2: detected capacity change from 0 to 1 [ 334.833823][T17073] FAT-fs (loop2): Directory bread(block 3) failed [ 334.838865][T17048] EXT4-fs (loop3): inodes count not valid: 1572896 vs 32 [ 334.848997][T17073] FAT-fs (loop2): Directory bread(block 4) failed [ 334.860827][T17073] FAT-fs (loop2): Directory bread(block 5) failed [ 334.875073][T17073] FAT-fs (loop2): Directory bread(block 6) failed [ 334.884201][T17083] loop5: detected capacity change from 0 to 131456 [ 334.884643][T17060] loop4: detected capacity change from 0 to 131456 [ 334.891265][T17073] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/361/file0 supports timestamps until 2107 (0x10391447e) [ 334.929638][T17060] EXT4-fs (loop4): inodes count not valid: 1824 vs 32 06:32:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20001c00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 334.954638][T17083] EXT4-fs (loop5): inodes count not valid: 1056800 vs 32 06:32:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x19, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20001100200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 334.982288][T17095] loop1: detected capacity change from 0 to 106 [ 335.002991][T17095] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/458/file0 supports timestamps until 2107 (0x10391447e) [ 335.020065][T17103] loop3: detected capacity change from 0 to 131456 [ 335.041665][T17103] EXT4-fs (loop3): inodes count not valid: 1835040 vs 32 [ 335.070476][T17107] loop2: detected capacity change from 0 to 1 [ 335.124406][T17113] loop5: detected capacity change from 0 to 131456 [ 335.132441][T17107] FAT-fs (loop2): Directory bread(block 3) failed [ 335.140936][T17103] loop3: detected capacity change from 0 to 131456 [ 335.152100][T17113] EXT4-fs (loop5): inodes count not valid: 1114144 vs 32 [ 335.159541][T17107] FAT-fs (loop2): Directory bread(block 4) failed [ 335.169734][T17107] FAT-fs (loop2): Directory bread(block 5) failed [ 335.173947][T17103] EXT4-fs (loop3): inodes count not valid: 1835040 vs 32 [ 335.177259][T17107] FAT-fs (loop2): Directory bread(block 6) failed [ 335.190692][T17107] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/362/file0 supports timestamps until 2107 (0x10391447e) [ 335.204065][T17113] loop5: detected capacity change from 0 to 131456 [ 335.213575][T17113] EXT4-fs (loop5): inodes count not valid: 1114144 vs 32 06:32:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x90000}], 0x1}, 0x700) 06:32:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20080000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xd603, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x22, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20002600200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20001200200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 335.351302][T17144] loop2: detected capacity change from 0 to 1 [ 335.356101][T17148] loop1: detected capacity change from 0 to 107 [ 335.364355][T17150] loop4: detected capacity change from 0 to 131456 [ 335.364434][T17144] FAT-fs (loop2): Directory bread(block 3) failed [ 335.375266][T17146] loop5: detected capacity change from 0 to 131456 [ 335.379538][T17152] loop3: detected capacity change from 0 to 131456 [ 335.388467][T17146] EXT4-fs (loop5): inodes count not valid: 1179680 vs 32 06:32:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20090000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 335.399870][T17150] EXT4-fs (loop4): inodes count not valid: 2080 vs 32 [ 335.419808][T17148] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/459/file0 supports timestamps until 2107 (0x10391447e) [ 335.430970][T17144] FAT-fs (loop2): Directory bread(block 4) failed 06:32:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20001400200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 335.450269][T17152] EXT4-fs (loop3): inodes count not valid: 2490400 vs 32 [ 335.480158][T17144] FAT-fs (loop2): Directory bread(block 5) failed [ 335.486809][T17144] FAT-fs (loop2): Directory bread(block 6) failed 06:32:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 335.495974][T17144] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/363/file0 supports timestamps until 2107 (0x10391447e) [ 335.525091][T17152] loop3: detected capacity change from 0 