ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 819.438682][ T7340] loop5: detected capacity change from 0 to 24576 [ 819.445336][ T7341] loop4: detected capacity change from 0 to 6 [ 819.458458][ T7340] EXT4-fs warning (device loop5): ext4_multi_mount_protect:286: Invalid MMP block in superblock 14:12:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000160000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 819.496939][ T7341] loop4: detected capacity change from 0 to 6 [ 819.526222][ T7349] loop3: detected capacity change from 0 to 6 14:12:21 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf103, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 819.618015][ T7356] loop1: detected capacity change from 0 to 24576 [ 819.633318][ T7365] loop5: detected capacity change from 0 to 24576 [ 819.646660][ T7364] loop0: detected capacity change from 0 to 24576 [ 819.662800][ T7365] EXT4-fs warning (device loop5): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 819.675787][ T7374] loop4: detected capacity change from 0 to 6 [ 819.682983][ T7356] EXT4-fs error (device loop1): ext4_orphan_get:1412: comm syz-executor.1: bad orphan inode 17 [ 819.693412][ T7356] ext4_test_bit(bit=16, block=4) = 1 [ 819.699005][ T7356] is_bad_inode(inode)=0 [ 819.703184][ T7356] NEXT_ORPHAN(inode)=80 [ 819.707416][ T7356] max_ino=32 [ 819.710700][ T7356] i_nlink=0 [ 819.715241][ T7356] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 819.726100][ T7356] ext4 filesystem being mounted at /root/syzkaller-testdir124890835/syzkaller.fBs7W1/2123/file0 supports timestamps until 2038 (0x7fffffff) [ 819.746368][ T7364] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 819.756680][ T7364] EXT4-fs (loop0): group descriptors corrupted! 14:12:22 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="646f733178666c6f74db966f5c"]) 14:12:22 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf203, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:22 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, 0x0) 14:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000033010000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000170000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 820.588482][ T7405] loop5: detected capacity change from 0 to 24576 [ 820.588923][ T7401] loop1: detected capacity change from 0 to 24576 [ 820.598261][ T7405] EXT4-fs warning (device loop5): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 820.601636][ T7402] loop3: detected capacity change from 0 to 6 14:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 820.685747][ T7409] loop0: detected capacity change from 0 to 24576 [ 820.699666][ T7410] loop4: detected capacity change from 0 to 6 [ 820.705149][ T7401] EXT4-fs error (device loop1): ext4_orphan_get:1412: comm syz-executor.1: bad orphan inode 17 [ 820.712754][ T7409] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 820.717724][ T7401] ext4_test_bit(bit=16, block=4) = 1 14:12:22 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, 0x0) [ 820.727992][ T7409] EXT4-fs (loop0): group descriptors corrupted! [ 820.733310][ T7401] is_bad_inode(inode)=0 [ 820.733320][ T7401] NEXT_ORPHAN(inode)=80 [ 820.748044][ T7401] max_ino=32 [ 820.751320][ T7401] i_nlink=0 [ 820.754541][ T7401] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 820.765620][ T7401] ext4 filesystem being mounted at /root/syzkaller-testdir124890835/syzkaller.fBs7W1/2124/file0 supports timestamps until 2038 (0x7fffffff) 14:12:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00004e010000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000180000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 820.796822][ T7427] loop2: detected capacity change from 0 to 6 [ 820.799210][ T7425] loop5: detected capacity change from 0 to 24576 [ 820.812288][ T7425] EXT4-fs warning (device loop5): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 820.823967][ T7427] FAT-fs (loop2): Unrecognized mount option "dos1xflotۖo\" or missing value [ 820.833158][ T7410] loop4: detected capacity change from 0 to 6 14:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:22 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf303, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 820.898108][ T7441] loop3: detected capacity change from 0 to 6 [ 820.915146][ T7427] loop2: detected capacity change from 0 to 6 [ 820.922249][ T7452] loop0: detected capacity change from 0 to 24576 [ 820.930105][ T7427] FAT-fs (loop2): Unrecognized mount option "dos1xflotۖo\" or missing value [ 820.939591][ T7452] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 820.949749][ T7452] EXT4-fs (loop0): group descriptors corrupted! [ 820.950164][ T7451] loop1: detected capacity change from 0 to 24576 [ 820.973258][ T7466] loop4: detected capacity change from 0 to 6 [ 820.976057][ T7465] loop5: detected capacity change from 0 to 24576 [ 820.991583][ T7465] EXT4-fs warning (device loop5): ext4_multi_mount_protect:286: Invalid MMP block in superblock 14:12:22 executing program 2: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x3fb, 0x20, 0x70bd2c, 0x25dfdbff, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='y\x00\x00\x00']) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000400)) 14:12:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000190000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:22 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 821.027919][ T7451] EXT4-fs error (device loop1): ext4_orphan_get:1412: comm syz-executor.1: bad orphan inode 17 [ 821.038606][ T7451] ext4_test_bit(bit=16, block=4) = 1 [ 821.043914][ T7451] is_bad_inode(inode)=0 [ 821.048245][ T7451] NEXT_ORPHAN(inode)=80 [ 821.052490][ T7451] max_ino=32 [ 821.055693][ T7451] i_nlink=0 [ 821.062458][ T7466] loop4: detected capacity change from 0 to 6 14:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 821.084104][ T7489] loop3: detected capacity change from 0 to 6 [ 821.091934][ T7489] FAT-fs (loop3): unable to read boot sector (logical sector size = 4096) [ 821.095454][ T7490] loop0: detected capacity change from 0 to 24576 [ 821.105828][ T7451] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 821.116302][ T7490] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 14:12:22 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf403, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00005e010000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 821.126885][ T7451] ext4 filesystem being mounted at /root/syzkaller-testdir124890835/syzkaller.fBs7W1/2125/file0 supports timestamps until 2038 (0x7fffffff) [ 821.128085][ T7490] EXT4-fs (loop0): group descriptors corrupted! [ 821.159090][ T7496] loop5: detected capacity change from 0 to 24576 14:12:22 executing program 3: ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, &(0x7f0000000000)) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) creat(&(0x7f0000000080)='./file0\x00', 0x44) 14:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 821.185715][ T7496] EXT4-fs warning (device loop5): ext4_multi_mount_protect:286: Invalid MMP block in superblock 14:12:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000001a0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 821.225226][ T7507] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=7507 comm=syz-executor.2 [ 821.242840][ T7512] loop3: detected capacity change from 0 to 6 [ 821.260804][ T7508] loop4: detected capacity change from 0 to 6 [ 821.261444][ T7517] loop2: detected capacity change from 0 to 6 [ 821.285008][ T7512] FAT-fs (loop3): Directory bread(block 6) failed [ 821.286711][ T7517] FAT-fs (loop2): Unrecognized mount option "y" or missing value [ 821.308670][ T7524] loop5: detected capacity change from 0 to 24576 [ 821.316052][ T7523] loop0: detected capacity change from 0 to 24576 14:12:23 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfa03, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:23 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf503, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 821.331091][ T7508] loop4: detected capacity change from 0 to 6 [ 821.333545][ T7523] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 821.348832][ T7523] EXT4-fs (loop0): group descriptors corrupted! [ 821.356464][ T7524] EXT4-fs warning (device loop5): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 821.366703][ T7537] loop1: detected capacity change from 0 to 24576 [ 821.393010][ T7537] EXT4-fs error (device loop1): ext4_orphan_get:1412: comm syz-executor.1: bad orphan inode 17 [ 821.403428][ T7537] ext4_test_bit(bit=16, block=4) = 1 [ 821.408837][ T7537] is_bad_inode(inode)=0 [ 821.412996][ T7537] NEXT_ORPHAN(inode)=80 [ 821.417610][ T7537] max_ino=32 [ 821.420823][ T7537] i_nlink=0 [ 821.426310][ T7547] loop4: detected capacity change from 0 to 6 [ 821.434682][ T7537] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 821.457707][ T7537] ext4 filesystem being mounted at /root/syzkaller-testdir124890835/syzkaller.fBs7W1/2126/file0 