to 131456 [ 335.526350][T17168] loop4: detected capacity change from 0 to 131456 [ 335.542635][T17152] EXT4-fs (loop3): inodes count not valid: 2490400 vs 32 06:32:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x25, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 335.562394][T17168] EXT4-fs (loop4): inodes count not valid: 2336 vs 32 [ 335.577274][T17174] loop5: detected capacity change from 0 to 131456 [ 335.593362][T17174] EXT4-fs (loop5): inodes count not valid: 1310752 vs 32 [ 335.603259][T17184] loop1: detected capacity change from 0 to 118 06:32:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="2000fe00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20011f00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 335.633224][T17168] loop4: detected capacity change from 0 to 131456 [ 335.654533][T17184] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/460/file0 supports timestamps until 2107 (0x10391447e) [ 335.670897][T17195] loop2: detected capacity change from 0 to 1 [ 335.673992][T17199] loop3: detected capacity change from 0 to 131456 [ 335.690713][T17168] EXT4-fs (loop4): inodes count not valid: 2336 vs 32 [ 335.698112][T17201] loop5: detected capacity change from 0 to 131456 [ 335.707331][T17195] FAT-fs (loop2): Directory bread(block 3) failed [ 335.709697][T17201] EXT4-fs (loop5): inodes count not valid: 2031904 vs 32 [ 335.738302][T17195] FAT-fs (loop2): Directory bread(block 4) failed [ 335.745193][T17195] FAT-fs (loop2): Directory bread(block 5) failed [ 335.745550][T17199] EXT4-fs (loop3): inodes count not valid: 16646176 vs 32 [ 335.751939][T17195] FAT-fs (loop2): Directory bread(block 6) failed [ 335.767178][T17195] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/364/file0 supports timestamps until 2107 (0x10391447e) [ 335.815705][T17199] loop3: detected capacity change from 0 to 131456 [ 335.823055][T17199] EXT4-fs (loop3): inodes count not valid: 16646176 vs 32 06:32:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20002000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x48, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200a0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x95d30}], 0x1}, 0x700) 06:32:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000402200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 336.230455][T17230] loop2: detected capacity change from 0 to 1 [ 336.237364][T17232] loop4: detected capacity change from 0 to 131456 [ 336.237887][T17231] loop3: detected capacity change from 0 to 131456 [ 336.248182][T17234] loop5: detected capacity change from 0 to 131456 [ 336.252803][T17235] loop1: detected capacity change from 0 to 127 [ 336.261465][T17234] EXT4-fs (loop5): inodes count not valid: 2097184 vs 32 [ 336.270504][T17232] EXT4-fs (loop4): inodes count not valid: 2592 vs 32 06:32:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20102000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 336.284003][T17230] FAT-fs (loop2): Directory bread(block 3) failed [ 336.320174][T17230] FAT-fs (loop2): Directory bread(block 4) failed [ 336.327993][T17230] FAT-fs (loop2): Directory bread(block 5) failed [ 336.334978][T17230] FAT-fs (loop2): Directory bread(block 6) failed [ 336.342115][T17235] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/461/file0 supports timestamps until 2107 (0x10391447e) [ 336.342455][T17231] EXT4-fs (loop3): inodes count not valid: 33816608 vs 32 [ 336.369192][T17230] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/365/file0 supports timestamps until 2107 (0x10391447e) 06:32:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20002200200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 336.371815][T17251] loop5: detected capacity change from 0 to 131456 [ 336.396376][T17251] EXT4-fs (loop5): inodes count not valid: 2101280 vs 32 [ 336.400771][T17232] loop4: detected capacity change from 0 to 131456 06:32:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000003200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4c, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 336.438157][T17232] EXT4-fs (loop4): inodes count not valid: 2592 vs 32 [ 336.473950][T17267] loop1: detected capacity change from 0 to 512 06:32:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200b0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0xe0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 336.488346][T17267] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/462/file0 supports timestamps until 2107 (0x10391447e) [ 336.507751][T17274] loop3: detected capacity change from 0 to 131456 [ 336.528805][T17262] loop5: detected capacity change from 0 to 131456 [ 336.541197][T17274] EXT4-fs (loop3): inodes count not valid: 50331680 vs 32 [ 336.548810][T17283] loop2: detected capacity change from 0 to 1 [ 336.558354][T17283] FAT-fs (loop2): Directory bread(block 3) failed [ 336.573555][T17283] FAT-fs (loop2): Directory bread(block 4) failed [ 336.580728][T17283] FAT-fs (loop2): Directory bread(block 5) failed 06:32:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x60, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 336.587367][T17283] FAT-fs (loop2): Directory bread(block 6) failed [ 336.594394][T17283] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/366/file0 supports timestamps until 2107 (0x10391447e) [ 336.620451][T17292] loop4: detected capacity change from 0 to 131456 [ 336.630523][T17292] EXT4-fs (loop4): inodes count not valid: 2848 vs 32 [ 336.633578][T17291] loop1: detected capacity change from 0 to 1792 [ 336.638930][T17262] EXT4-fs (loop5): inodes count not valid: 2228256 vs 32 [ 336.659791][T17291] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/463/file0 supports timestamps until 2107 (0x10391447e) 06:32:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20002500200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 336.688796][T17274] loop3: detected capacity change from 0 to 131456 [ 336.699648][T17274] EXT4-fs (loop3): inodes count not valid: 50331680 vs 32 [ 336.702236][T17303] loop2: detected capacity change from 0 to 1 [ 336.720708][T17303] FAT-fs (loop2): Directory bread(block 3) failed [ 336.727612][T17303] FAT-fs (loop2): Directory bread(block 4) failed [ 336.734187][T17303] FAT-fs (loop2): Directory bread(block 5) failed 06:32:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200c0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 336.741007][T17303] FAT-fs (loop2): Directory bread(block 6) failed [ 336.749544][T17303] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/367/file0 supports timestamps until 2107 (0x10391447e) [ 336.781206][T17311] loop5: detected capacity change from 0 to 131456 [ 336.797275][T17314] loop4: detected capacity change from 0 to 131456 [ 336.826348][T17314] EXT4-fs (loop4): inodes count not valid: 3104 vs 32 [ 336.831137][T17311] EXT4-fs (loop5): inodes count not valid: 2424864 vs 32 [ 336.890098][T17311] loop5: detected capacity change from 0 to 131456 [ 336.897737][T17311] EXT4-fs (loop5): inodes count not valid: 2424864 vs 32 06:32:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x98000}], 0x1}, 0x700) 06:32:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x1fffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000204200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x68, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200d0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20002e00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 337.101939][T17345] loop4: detected capacity change from 0 to 131456 [ 337.111942][T17345] EXT4-fs (loop4): inodes count not valid: 3360 vs 32 [ 337.126387][T17347] loop2: detected capacity change from 0 to 1 [ 337.126567][T17352] loop3: detected capacity change from 0 to 131456 [ 337.161215][T17352] EXT4-fs (loop3): inodes count not valid: 67239968 vs 32 [ 337.164054][T17356] loop1: detected capacity change from 0 to 4095 [ 337.168630][T17345] loop4: detected capacity change from 0 to 131456 [ 337.175496][T17347] FAT-fs (loop2): Directory bread(block 3) failed [ 337.183337][T17354] loop5: detected capacity change from 0 to 131456 [ 337.204139][T17345] EXT4-fs (loop4): inodes count not valid: 3360 vs 32 06:32:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000604200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20003f00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 337.223845][T17354] EXT4-fs (loop5): inodes count not valid: 3014688 vs 32 [ 337.236987][T17347] FAT-fs (loop2): Directory bread(block 4) failed [ 337.238621][T17356] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/464/file0 