supports timestamps until 2038 (0x7fffffff) 14:12:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 821.501610][ T7547] loop4: detected capacity change from 0 to 6 [ 821.547420][ T7556] loop3: detected capacity change from 0 to 125 [ 821.571573][ T7568] loop5: detected capacity change from 0 to 24576 [ 821.580198][ T7568] EXT4-fs warning (device loop5): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 821.978854][ T7517] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=7517 comm=syz-executor.2 [ 821.998865][ T7578] loop2: detected capacity change from 0 to 6 [ 822.005340][ T7578] FAT-fs (loop2): Unrecognized mount option "y" or missing value 14:12:24 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf603, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000001b0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00005f010000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:24 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x5, 0x600}], 0x0, &(0x7f0000000000)={[{@fat=@discard='discard'}]}) 14:12:24 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getdents(r0, &(0x7f0000000140)=""/117, 0x75) 14:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 822.683334][ T7591] loop5: detected capacity change from 0 to 24576 [ 822.683644][ T7592] loop3: detected capacity change from 0 to 6 [ 822.691102][ T7593] loop0: detected capacity change from 0 to 24576 [ 822.706419][ T7591] EXT4-fs warning (device loop5): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 822.717912][ T7600] loop2: detected capacity change from 0 to 6 [ 822.719376][ T7599] loop1: detected capacity change from 0 to 24576 [ 822.725298][ T7592] FAT-fs (loop3): Directory bread(block 6) failed [ 822.733765][ T7598] loop4: detected capacity change from 0 to 6 [ 822.751792][ T7600] FAT-fs (loop2): Directory bread(block 6) failed 14:12:24 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xf603, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:24 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e6661740502", 0xd}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 822.782210][ T7599] EXT4-fs error (device loop1): ext4_orphan_get:1412: comm syz-executor.1: bad orphan inode 17 [ 822.793198][ T7599] ext4_test_bit(bit=16, block=4) = 1 [ 822.798690][ T7599] is_bad_inode(inode)=0 [ 822.803023][ T7599] NEXT_ORPHAN(inode)=80 [ 822.807365][ T7599] max_ino=32 [ 822.810595][ T7599] i_nlink=0 [ 822.815955][ T7593] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 14:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000001c0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000060010000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 822.827367][ T7593] EXT4-fs (loop0): group descriptors corrupted! [ 822.837333][ T7598] loop4: detected capacity change from 0 to 6 [ 822.844139][ T7599] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 822.855309][ T7599] ext4 filesystem being mounted at /root/syzkaller-testdir124890835/syzkaller.fBs7W1/2127/file0 supports timestamps until 2038 (0x7fffffff) 14:12:24 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf703, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 822.931792][ T7635] loop5: detected capacity change from 0 to 24576 [ 822.943350][ T7637] loop0: detected capacity change from 0 to 24576 [ 822.943474][ T7636] loop2: detected capacity change from 0 to 123 [ 822.950036][ T7640] loop3: detected capacity change from 0 to 6 14:12:24 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 822.975939][ T7637] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 822.982981][ T7635] EXT4-fs warning (device loop5): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 822.986374][ T7637] EXT4-fs (loop0): group descriptors corrupted! [ 823.014698][ T7646] loop1: detected capacity change from 0 to 24576 [ 823.021332][ T7645] loop4: detected capacity change from 0 to 6 [ 823.044152][ T7640] FAT-fs (loop3): bogus number of reserved sectors [ 823.051918][ T7640] FAT-fs (loop3): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 823.061347][ T7640] FAT-fs (loop3): Can't find a valid FAT filesystem [ 823.068514][ T7646] EXT4-fs error (device loop1): ext4_orphan_get:1412: comm syz-executor.1: bad orphan inode 17 [ 823.079026][ T7646] ext4_test_bit(bit=16, block=4) = 1 [ 823.084400][ T7646] is_bad_inode(inode)=0 [ 823.088552][ T7646] NEXT_ORPHAN(inode)=80 14:12:24 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000001d0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 823.093321][ T7646] max_ino=32 [ 823.096566][ T7646] i_nlink=0 [ 823.112962][ T7645] loop4: detected capacity change from 0 to 6 [ 823.136060][ T7676] FAULT_INJECTION: forcing a failure. [ 823.136060][ T7676] name failslab, interval 1, probability 0, space 0, times 0 [ 823.142972][ T7646] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 823.148868][ T7676] CPU: 1 PID: 7676 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 823.161006][ T7646] ext4 filesystem being mounted at /root/syzkaller-testdir124890835/syzkaller.fBs7W1/2128/file0 supports timestamps until 2038 (0x7fffffff) 14:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000068010000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 823.170919][ T7676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.170935][ T7676] Call Trace: [ 823.170943][ T7676] dump_stack+0x137/0x19d [ 823.170968][ T7676] should_fail+0x23c/0x250 [ 823.209416][ T7676] __should_failslab+0x81/0x90 [ 823.214273][ T7676] ? __se_sys_memfd_create+0xfb/0x390 [ 823.220663][ T7676] should_failslab+0x5/0x20 [ 823.231352][ T7676] __kmalloc+0x66/0x360 [ 823.235679][ T7676] ? strnlen_user+0x137/0x1c0 [ 823.240380][ T7676] __se_sys_memfd_create+0xfb/0x390 [ 823.247266][ T7676] __x64_sys_memfd_create+0x2d/0x40 [ 823.252856][ T7676] do_syscall_64+0x34/0x50 [ 823.258011][ T7676] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 823.264306][ T7676] RIP: 0033:0x466459 [ 823.268251][ T7676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 823.288167][ T7676] RSP: 002b:00007f5c9b48bf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 823.297017][ T7676] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 823.304986][ T7676] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 [ 823.313630][ T7676] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 823.321587][ T7676] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 14:12:25 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:25 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf803, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 823.329690][ T7676] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 [ 823.350831][ T7677] loop0: detected capacity change from 0 to 24576 [ 823.363186][ T7677] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 823.373429][ T7677] EXT4-fs (loop0): group descriptors corrupted! [ 823.391198][ T7691] FAULT_INJECTION: forcing a failure. [ 823.391198][ T7691] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 823.404787][ T7691] CPU: 0 PID: 7691 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 823.410652][ T7688] loop5: detected capacity change from 0 to 24576 [ 823.415373][ T7691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.415388][ T7691] Call Trace: [ 823.415397][ T7691] dump_stack+0x137/0x19d [ 823.415420][ T7691] should_fail+0x23c/0x250 [ 823.428621][ T7697] FAULT_INJECTION: forcing a failure. [ 823.428621][ T7697] name failslab, interval 1, probability 0, space 0, times 0 [ 823.432028][ T7691] should_fail_usercopy+0x16/0x20 [ 823.432054][ T7691] _copy_from_user+0x1c/0xd0 [ 823.432073][ T7691] __se_sys_memfd_create+0x137/0x390 [ 823.432092][ T7691] __x64_sys_memfd_create+0x2d/0x40 [ 823.477866][ T7691] do_syscall_64+0x34/0x50 [ 823.482371][ T7691] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 823.488450][ T7691] RIP: 0033:0x466459 [ 823.492344][ T7691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 823.512413][ T7691] RSP: 002b:00007f5c9b48bf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 823.521060][ T7691] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 823.529136][ T7691] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 [ 823.537111][ T7691] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 823.545236][ T7691] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 823.553416][ T7691] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 [ 823.561418][ T7697] CPU: 1 PID: 7697 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 823.572306][ T7697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.582378][ T7697] Call Trace: [ 823.585766][ T7697] dump_stack+0x137/0x19d [ 823.590116][ T7697] should_fail+0x23c/0x250 [ 823.594547][ T7697] __should_failslab+0x81/0x90 [ 823.599380][ T7697] ? __se_sys_memfd_create+0xfb/0x390 [ 823.604746][ T7697] should_failslab+0x5/0x20 [ 823.609258][ T7697] __kmalloc+0x66/0x360 [ 823.613411][ T7697] ? strnlen_user+0x137/0x1c0 [ 823.618177][ T7697] __se_sys_memfd_create+0xfb/0x390 [ 823.623479][ T7697] __x64_sys_memfd_create+0x2d/0x40 [ 823.628733][ T7697] do_syscall_64+0x34/0x50 [ 823.633344][ T7697] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 823.639819][ T7697] RIP: 0033:0x466459 [ 823.643726][ T7697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 823.663880][ T7697] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 823.672622][ T7697] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 823.680601][ T7697] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 [ 823.688940][ T7697] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 823.696918][ T7697] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 823.704987][ T7697] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 [ 823.721939][ T7688] EXT4-fs warning (device loop5): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 823.732569][ T7698] loop1: detected capacity change from 0 to 24576 14:12:25 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000001e0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 823.739229][ T7695] loop4: detected capacity change from 0 to 6 14:12:25 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 823.769451][ T7698] EXT4-fs error (device loop1): ext4_orphan_get:1412: comm syz-executor.1: bad orphan inode 17 [ 823.779957][ T7698] ext4_test_bit(bit=16, block=4) = 1 [ 823.785260][ T7698] is_bad_inode(inode)=0 [ 823.790286][ T7698] NEXT_ORPHAN(inode)=80 [ 823.794812][ T7698] max_ino=32 [ 823.798053][ T7698] i_nlink=0 [ 823.804447][ T7711] FAULT_INJECTION: forcing a failure. [ 823.804447][ T7711] name failslab, interval 1, probability 0, space 0, times 0 [ 823.817804][ T7711] CPU: 1 PID: 7711 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 823.820873][ T7698] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 823.827906][ T7711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.827923][ T7711] Call Trace: [ 823.827931][ T7711] dump_stack+0x137/0x19d [ 823.839530][ T7698] ext4 filesystem being mounted at /root/syzkaller-testdir124890835/syzkaller.fBs7W1/2129/file0 supports timestamps until 2038 (0x7fffffff) [ 823.849379][ T7711] should_fail+0x23c/0x250 [ 823.849431][ T7711] ? shmem_alloc_inode+0x22/0x30 [ 823.880548][ T7711] __should_failslab+0x81/0x90 [ 823.885322][ T7711] ? shmem_match+0xa0/0xa0 [ 823.889755][ T7711] should_failslab+0x5/0x20 [ 823.894355][ T7711] kmem_cache_alloc+0x46/0x300 [ 823.899130][ T7711] ? fsnotify_perm+0x59/0x2e0 [ 823.903977][ T7711] ? shmem_match+0xa0/0xa0 [ 823.908441][ T7711] shmem_alloc_inode+0x22/0x30 [ 823.913220][ T7711] new_inode_pseudo+0x38/0x1c0 [ 823.917995][ T7711] new_inode+0x21/0x120 [ 823.922157][ T7711] shmem_get_inode+0xa1/0x480 [ 823.926860][ T7711] __shmem_file_setup+0xf1/0x1d0 [ 823.931949][ T7711] shmem_file_setup+0x37/0x40 [ 823.936640][ T7711] __se_sys_memfd_create+0x1eb/0x390 [ 823.941932][ T7711] __x64_sys_memfd_create+0x2d/0x40 [ 823.947130][ T7711] do_syscall_64+0x34/0x50 [ 823.951585][ T7711] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 823.957561][ T7711] RIP: 0033:0x466459 [ 823.961466][ T7711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 823.981696][ T7711] RSP: 002b:00007f5c9b48bf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 823.990186][ T7711] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 823.998185][ T7711] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 [ 824.006267][ T7711] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff 14:12:25 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 824.014311][ T7711] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 824.022279][ T7711] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 [ 824.044264][ T7715] loop0: detected capacity change from 0 to 24576 [ 824.066675][ T7695] loop4: detected capacity change from 0 to 6 [ 824.090914][ T7715] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 824.101088][ T7715] EXT4-fs (loop0): group descriptors corrupted! [ 824.108764][ T7727] FAULT_INJECTION: forcing a failure. 14:12:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000004020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 824.108764][ T7727] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 824.121843][ T7727] CPU: 0 PID: 7727 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 824.132720][ T7727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.133395][ T7729] FAULT_INJECTION: forcing a failure. [ 824.133395][ T7729] name failslab, interval 1, probability 0, space 0, times 0 [ 824.142795][ T7727] Call Trace: [ 824.142808][ T7727] dump_stack+0x137/0x19d [ 824.142832][ T7727] should_fail+0x23c/0x250 [ 824.142850][ T7727] should_fail_usercopy+0x16/0x20 [ 824.174568][ T7727] _copy_from_user+0x1c/0xd0 [ 824.179364][ T7727] __se_sys_memfd_create+0x137/0x390 [ 824.184669][ T7727] __x64_sys_memfd_create+0x2d/0x40 [ 824.189887][ T7727] do_syscall_64+0x34/0x50 [ 824.194436][ T7727] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 824.200369][ T7727] RIP: 0033:0x466459 [ 824.204272][ T7727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 824.224085][ T7727] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 824.232962][ T7727] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 824.240952][ T7727] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 [ 824.249029][ T7727] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 824.257108][ T7727] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 824.270372][ T7727] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 [ 824.280977][ T7729] CPU: 1 PID: 7729 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 824.291074][ T7729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.302230][ T7729] Call Trace: [ 824.306267][ T7729] dump_stack+0x137/0x19d [ 824.311347][ T7729] should_fail+0x23c/0x250 [ 824.315768][ T7729] ? security_inode_alloc+0x30/0x180 14:12:26 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:26 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf903, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 824.321146][ T7729] __should_failslab+0x81/0x90 [ 824.326115][ T7729] should_failslab+0x5/0x20 [ 824.330726][ T7729] kmem_cache_alloc+0x46/0x300 [ 824.335696][ T7729] security_inode_alloc+0x30/0x180 [ 824.341068][ T7729] inode_init_always+0x20b/0x420 [ 824.346098][ T7729] ? shmem_match+0xa0/0xa0 [ 824.350565][ T7729] new_inode_pseudo+0x73/0x1c0 [ 824.355341][ T7729] new_inode+0x21/0x120 [ 824.359568][ T7729] shmem_get_inode+0xa1/0x480 [ 824.364272][ T7729] __shmem_file_setup+0xf1/0x1d0 [ 824.369229][ T7729] shmem_file_setup+0x37/0x40 [ 824.373908][ T7729] __se_sys_memfd_create+0x1eb/0x390 [ 824.379252][ T7729] __x64_sys_memfd_create+0x2d/0x40 [ 824.384482][ T7729] do_syscall_64+0x34/0x50 [ 824.389178][ T7729] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 824.395178][ T7729] RIP: 0033:0x466459 [ 824.399336][ T7729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 824.440683][ T7729] RSP: 002b:00007f5c9b48bf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 824.449107][ T7729] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 824.457085][ T7729] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 [ 824.465102][ T7729] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 824.473086][ T7729] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 824.481328][ T7729] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 [ 824.490348][ T7730] loop5: detected capacity change from 0 to 24576 [ 824.501833][ T7730] EXT4-fs (loop5): unsupported descriptor size 0 [ 824.516995][ T7740] FAULT_INJECTION: forcing a failure. 14:12:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000001f0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:26 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 824.516995][ T7740] name failslab, interval 1, probability 0, space 0, times 0 [ 824.529836][ T7740] CPU: 0 PID: 7740 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 824.539912][ T7740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.549973][ T7740] Call Trace: [ 824.553258][ T7740] dump_stack+0x137/0x19d [ 824.557686][ T7740] should_fail+0x23c/0x250 [ 824.562107][ T7740] ? shmem_alloc_inode+0x22/0x30 [ 824.567083][ T7740] __should_failslab+0x81/0x90 [ 824.571938][ T7740] ? shmem_match+0xa0/0xa0 [ 824.576361][ T7740] should_failslab+0x5/0x20 [ 824.581186][ T7740] kmem_cache_alloc+0x46/0x300 [ 824.585982][ T7740] ? fsnotify_perm+0x59/0x2e0 [ 824.590668][ T7740] ? shmem_match+0xa0/0xa0 [ 824.595120][ T7740] shmem_alloc_inode+0x22/0x30 [ 824.599882][ T7740] new_inode_pseudo+0x38/0x1c0 [ 824.604644][ T7740] new_inode+0x21/0x120 [ 824.608850][ T7740] shmem_get_inode+0xa1/0x480 [ 824.613567][ T7740] __shmem_file_setup+0xf1/0x1d0 [ 824.619220][ T7740] shmem_file_setup+0x37/0x40 [ 824.623905][ T7740] __se_sys_memfd_create+0x1eb/0x390 [ 824.629642][ T7740] __x64_sys_memfd_create+0x2d/0x40 [ 824.637852][ T7740] do_syscall_64+0x34/0x50 [ 824.642425][ T7740] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 824.648578][ T7740] RIP: 0033:0x466459 [ 824.652483][ T7740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 824.677765][ T7740] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 824.700885][ T7740] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 824.708845][ T7740] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 14:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:26 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 824.717076][ T7740] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 824.725061][ T7740] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 824.733144][ T7740] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 [ 824.752620][ T7741] loop4: detected capacity change from 0 to 6 [ 824.802857][ T7751] FAULT_INJECTION: forcing a failure. [ 824.802857][ T7751] name failslab, interval 1, probability 0, space 0, times 0 [ 824.816579][ T7751] CPU: 1 PID: 7751 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 824.825899][ T7759] FAULT_INJECTION: forcing a failure. [ 824.825899][ T7759] name failslab, interval 1, probability 0, space 0, times 0 [ 824.826670][ T7751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.850120][ T7751] Call Trace: [ 824.853418][ T7751] dump_stack+0x137/0x19d [ 824.857930][ T7751] should_fail+0x23c/0x250 [ 824.862353][ T7751] ? __d_alloc+0x36/0x370 [ 824.866723][ T7751] __should_failslab+0x81/0x90 [ 824.871555][ T7751] should_failslab+0x5/0x20 [ 824.876172][ T7751] kmem_cache_alloc+0x46/0x300 [ 824.880950][ T7751] ? __init_rwsem+0x59/0x70 [ 824.885698][ T7751] __d_alloc+0x36/0x370 [ 824.889937][ T7751] ? current_time+0xdb/0x190 [ 824.894652][ T7751] d_alloc_pseudo+0x1a/0x50 [ 824.899177][ T7751] alloc_file_pseudo+0x63/0x130 [ 824.904130][ T7751] __shmem_file_setup+0x14c/0x1d0 [ 824.909767][ T7751] shmem_file_setup+0x37/0x40 [ 824.914920][ T7751] __se_sys_memfd_create+0x1eb/0x390 [ 824.920305][ T7751] __x64_sys_memfd_create+0x2d/0x40 [ 824.925695][ T7751] do_syscall_64+0x34/0x50 [ 824.930141][ T7751] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 824.936217][ T7751] RIP: 0033:0x466459 [ 824.940116][ T7751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 824.960455][ T7751] RSP: 002b:00007f5c9b48bf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 824.968911][ T7751] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 824.976998][ T7751] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 [ 824.985079][ T7751] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 824.993057][ T7751] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 14:12:26 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xfa03, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:26 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 825.001318][ T7751] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 [ 825.009308][ T7759] CPU: 0 PID: 7759 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 825.019397][ T7759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.030325][ T7759] Call Trace: [ 825.032720][ T7752] loop1: detected capacity change from 0 to 24576 [ 825.033763][ T7759] dump_stack+0x137/0x19d [ 825.044610][ T7759] should_fail+0x23c/0x250 [ 825.049136][ T7759] ? security_inode_alloc+0x30/0x180 [ 825.053103][ T7762] loop0: detected capacity change from 0 to 24576 [ 825.054565][ T7759] __should_failslab+0x81/0x90 [ 825.054593][ T7759] should_failslab+0x5/0x20 [ 825.064171][ T7762] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 825.066636][ T7759] kmem_cache_alloc+0x46/0x300 [ 825.071170][ T7762] EXT4-fs (loop0): group descriptors corrupted! [ 825.081228][ T7759] security_inode_alloc+0x30/0x180 [ 825.091448][ T7758] loop5: detected capacity change from 0 to 24576 [ 825.092480][ T7759] inode_init_always+0x20b/0x420 [ 825.106097][ T7758] EXT4-fs (loop5): unsupported descriptor size 0 [ 825.109035][ T7759] ? shmem_match+0xa0/0xa0 [ 825.109065][ T7759] new_inode_pseudo+0x73/0x1c0 [ 825.124984][ T7759] new_inode+0x21/0x120 [ 825.129179][ T7759] shmem_get_inode+0xa1/0x480 [ 825.134034][ T7759] __shmem_file_setup+0xf1/0x1d0 [ 825.135296][ T7775] FAULT_INJECTION: forcing a failure. [ 825.135296][ T7775] name failslab, interval 1, probability 0, space 0, times 0 [ 825.139167][ T7759] shmem_file_setup+0x37/0x40 [ 825.157055][ T7759] __se_sys_memfd_create+0x1eb/0x390 [ 825.162451][ T7759] __x64_sys_memfd_create+0x2d/0x40 [ 825.167659][ T7759] do_syscall_64+0x34/0x50 [ 825.172739][ T7759] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 825.178890][ T7759] RIP: 0033:0x466459 [ 825.182903][ T7759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 825.203158][ T7759] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 825.211697][ T7759] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 825.219673][ T7759] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 [ 825.227980][ T7759] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 825.235959][ T7759] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 825.243954][ T7759] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 14:12:26 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 825.252330][ T7775] CPU: 1 PID: 7775 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 825.261165][ T7752] EXT4-fs (loop1): failed to initialize system zone (-117) [ 825.263026][ T7775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.263040][ T7775] Call Trace: [ 825.263048][ T7775] dump_stack+0x137/0x19d [ 825.270738][ T7752] EXT4-fs (loop1): mount failed [ 825.280597][ T7775] should_fail+0x23c/0x250 [ 825.280623][ T7775] ? __alloc_file+0x2e/0x1a0 [ 825.280664][ T7775] __should_failslab+0x81/0x90 [ 825.280684][ T7775] should_failslab+0x5/0x20 [ 825.311885][ T7775] kmem_cache_alloc+0x46/0x300 [ 825.316851][ T7775] ? inode_doinit_with_dentry+0x36f/0x940 [ 825.322779][ T7775] __alloc_file+0x2e/0x1a0 [ 825.327206][ T7775] alloc_empty_file+0xcd/0x1c0 [ 825.331996][ T7775] alloc_file+0x3a/0x280 [ 825.336298][ T7775] alloc_file_pseudo+0xe2/0x130 [ 825.341228][ T7775] __shmem_file_setup+0x14c/0x1d0 [ 825.346239][ T7775] shmem_file_setup+0x37/0x40 [ 825.350987][ T7775] __se_sys_memfd_create+0x1eb/0x390 [ 825.356257][ T7775] __x64_sys_memfd_create+0x2d/0x40 [ 825.361555][ T7775] do_syscall_64+0x34/0x50 [ 825.365960][ T7775] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 825.371929][ T7775] RIP: 0033:0x466459 [ 825.375822][ T7775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 825.395676][ T7775] RSP: 002b:00007f5c9b48bf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 14:12:27 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 825.404425][ T7775] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 825.412640][ T7775] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 [ 825.420599][ T7775] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 825.428664][ T7775] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 825.436911][ T7775] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 14:12:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000200000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 825.500403][ T7774] loop4: detected capacity change from 0 to 6 [ 825.502211][ T7782] FAULT_INJECTION: forcing a failure. [ 825.502211][ T7782] name failslab, interval 1, probability 0, space 0, times 0 [ 825.519203][ T7782] CPU: 1 PID: 7782 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 825.529356][ T7782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.539427][ T7782] Call Trace: [ 825.542750][ T7782] dump_stack+0x137/0x19d [ 825.547113][ T7782] should_fail+0x23c/0x250 [ 825.551211][ T7786] FAULT_INJECTION: forcing a failure. [ 825.551211][ T7786] name failslab, interval 1, probability 0, space 0, times 0 [ 825.551763][ T7782] ? __d_alloc+0x36/0x370 [ 825.568962][ T7782] __should_failslab+0x81/0x90 [ 825.574000][ T7782] should_failslab+0x5/0x20 [ 825.578525][ T7782] kmem_cache_alloc+0x46/0x300 [ 825.583366][ T7782] ? __init_rwsem+0x59/0x70 [ 825.587905][ T7782] __d_alloc+0x36/0x370 [ 825.592109][ T7782] ? current_time+0xdb/0x190 [ 825.596726][ T7782] d_alloc_pseudo+0x1a/0x50 [ 825.601236][ T7782] alloc_file_pseudo+0x63/0x130 [ 825.606096][ T7782] __shmem_file_setup+0x14c/0x1d0 [ 825.611129][ T7782] shmem_file_setup+0x37/0x40 [ 825.616002][ T7782] __se_sys_memfd_create+0x1eb/0x390 [ 825.621313][ T7782] __x64_sys_memfd_create+0x2d/0x40 [ 825.626648][ T7782] do_syscall_64+0x34/0x50 [ 825.631101][ T7782] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 825.637305][ T7782] RIP: 0033:0x466459 [ 825.641249][ T7782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 825.662692][ T7782] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 825.671124][ T7782] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 825.679193][ T7782] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 [ 825.687533][ T7782] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 825.695516][ T7782] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 825.703505][ T7782] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 [ 825.711575][ T7786] CPU: 0 PID: 7786 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 825.721885][ T7786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.731943][ T7786] Call Trace: [ 825.735227][ T7786] dump_stack+0x137/0x19d [ 825.739807][ T7786] should_fail+0x23c/0x250 [ 825.744323][ T7786] ? security_file_alloc+0x30/0x190 [ 825.749558][ T7786] __should_failslab+0x81/0x90 [ 825.754343][ T7786] should_failslab+0x5/0x20 [ 825.759156][ T7786] kmem_cache_alloc+0x46/0x300 [ 825.764381][ T7786] ? __alloc_file+0x2e/0x1a0 [ 825.764859][ T7789] loop0: detected capacity change from 0 to 24576 [ 825.769088][ T7786] security_file_alloc+0x30/0x190 [ 825.777671][ T7789] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 825.780552][ T7786] __alloc_file+0x83/0x1a0 [ 825.790702][ T7789] EXT4-fs (loop0): group descriptors corrupted! 