supports timestamps until 2107 (0x10391447e) [ 337.245144][T17347] FAT-fs (loop2): Directory bread(block 5) failed [ 337.265524][T17347] FAT-fs (loop2): Directory bread(block 6) failed 06:32:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20004000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200e0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 337.292059][T17347] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/368/file0 supports timestamps until 2107 (0x10391447e) 06:32:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x400000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x6c, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 337.345680][T17373] loop3: detected capacity change from 0 to 131456 [ 337.389005][T17373] EXT4-fs (loop3): inodes count not valid: 67502112 vs 32 [ 337.392479][T17386] loop4: detected capacity change from 0 to 131456 [ 337.413021][T17386] EXT4-fs (loop4): inodes count not valid: 3616 vs 32 [ 337.420906][T17388] loop5: detected capacity change from 0 to 131456 [ 337.438721][T17393] loop1: detected capacity change from 0 to 8192 [ 337.450779][T17399] loop2: detected capacity change from 0 to 1 [ 337.458917][T17388] EXT4-fs (loop5): inodes count not valid: 4194336 vs 32 [ 337.464764][T17373] loop3: detected capacity change from 0 to 131456 [ 337.473928][T17373] EXT4-fs (loop3): inodes count not valid: 67502112 vs 32 [ 337.482575][T17393] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/465/file0 supports timestamps until 2107 (0x10391447e) [ 337.503386][T17399] FAT-fs (loop2): Directory bread(block 3) failed [ 337.529050][T17399] FAT-fs (loop2): Directory bread(block 4) failed [ 337.536066][T17399] FAT-fs (loop2): Directory bread(block 5) failed [ 337.542816][T17399] FAT-fs (loop2): Directory bread(block 6) failed [ 337.558564][T17399] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/369/file0 supports timestamps until 2107 (0x10391447e) 06:32:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0x9d50c}], 0x1}, 0x700) 06:32:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="200f0000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20008004200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20004800200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x74, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 338.015282][T17432] loop2: detected capacity change from 0 to 1 [ 338.024720][T17432] FAT-fs (loop2): Directory bread(block 3) failed [ 338.031792][T17433] loop1: detected capacity change from 0 to 32768 [ 338.032494][T17434] loop5: detected capacity change from 0 to 131456 [ 338.046898][T17439] loop4: detected capacity change from 0 to 131456 [ 338.051919][T17432] FAT-fs (loop2): Directory bread(block 4) failed [ 338.054018][T17440] loop3: detected capacity change from 0 to 131456 [ 338.063129][T17432] FAT-fs (loop2): Directory bread(block 5) failed [ 338.074206][T17432] FAT-fs (loop2): Directory bread(block 6) failed [ 338.080869][T17433] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/466/file0 supports timestamps until 2107 (0x10391447e) [ 338.081307][T17434] EXT4-fs (loop5): inodes count not valid: 4718624 vs 32 [ 338.104699][T17439] EXT4-fs (loop4): inodes count not valid: 3872 vs 32 06:32:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000005200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 338.121282][T17440] EXT4-fs (loop3): inodes count not valid: 75497504 vs 32 [ 338.130946][T17432] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/370/file0 supports timestamps until 2107 (0x10391447e) 06:32:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x78, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x10e0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20100000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 338.175953][T17439] loop4: detected capacity change from 0 to 131456 [ 338.198841][T17434] loop5: detected capacity change from 0 to 131456 [ 338.203769][T17439] EXT4-fs (loop4): inodes count not valid: 3872 vs 32 [ 338.207006][T17434] EXT4-fs (loop5): inodes count not valid: 4718624 vs 32 06:32:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20004c00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 338.264898][T17464] loop3: detected capacity change from 0 to 131456 [ 338.281836][T17464] EXT4-fs (loop3): inodes count not valid: 83886112 vs 32 [ 338.290027][T17474] loop2: detected capacity change from 0 to 1 [ 338.290025][T17476] loop1: detected capacity change from 0 to 34560 [ 338.308870][T17476] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/467/file0 supports timestamps until 2107 (0x10391447e) [ 338.314302][T17483] loop5: detected capacity change from 0 to 131456 [ 338.334147][T17483] EXT4-fs (loop5): inodes count not valid: 4980768 vs 32 [ 338.335119][T17474] FAT-fs (loop2): Directory bread(block 3) failed [ 338.350929][T17474] FAT-fs (loop2): Directory bread(block 4) failed [ 338.358094][T17474] FAT-fs (loop2): Directory bread(block 5) failed 06:32:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 338.363140][T17485] loop4: detected capacity change from 0 to 131456 [ 338.371127][T17474] FAT-fs (loop2): Directory bread(block 6) failed [ 338.393477][T17485] EXT4-fs (loop4): inodes count not valid: 4128 vs 32 [ 338.401562][T17464] loop3: detected capacity change from 0 to 131456 [ 338.406606][T17474] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/371/file0 supports timestamps until 2107 (0x10391447e) [ 338.425608][T17464] EXT4-fs (loop3): inodes count not valid: 83886112 vs 32 [ 338.454630][T17495] loop1: detected capacity change from 0 to 65536 [ 338.501637][T17495] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/468/file0 supports timestamps until 2107 (0x10391447e) 06:32:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa0000}], 0x1}, 0x700) 06:32:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x7a, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20006000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20110000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20002c05200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x2040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 338.910536][T17519] loop2: detected capacity change from 0 to 1 [ 338.921162][T17519] FAT-fs (loop2): Directory bread(block 3) failed [ 338.928298][T17522] loop4: detected capacity change from 0 to 131456 [ 338.929124][T17525] loop1: detected capacity change from 0 to 66048 [ 338.936804][T17523] loop3: detected capacity change from 0 to 131456 [ 338.942557][T17524] loop5: detected capacity change from 0 to 131456 [ 338.952574][T17519] FAT-fs (loop2): Directory bread(block 4) failed [ 338.962615][T17519] FAT-fs (loop2): Directory bread(block 5) failed [ 338.969503][T17519] FAT-fs (loop2): Directory bread(block 6) failed [ 338.976503][T17519] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/372/file0 supports timestamps until 2107 (0x10391447e) [ 338.981134][T17522] EXT4-fs (loop4): inodes count not valid: 4384 vs 32 06:32:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x10e, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000006200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 339.007644][T17523] EXT4-fs (loop3): inodes count not valid: 86769696 vs 32 [ 339.017221][T17525] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/469/file0 supports timestamps until 2107 (0x10391447e) [ 339.024040][T17524] EXT4-fs (loop5): inodes count not valid: 6291488 vs 32 06:32:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20120000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 339.121729][T17542] loop2: detected capacity change from 0 to 1 [ 339.137202][T17522] loop4: detected capacity change from 0 to 131456 [ 339.147060][T17522] EXT4-fs (loop4): inodes count not valid: 4384 vs 32 [ 339.153635][T17542] FAT-fs (loop2): Directory bread(block 3) failed 06:32:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20130000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 339.181527][T17550] loop3: detected capacity change from 0 to 131456 [ 339.190442][T17524] loop5: detected capacity change from 0 to 131456 [ 339.205771][T17542] FAT-fs (loop2): Directory bread(block 4) failed [ 339.216755][T17550] EXT4-fs (loop3): inodes count not valid: 100663328 vs 32 [ 339.225203][T17542] FAT-fs (loop2): Directory bread(block 5) failed 06:32:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000406200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 339.228314][T17524] EXT4-fs (loop5): inodes count not valid: 6291488 vs 32 [ 339.232312][T17542] FAT-fs (loop2): Directory bread(block 