14:12:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000030000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:27 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 825.795269][ T7786] alloc_empty_file+0xcd/0x1c0 [ 825.806376][ T7786] alloc_file+0x3a/0x280 [ 825.810625][ T7786] alloc_file_pseudo+0xe2/0x130 [ 825.815503][ T7786] __shmem_file_setup+0x14c/0x1d0 [ 825.820545][ T7786] shmem_file_setup+0x37/0x40 [ 825.826464][ T7786] __se_sys_memfd_create+0x1eb/0x390 [ 825.831779][ T7786] __x64_sys_memfd_create+0x2d/0x40 [ 825.837059][ T7786] do_syscall_64+0x34/0x50 [ 825.841576][ T7786] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 825.843011][ T7798] FAULT_INJECTION: forcing a failure. [ 825.843011][ T7798] name failslab, interval 1, probability 0, space 0, times 0 [ 825.847501][ T7786] RIP: 0033:0x466459 [ 825.847520][ T7786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 825.847537][ T7786] RSP: 002b:00007f5c9b48bf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 825.893275][ T7786] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 825.901474][ T7786] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 [ 825.909452][ T7786] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 825.917434][ T7786] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 825.925418][ T7786] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 [ 825.933533][ T7798] CPU: 1 PID: 7798 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 825.943761][ T7798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:12:27 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 825.953952][ T7798] Call Trace: [ 825.957290][ T7798] dump_stack+0x137/0x19d [ 825.961801][ T7798] should_fail+0x23c/0x250 [ 825.966232][ T7798] ? __alloc_file+0x2e/0x1a0 [ 825.971014][ T7798] __should_failslab+0x81/0x90 [ 825.975790][ T7798] should_failslab+0x5/0x20 [ 825.980319][ T7798] kmem_cache_alloc+0x46/0x300 [ 825.985203][ T7798] ? inode_doinit_with_dentry+0x36f/0x940 [ 825.991031][ T7798] __alloc_file+0x2e/0x1a0 [ 825.995449][ T7798] alloc_empty_file+0xcd/0x1c0 [ 826.000590][ T7798] alloc_file+0x3a/0x280 [ 826.004920][ T7798] alloc_file_pseudo+0xe2/0x130 [ 826.009900][ T7798] __shmem_file_setup+0x14c/0x1d0 [ 826.015045][ T7798] shmem_file_setup+0x37/0x40 [ 826.019731][ T7798] __se_sys_memfd_create+0x1eb/0x390 [ 826.025017][ T7798] __x64_sys_memfd_create+0x2d/0x40 [ 826.030506][ T7798] do_syscall_64+0x34/0x50 [ 826.035108][ T7798] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 826.041055][ T7798] RIP: 0033:0x466459 [ 826.044943][ T7798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 826.065137][ T7798] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 826.074888][ T7798] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 826.082958][ T7798] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 [ 826.091381][ T7798] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff 14:12:27 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xfb03, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:27 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 826.099398][ T7798] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 826.107976][ T7798] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 [ 826.135276][ T7799] loop5: detected capacity change from 0 to 24576 [ 826.144368][ T7800] loop1: detected capacity change from 0 to 24576 [ 826.145584][ T7808] FAULT_INJECTION: forcing a failure. [ 826.145584][ T7808] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 826.164215][ T7808] CPU: 1 PID: 7808 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 826.167477][ T7799] EXT4-fs (loop5): unsupported descriptor size 0 [ 826.177103][ T7808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.177119][ T7808] Call Trace: [ 826.177127][ T7808] dump_stack+0x137/0x19d [ 826.177150][ T7808] should_fail+0x23c/0x250 [ 826.177165][ T7808] __alloc_pages_nodemask+0xe7/0x310 [ 826.211984][ T7808] alloc_pages_vma+0x3c3/0x5e0 [ 826.216910][ T7808] shmem_getpage_gfp+0x980/0x1410 [ 826.221966][ T7808] ? mls_context_isvalid+0x76/0x1e0 [ 826.227253][ T7808] shmem_write_begin+0x7e/0x100 [ 826.232124][ T7808] generic_perform_write+0x196/0x3a0 [ 826.237519][ T7808] ? file_update_time+0x1bd/0x3e0 [ 826.241743][ T7817] FAULT_INJECTION: forcing a failure. [ 826.241743][ T7817] name failslab, interval 1, probability 0, space 0, times 0 [ 826.242580][ T7808] __generic_file_write_iter+0x161/0x300 [ 826.264234][ T7808] ? generic_write_checks+0x250/0x290 [ 826.269627][ T7808] generic_file_write_iter+0x75/0x130 [ 826.275180][ T7808] vfs_write+0x69d/0x770 [ 826.279591][ T7808] __x64_sys_pwrite64+0xf5/0x150 [ 826.284543][ T7808] do_syscall_64+0x34/0x50 [ 826.288973][ T7808] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 826.295226][ T7808] RIP: 0033:0x4195f7 [ 826.299409][ T7808] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 826.319031][ T7808] RSP: 002b:00007f5c9b48bf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 826.327489][ T7808] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 826.335554][ T7808] RDX: 0000000000000017 RSI: 00000000200003c0 RDI: 0000000000000004 [ 826.343798][ T7808] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff 14:12:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000010200000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 826.351838][ T7808] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 826.359845][ T7808] R13: 0000000000000004 R14: 0000000020000280 R15: 0000000000000000 [ 826.367867][ T7817] CPU: 0 PID: 7817 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 826.379899][ T7817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.389963][ T7817] Call Trace: [ 826.393245][ T7817] dump_stack+0x137/0x19d [ 826.398268][ T7817] should_fail+0x23c/0x250 [ 826.402895][ T7817] ? __alloc_file+0x2e/0x1a0 [ 826.407597][ T7817] __should_failslab+0x81/0x90 [ 826.412581][ T7817] should_failslab+0x5/0x20 [ 826.417300][ T7817] kmem_cache_alloc+0x46/0x300 [ 826.422055][ T7817] ? inode_doinit_with_dentry+0x36f/0x940 [ 826.428136][ T7817] __alloc_file+0x2e/0x1a0 [ 826.432549][ T7817] alloc_empty_file+0xcd/0x1c0 [ 826.437522][ T7817] alloc_file+0x3a/0x280 [ 826.441760][ T7817] alloc_file_pseudo+0xe2/0x130 [ 826.447296][ T7817] __shmem_file_setup+0x14c/0x1d0 [ 826.452730][ T7817] shmem_file_setup+0x37/0x40 [ 826.457480][ T7817] __se_sys_memfd_create+0x1eb/0x390 [ 826.462784][ T7817] __x64_sys_memfd_create+0x2d/0x40 [ 826.468294][ T7817] do_syscall_64+0x34/0x50 [ 826.473668][ T7817] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 826.479773][ T7817] RIP: 0033:0x466459 [ 826.483657][ T7817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 826.503406][ T7817] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 826.512795][ T7817] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466459 [ 826.520867][ T7817] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00000000004beba8 [ 826.528841][ T7817] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 826.536902][ T7817] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 826.544935][ T7817] R13: 0000000020000100 R14: 0000000000000c00 R15: 0000000020000040 14:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:28 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 826.578658][ T7800] EXT4-fs (loop1): failed to initialize system zone (-117) [ 826.586179][ T7800] EXT4-fs (loop1): mount failed [ 826.592202][ T7818] loop4: detected capacity change from 0 to 6 [ 826.598398][ T7808] loop2: detected capacity change from 0 to 6 [ 826.606106][ T7825] loop0: detected capacity change from 0 to 24576 14:12:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000c1030000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 826.638728][ T7818] loop4: detected capacity change from 0 to 6 [ 826.645198][ T7808] FAT-fs (loop2): bogus number of reserved sectors [ 826.651790][ T7808] FAT-fs (loop2): Can't find a valid FAT filesystem [ 826.667020][ T7825] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 826.677189][ T7825] EXT4-fs (loop0): group descriptors corrupted! 