6) failed [ 339.253218][T17566] loop1: detected capacity change from 0 to 98304 [ 339.258340][T17542] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/373/file0 supports timestamps until 2107 (0x10391447e) [ 339.260113][T17564] loop4: detected capacity change from 0 to 131456 [ 339.325180][T17564] EXT4-fs (loop4): inodes count not valid: 4896 vs 32 [ 339.336203][T17566] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/470/file0 supports timestamps until 2107 (0x10391447e) [ 339.365114][T17577] loop3: detected capacity change from 0 to 131456 [ 339.410058][T17564] loop4: detected capacity change from 0 to 131456 [ 339.413554][T17577] EXT4-fs (loop3): inodes count not valid: 100925472 vs 32 [ 339.430535][T17564] EXT4-fs (loop4): inodes count not valid: 4896 vs 32 06:32:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa4ce8}], 0x1}, 0x700) 06:32:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20006800200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x17c, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) 06:32:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000007200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20140000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 339.805403][T17606] loop4: detected capacity change from 0 to 131456 [ 339.806692][T17601] loop5: detected capacity change from 0 to 131456 [ 339.812315][T17608] loop1: detected capacity change from 0 to 131072 [ 339.819956][T17603] loop2: detected capacity change from 0 to 1 [ 339.832271][T17606] EXT4-fs (loop4): inodes count not valid: 5152 vs 32 [ 339.833490][T17600] loop3: detected capacity change from 0 to 131456 [ 339.846111][T17608] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/471/file0 supports timestamps until 2107 (0x10391447e) [ 339.886649][T17606] loop4: detected capacity change from 0 to 131456 06:32:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 339.905588][T17601] EXT4-fs (loop5): inodes count not valid: 6815776 vs 32 [ 339.912904][T17603] FAT-fs (loop2): Directory bread(block 3) failed [ 339.913158][T17606] EXT4-fs (loop4): inodes count not valid: 5152 vs 32 [ 339.919985][T17600] EXT4-fs (loop3): inodes count not valid: 117440544 vs 32 06:32:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20006c00200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000a200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030010, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20150000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)='.', 0x1, 0x800}], 0x0, &(0x7f0000013800)) 06:32:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x204, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 339.971053][T17603] FAT-fs (loop2): Directory bread(block 4) failed [ 339.986860][T17603] FAT-fs (loop2): Directory bread(block 5) failed [ 339.993909][T17603] FAT-fs (loop2): Directory bread(block 6) failed [ 340.001914][T17603] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/374/file0 supports timestamps until 2107 (0x10391447e) 06:32:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e4}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 340.053988][T17636] loop4: detected capacity change from 0 to 131456 [ 340.066465][T17630] loop5: detected capacity change from 0 to 131456 [ 340.081682][T17636] EXT4-fs (loop4): inodes count not valid: 5408 vs 32 [ 340.092083][T17630] EXT4-fs (loop5): inodes count not valid: 7077920 vs 32 [ 340.118708][T17641] loop3: detected capacity change from 0 to 131456 [ 340.131611][T17641] EXT4-fs (loop3): inodes count not valid: 167772192 vs 32 [ 340.140620][T17649] loop1: detected capacity change from 0 to 196608 [ 340.152500][T17649] vfat filesystem being mounted at /root/syzkaller-testdir671080981/syzkaller.sfnSXY/473/file0 supports timestamps until 2107 (0x10391447e) [ 340.192748][T17653] loop2: detected capacity change from 0 to 1 [ 340.204370][T17653] FAT-fs (loop2): Directory bread(block 3) failed [ 340.211561][T17653] FAT-fs (loop2): Directory bread(block 4) failed [ 340.218596][T17653] FAT-fs (loop2): Directory bread(block 5) failed [ 340.227066][T17653] FAT-fs (loop2): Directory bread(block 6) failed [ 340.234252][T17653] vfat filesystem being mounted at /root/syzkaller-testdir970389960/syzkaller.87VTQK/375/file0 supports timestamps until 2107 (0x10391447e)