14:12:28 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xff0f, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 826.703778][ T7839] loop5: detected capacity change from 0 to 24576 [ 826.715499][ T7844] FAULT_INJECTION: forcing a failure. [ 826.715499][ T7844] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 826.728840][ T7844] CPU: 1 PID: 7844 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 826.738969][ T7844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.748899][ T7848] loop1: detected capacity change from 0 to 24576 [ 826.749206][ T7844] Call Trace: [ 826.749216][ T7844] dump_stack+0x137/0x19d [ 826.763909][ T7844] should_fail+0x23c/0x250 [ 826.767240][ T7853] loop4: detected capacity change from 0 to 6 [ 826.768358][ T7844] __alloc_pages_nodemask+0xe7/0x310 [ 826.768388][ T7844] alloc_pages_vma+0x3c3/0x5e0 [ 826.784647][ T7844] shmem_getpage_gfp+0x980/0x1410 [ 826.789746][ T7844] ? mls_context_isvalid+0x76/0x1e0 [ 826.795208][ T7844] shmem_write_begin+0x7e/0x100 14:12:28 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 826.800350][ T7844] generic_perform_write+0x196/0x3a0 [ 826.805911][ T7844] ? file_update_time+0x1bd/0x3e0 [ 826.809814][ T7839] EXT4-fs (loop5): unsupported descriptor size 0 [ 826.811403][ T7844] __generic_file_write_iter+0x161/0x300 [ 826.811430][ T7844] ? generic_write_checks+0x250/0x290 [ 826.828836][ T7844] generic_file_write_iter+0x75/0x130 [ 826.834226][ T7844] vfs_write+0x69d/0x770 [ 826.838678][ T7844] __x64_sys_pwrite64+0xf5/0x150 [ 826.844146][ T7844] do_syscall_64+0x34/0x50 [ 826.844180][ T7857] FAULT_INJECTION: forcing a failure. [ 826.844180][ T7857] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 826.848597][ T7844] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 826.848627][ T7844] RIP: 0033:0x4195f7 [ 826.848641][ T7844] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 826.891371][ T7844] RSP: 002b:00007f236f4c2f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 826.899848][ T7844] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 826.907822][ T7844] RDX: 0000000000000001 RSI: 00000000200003c0 RDI: 0000000000000004 [ 826.915826][ T7844] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 826.923800][ T7844] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 826.931944][ T7844] R13: 0000000000000004 R14: 0000000020000280 R15: 0000000000000000 [ 826.940131][ T7857] CPU: 0 PID: 7857 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 14:12:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000210000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 826.950338][ T7857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.960415][ T7857] Call Trace: [ 826.963705][ T7857] dump_stack+0x137/0x19d [ 826.968047][ T7857] should_fail+0x23c/0x250 [ 826.972461][ T7857] should_fail_usercopy+0x16/0x20 [ 826.972564][ T7844] loop3: detected capacity change from 0 to 6 [ 826.977549][ T7857] iov_iter_copy_from_user_atomic+0x2aa/0x790 [ 826.989922][ T7857] ? shmem_write_begin+0x7e/0x100 [ 826.994958][ T7857] generic_perform_write+0x1e4/0x3a0 [ 827.000432][ T7857] ? file_update_time+0x1bd/0x3e0 [ 827.005484][ T7857] __generic_file_write_iter+0x161/0x300 [ 827.011129][ T7857] ? generic_write_checks+0x250/0x290 [ 827.016523][ T7857] generic_file_write_iter+0x75/0x130 [ 827.022005][ T7857] vfs_write+0x69d/0x770 [ 827.027688][ T7857] __x64_sys_pwrite64+0xf5/0x150 [ 827.032776][ T7857] do_syscall_64+0x34/0x50 [ 827.038055][ T7857] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 827.043966][ T7857] RIP: 0033:0x4195f7 [ 827.049026][ T7857] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 827.069775][ T7857] RSP: 002b:00007f5c9b48bf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 827.078215][ T7857] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 827.086306][ T7857] RDX: 0000000000000017 RSI: 00000000200003c0 RDI: 0000000000000004 [ 827.094360][ T7857] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 827.102386][ T7857] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 827.110473][ T7857] R13: 0000000000000004 R14: 0000000020000280 R15: 0000000000000000 [ 827.122421][ T7848] EXT4-fs (loop1): failed to initialize system zone (-117) [ 827.135016][ T7848] EXT4-fs (loop1): mount failed [ 827.141551][ T7857] loop2: detected capacity change from 0 to 6 14:12:28 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 827.161181][ T7862] loop0: detected capacity change from 0 to 24576 [ 827.168071][ T7853] loop4: detected capacity change from 0 to 6 [ 827.177668][ T7878] loop5: detected capacity change from 0 to 24576 [ 827.184142][ T7857] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 827.185801][ T7862] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 827.201835][ T7883] FAULT_INJECTION: forcing a failure. [ 827.201835][ T7883] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 827.204034][ T7862] EXT4-fs (loop0): group descriptors corrupted! [ 827.217673][ T7883] CPU: 1 PID: 7883 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 827.234771][ T7883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.245122][ T7883] Call Trace: [ 827.248450][ T7883] dump_stack+0x137/0x19d [ 827.252906][ T7883] should_fail+0x23c/0x250 14:12:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000ce030000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:28 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x40000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 827.257326][ T7883] should_fail_usercopy+0x16/0x20 [ 827.263671][ T7883] iov_iter_copy_from_user_atomic+0x2aa/0x790 [ 827.269942][ T7883] ? shmem_write_begin+0x7e/0x100 [ 827.275417][ T7883] generic_perform_write+0x1e4/0x3a0 [ 827.280811][ T7883] ? file_update_time+0x1bd/0x3e0 [ 827.285887][ T7883] __generic_file_write_iter+0x161/0x300 [ 827.291660][ T7883] ? generic_write_checks+0x250/0x290 [ 827.297078][ T7883] generic_file_write_iter+0x75/0x130 [ 827.302460][ T7883] vfs_write+0x69d/0x770 [ 827.306718][ T7883] __x64_sys_pwrite64+0xf5/0x150 [ 827.311838][ T7883] do_syscall_64+0x34/0x50 [ 827.316271][ T7883] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 827.322582][ T7883] RIP: 0033:0x4195f7 [ 827.326559][ T7883] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 827.347526][ T7883] RSP: 002b:00007f236f4c2f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 827.356007][ T7883] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 827.364018][ T7883] RDX: 0000000000000001 RSI: 00000000200003c0 RDI: 0000000000000004 [ 827.371993][ T7883] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 827.380755][ T7883] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 827.388739][ T7883] R13: 0000000000000004 R14: 0000000020000280 R15: 0000000000000000 [ 827.398104][ T7878] EXT4-fs (loop5): unsupported descriptor size 0 14:12:29 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000220000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 827.411163][ T7890] loop4: detected capacity change from 0 to 6 [ 827.436586][ T7897] loop1: detected capacity change from 0 to 24576 [ 827.443318][ T7883] loop3: detected capacity change from 0 to 6 [ 827.469794][ T7890] loop4: detected capacity change from 0 to 6 [ 827.485522][ T7914] FAULT_INJECTION: forcing a failure. [ 827.485522][ T7914] name failslab, interval 1, probability 0, space 0, times 0 [ 827.489092][ T7897] EXT4-fs (loop1): failed to initialize system zone (-117) [ 827.498200][ T7914] CPU: 0 PID: 7914 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 827.505491][ T7897] EXT4-fs (loop1): mount failed [ 827.515462][ T7914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.515479][ T7914] Call Trace: [ 827.515487][ T7914] dump_stack+0x137/0x19d [ 827.515511][ T7914] should_fail+0x23c/0x250 [ 827.515526][ T7914] ? getname_flags+0x84/0x3d0 [ 827.515547][ T7914] __should_failslab+0x81/0x90 [ 827.553518][ T7914] should_failslab+0x5/0x20 [ 827.558034][ T7914] kmem_cache_alloc+0x46/0x300 [ 827.562801][ T7914] getname_flags+0x84/0x3d0 [ 827.567536][ T7914] ? vfs_write+0x50c/0x770 [ 827.572047][ T7914] getname+0x15/0x20 [ 827.575944][ T7914] do_sys_openat2+0x5b/0x250 [ 827.580648][ T7914] __x64_sys_openat+0xef/0x110 [ 827.585679][ T7914] do_syscall_64+0x34/0x50 [ 827.590111][ T7914] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 827.596454][ T7914] RIP: 0033:0x419544 [ 827.600690][ T7914] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 827.620738][ T7914] RSP: 002b:00007f5c9b48bed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 827.629255][ T7914] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 827.637252][ T7914] RDX: 0000000000000002 RSI: 00007f5c9b48c000 RDI: 00000000ffffff9c [ 827.645227][ T7914] RBP: 00007f5c9b48c000 R08: 0000000000000000 R09: ffffffffffffffff [ 827.653207][ T7914] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 827.661299][ T7914] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 14:12:29 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xe0000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:29 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000002040000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 827.676266][ T7911] loop5: detected capacity change from 0 to 24576 [ 827.697648][ T7911] EXT4-fs (loop5): unsupported descriptor size 0 [ 827.706408][ T7915] loop0: detected capacity change from 0 to 24576 14:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:29 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 827.736929][ T7915] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 827.747252][ T7915] EXT4-fs (loop0): group descriptors corrupted! [ 827.769687][ T7932] loop1: detected capacity change from 0 to 24576 [ 827.790900][ T7932] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 827.793317][ T7934] loop4: detected capacity change from 0 to 6 [ 827.801433][ T7932] EXT4-fs (loop1): group descriptors corrupted! [ 827.809391][ T7935] FAULT_INJECTION: forcing a failure. [ 827.809391][ T7935] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 827.827216][ T7935] CPU: 1 PID: 7935 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 827.834806][ T7942] FAULT_INJECTION: forcing a failure. [ 827.834806][ T7942] name failslab, interval 1, probability 0, space 0, times 0 [ 827.838951][ T7935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.838965][ T7935] Call Trace: [ 827.838973][ T7935] dump_stack+0x137/0x19d [ 827.870460][ T7935] should_fail+0x23c/0x250 [ 827.874950][ T7935] should_fail_usercopy+0x16/0x20 [ 827.880239][ T7935] strncpy_from_user+0x21/0x250 [ 827.885142][ T7935] getname_flags+0xb8/0x3d0 [ 827.889682][ T7935] ? vfs_write+0x50c/0x770 [ 827.894110][ T7935] getname+0x15/0x20 [ 827.900028][ T7935] do_sys_openat2+0x5b/0x250 [ 827.904628][ T7935] __x64_sys_openat+0xef/0x110 [ 827.909589][ T7935] do_syscall_64+0x34/0x50 [ 827.914040][ T7935] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 827.920454][ T7935] RIP: 0033:0x419544 [ 827.924349][ T7935] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 827.943990][ T7935] RSP: 002b:00007f5c9b48bed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 827.952464][ T7935] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 827.960538][ T7935] RDX: 0000000000000002 RSI: 00007f5c9b48c000 RDI: 00000000ffffff9c [ 827.968599][ T7935] RBP: 00007f5c9b48c000 R08: 0000000000000000 R09: ffffffffffffffff [ 827.976673][ T7935] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 14:12:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000230000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:29 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 827.984652][ T7935] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 827.992864][ T7942] CPU: 0 PID: 7942 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 828.003195][ T7942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.013330][ T7942] Call Trace: [ 828.016729][ T7942] dump_stack+0x137/0x19d [ 828.021217][ T7942] should_fail+0x23c/0x250 [ 828.025649][ T7942] ? getname_flags+0x84/0x3d0 [ 828.030404][ T7942] __should_failslab+0x81/0x90 [ 828.035458][ T7942] should_failslab+0x5/0x20 [ 828.040037][ T7942] kmem_cache_alloc+0x46/0x300 [ 828.044846][ T7942] getname_flags+0x84/0x3d0 [ 828.049361][ T7942] ? vfs_write+0x50c/0x770 [ 828.053818][ T7942] getname+0x15/0x20 [ 828.057727][ T7942] do_sys_openat2+0x5b/0x250 [ 828.062330][ T7942] __x64_sys_openat+0xef/0x110 [ 828.067103][ T7942] do_syscall_64+0x34/0x50 [ 828.071522][ T7942] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 828.077594][ T7942] RIP: 0033:0x419544 [ 828.082741][ T7942] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 828.102470][ T7942] RSP: 002b:00007f236f4c2ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 828.110946][ T7942] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 828.118934][ T7942] RDX: 0000000000000002 RSI: 00007f236f4c3000 RDI: 00000000ffffff9c [ 828.126972][ T7942] RBP: 00007f236f4c3000 R08: 0000000000000000 R09: ffffffffffffffff 14:12:29 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 828.135240][ T7942] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 828.143229][ T7942] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 14:12:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000006040000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 828.193778][ T7934] loop4: detected capacity change from 0 to 6 [ 828.209981][ T7959] FAULT_INJECTION: forcing a failure. [ 828.209981][ T7959] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 828.210059][ T7958] FAULT_INJECTION: forcing a failure. [ 828.210059][ T7958] name failslab, interval 1, probability 0, space 0, times 0 [ 828.210080][ T7958] CPU: 0 PID: 7958 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 828.247821][ T7958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.258502][ T7958] Call Trace: [ 828.262663][ T7958] dump_stack+0x137/0x19d [ 828.272341][ T7958] should_fail+0x23c/0x250 [ 828.290512][ T7958] ? __alloc_file+0x2e/0x1a0 [ 828.295771][ T7958] __should_failslab+0x81/0x90 [ 828.300692][ T7958] should_failslab+0x5/0x20 [ 828.305208][ T7958] kmem_cache_alloc+0x46/0x300 [ 828.309976][ T7958] __alloc_file+0x2e/0x1a0 [ 828.314998][ T7958] alloc_empty_file+0xcd/0x1c0 [ 828.319775][ T7958] path_openat+0x6a/0x20b0 [ 828.324232][ T7958] ? avc_has_perm_noaudit+0x19a/0x240 [ 828.329686][ T7958] ? avc_has_perm+0x59/0x150 [ 828.334345][ T7958] ? avc_has_perm+0xc8/0x150 [ 828.338953][ T7958] do_filp_open+0xd9/0x1f0 [ 828.343747][ T7958] ? __virt_addr_valid+0x15a/0x1a0 [ 828.349231][ T7958] ? __check_object_size+0x253/0x310 [ 828.354528][ T7958] ? alloc_fd+0x36d/0x3c0 [ 828.359205][ T7958] do_sys_openat2+0xa3/0x250 [ 828.363831][ T7958] __x64_sys_openat+0xef/0x110 [ 828.371225][ T7958] do_syscall_64+0x34/0x50 [ 828.375966][ T7958] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 828.392566][ T7958] RIP: 0033:0x419544 [ 828.396733][ T7958] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 828.416780][ T7958] RSP: 002b:00007f5c9b48bed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 828.425485][ T7958] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 828.433842][ T7958] RDX: 0000000000000002 RSI: 00007f5c9b48c000 RDI: 00000000ffffff9c [ 828.443180][ T7958] RBP: 00007f5c9b48c000 R08: 0000000000000000 R09: ffffffffffffffff [ 828.451317][ T7958] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 828.459422][ T7958] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 828.468798][ T7959] CPU: 1 PID: 7959 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 828.483526][ T7959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:12:30 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x1fffff, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:30 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 828.493680][ T7959] Call Trace: [ 828.497183][ T7959] dump_stack+0x137/0x19d [ 828.501520][ T7959] should_fail+0x23c/0x250 [ 828.506075][ T7959] should_fail_usercopy+0x16/0x20 [ 828.511735][ T7959] strncpy_from_user+0x21/0x250 [ 828.516754][ T7959] getname_flags+0xb8/0x3d0 [ 828.521388][ T7959] ? vfs_write+0x50c/0x770 [ 828.527071][ T7959] getname+0x15/0x20 [ 828.531187][ T7959] do_sys_openat2+0x5b/0x250 [ 828.536374][ T7959] __x64_sys_openat+0xef/0x110 [ 828.541177][ T7959] do_syscall_64+0x34/0x50 [ 828.545662][ T7959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 828.551793][ T7959] RIP: 0033:0x419544 [ 828.555686][ T7959] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 828.575989][ T7959] RSP: 002b:00007f236f4c2ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 828.584775][ T7959] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 828.585330][ T7955] loop5: detected capacity change from 0 to 24576 [ 828.593086][ T7959] RDX: 0000000000000002 RSI: 00007f236f4c3000 RDI: 00000000ffffff9c [ 828.593106][ T7959] RBP: 00007f236f4c3000 R08: 0000000000000000 R09: ffffffffffffffff [ 828.593136][ T7959] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 828.593147][ T7959] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 828.603865][ T7972] FAULT_INJECTION: forcing a failure. [ 828.603865][ T7972] name failslab, interval 1, probability 0, space 0, times 0 [ 828.608364][ T7954] loop0: detected capacity change from 0 to 24576 [ 828.617329][ T7972] CPU: 1 PID: 7972 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 828.625938][ T7970] loop1: detected capacity change from 0 to 24576 [ 828.633618][ T7972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.633634][ T7972] Call Trace: [ 828.633642][ T7972] dump_stack+0x137/0x19d [ 828.633736][ T7972] should_fail+0x23c/0x250 14:12:30 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 828.633752][ T7972] ? security_file_alloc+0x30/0x190 [ 828.633786][ T7972] __should_failslab+0x81/0x90 [ 828.652752][ T7955] EXT4-fs (loop5): unsupported descriptor size 0 [ 828.654307][ T7972] should_failslab+0x5/0x20 [ 828.688373][ T7954] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 828.690108][ T7972] kmem_cache_alloc+0x46/0x300 [ 828.690134][ T7972] ? __alloc_file+0x2e/0x1a0 [ 828.694880][ T7954] EXT4-fs (loop0): group descriptors corrupted! [ 828.700065][ T7972] security_file_alloc+0x30/0x190 [ 828.700099][ T7972] __alloc_file+0x83/0x1a0 [ 828.739395][ T7970] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 828.742534][ T7972] alloc_empty_file+0xcd/0x1c0 [ 828.742565][ T7972] path_openat+0x6a/0x20b0 [ 828.747666][ T7970] EXT4-fs (loop1): group descriptors corrupted! [ 828.752075][ T7972] ? avc_has_perm_noaudit+0x19a/0x240 [ 828.752103][ T7972] ? avc_has_perm+0x59/0x150 [ 828.752121][ T7972] ? avc_has_perm+0xc8/0x150 [ 828.786899][ T7969] loop4: detected capacity change from 0 to 6 [ 828.789203][ T7972] do_filp_open+0xd9/0x1f0 [ 828.803497][ T7984] FAULT_INJECTION: forcing a failure. [ 828.803497][ T7984] name failslab, interval 1, probability 0, space 0, times 0 [ 828.804374][ T7972] ? __virt_addr_valid+0x15a/0x1a0 [ 828.822160][ T7972] ? __check_object_size+0x253/0x310 [ 828.827947][ T7972] ? alloc_fd+0x36d/0x3c0 [ 828.832278][ T7972] do_sys_openat2+0xa3/0x250 [ 828.836920][ T7972] __x64_sys_openat+0xef/0x110 [ 828.841785][ T7972] do_syscall_64+0x34/0x50 [ 828.846207][ T7972] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 828.853823][ T7972] RIP: 0033:0x419544 [ 828.858612][ T7972] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 828.880189][ T7972] RSP: 002b:00007f5c9b48bed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 828.888818][ T7972] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 828.896805][ T7972] RDX: 0000000000000002 RSI: 00007f5c9b48c000 RDI: 00000000ffffff9c [ 828.904803][ T7972] RBP: 00007f5c9b48c000 R08: 0000000000000000 R09: ffffffffffffffff [ 828.912871][ T7972] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 828.921215][ T7972] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 828.929818][ T7984] CPU: 0 PID: 7984 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 14:12:30 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 828.939999][ T7984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.950057][ T7984] Call Trace: [ 828.953350][ T7984] dump_stack+0x137/0x19d [ 828.957952][ T7984] should_fail+0x23c/0x250 [ 828.962367][ T7984] ? __alloc_file+0x2e/0x1a0 [ 828.967151][ T7984] __should_failslab+0x81/0x90 [ 828.971938][ T7984] should_failslab+0x5/0x20 [ 828.977049][ T7984] kmem_cache_alloc+0x46/0x300 [ 828.981807][ T7984] __alloc_file+0x2e/0x1a0 [ 828.986584][ T7984] alloc_empty_file+0xcd/0x1c0 [ 828.992701][ T7984] path_openat+0x6a/0x20b0 [ 828.997383][ T7984] ? avc_has_perm_noaudit+0x19a/0x240 [ 829.002928][ T7984] ? avc_has_perm+0x59/0x150 [ 829.007711][ T7984] ? avc_has_perm+0xc8/0x150 [ 829.015156][ T7984] do_filp_open+0xd9/0x1f0 [ 829.020330][ T7984] ? __virt_addr_valid+0x15a/0x1a0 [ 829.025475][ T7984] ? __check_object_size+0x253/0x310 [ 829.031112][ T7984] ? alloc_fd+0x36d/0x3c0 [ 829.035549][ T7984] do_sys_openat2+0xa3/0x250 [ 829.040356][ T7984] __x64_sys_openat+0xef/0x110 [ 829.045299][ T7984] do_syscall_64+0x34/0x50 [ 829.050277][ T7984] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 829.056779][ T7984] RIP: 0033:0x419544 [ 829.060683][ T7984] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 829.080854][ T7984] RSP: 002b:00007f236f4c2ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 829.089467][ T7984] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 14:12:30 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 829.097650][ T7984] RDX: 0000000000000002 RSI: 00007f236f4c3000 RDI: 00000000ffffff9c [ 829.107271][ T7984] RBP: 00007f236f4c3000 R08: 0000000000000000 R09: ffffffffffffffff [ 829.116433][ T7984] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 829.124476][ T7984] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 14:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000240000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 829.172592][ T7969] loop4: detected capacity change from 0 to 6 [ 829.192498][ T7998] FAULT_INJECTION: forcing a failure. [ 829.192498][ T7998] name failslab, interval 1, probability 0, space 0, times 0 [ 829.205524][ T7998] CPU: 0 PID: 7998 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 829.215810][ T7998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.225005][ T7999] FAULT_INJECTION: forcing a failure. [ 829.225005][ T7999] name failslab, interval 1, probability 0, space 0, times 0 [ 829.226267][ T7998] Call Trace: [ 829.244062][ T7998] dump_stack+0x137/0x19d [ 829.248996][ T7998] should_fail+0x23c/0x250 [ 829.253424][ T7998] ? loop_set_status_from_info+0x3a0/0x3a0 [ 829.260199][ T7998] __should_failslab+0x81/0x90 [ 829.265809][ T7998] ? __kthread_create_on_node+0x7a/0x290 [ 829.272050][ T7998] should_failslab+0x5/0x20 [ 829.276791][ T7998] kmem_cache_alloc_trace+0x49/0x320 [ 829.283946][ T7998] ? loop_set_status_from_info+0x3a0/0x3a0 [ 829.294481][ T7998] __kthread_create_on_node+0x7a/0x290 [ 829.300228][ T7998] ? loop_set_status_from_info+0x3a0/0x3a0 [ 829.306171][ T7998] kthread_create_on_node+0x72/0xa0 [ 829.311400][ T7998] loop_configure+0x597/0xcb0 [ 829.316287][ T7998] ? mntput+0x45/0x70 [ 829.321448][ T7998] lo_ioctl+0x555/0x11f0 [ 829.326076][ T7998] ? path_openat+0x19ab/0x20b0 [ 829.330924][ T7998] ? putname+0xa5/0xc0 [ 829.335536][ T7998] ? ___cache_free+0x3c/0x300 [ 829.340576][ T7998] ? blkdev_common_ioctl+0x9c3/0x1010 [ 829.346849][ T7998] ? selinux_file_ioctl+0x8e0/0x970 [ 829.352123][ T7998] ? lo_release+0x120/0x120 [ 829.357015][ T7998] blkdev_ioctl+0x1d0/0x3c0 [ 829.361709][ T7998] block_ioctl+0x6d/0x80 [ 829.366646][ T7998] ? blkdev_iopoll+0x70/0x70 [ 829.371594][ T7998] __se_sys_ioctl+0xcb/0x140 [ 829.376245][ T7998] __x64_sys_ioctl+0x3f/0x50 [ 829.381306][ T7998] do_syscall_64+0x34/0x50 [ 829.385849][ T7998] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 829.392355][ T7998] RIP: 0033:0x466217 [ 829.398374][ T7998] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 829.425906][ T7998] RSP: 002b:00007f5c9b48bf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 829.434333][ T7998] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 829.444149][ T7998] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 829.452488][ T7998] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 829.460831][ T7998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 829.470549][ T7998] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 829.478538][ T7999] CPU: 1 PID: 7999 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 829.488623][ T7999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.498931][ T7999] Call Trace: [ 829.503865][ T7999] dump_stack+0x137/0x19d [ 829.508207][ T7999] should_fail+0x23c/0x250 [ 829.512703][ T7999] ? security_file_alloc+0x30/0x190 [ 829.517920][ T7999] __should_failslab+0x81/0x90 [ 829.522869][ T7999] should_failslab+0x5/0x20 [ 829.527384][ T7999] kmem_cache_alloc+0x46/0x300 [ 829.532147][ T7999] ? __alloc_file+0x2e/0x1a0 [ 829.536868][ T7999] security_file_alloc+0x30/0x190 [ 829.542182][ T7999] __alloc_file+0x83/0x1a0 [ 829.546613][ T7999] alloc_empty_file+0xcd/0x1c0 [ 829.551483][ T7999] path_openat+0x6a/0x20b0 [ 829.556030][ T7999] ? avc_has_perm_noaudit+0x19a/0x240 [ 829.586671][ T7999] ? avc_has_perm+0x59/0x150 [ 829.591326][ T7999] ? avc_has_perm+0xc8/0x150 [ 829.593377][ T8005] loop5: detected capacity change from 0 to 24576 [ 829.595925][ T7999] do_filp_open+0xd9/0x1f0 [ 829.606859][ T7999] ? __virt_addr_valid+0x15a/0x1a0 [ 829.611985][ T7999] ? __check_object_size+0x253/0x310 [ 829.617591][ T7999] ? alloc_fd+0x36d/0x3c0 [ 829.622013][ T7999] do_sys_openat2+0xa3/0x250 [ 829.626640][ T7999] __x64_sys_openat+0xef/0x110 [ 829.631584][ T7999] do_syscall_64+0x34/0x50 [ 829.636024][ T7999] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 829.642310][ T7999] RIP: 0033:0x419544 [ 829.646215][ T7999] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 829.666000][ T7999] RSP: 002b:00007f236f4c2ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 829.674520][ T7999] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 14:12:31 executing program 2 (fault-call:0 fault-nth:14): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000010040000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:31 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x1000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 829.682672][ T7999] RDX: 0000000000000002 RSI: 00007f236f4c3000 RDI: 00000000ffffff9c [ 829.690685][ T7999] RBP: 00007f236f4c3000 R08: 0000000000000000 R09: ffffffffffffffff [ 829.698839][ T7999] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 829.706883][ T7999] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 829.716554][ T8005] EXT4-fs (loop5): unsupported descriptor size 0 14:12:31 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 829.734709][ T8004] loop0: detected capacity change from 0 to 24576 [ 829.743787][ T8022] FAULT_INJECTION: forcing a failure. [ 829.743787][ T8022] name failslab, interval 1, probability 0, space 0, times 0 [ 829.754985][ T8023] loop1: detected capacity change from 0 to 24576 [ 829.756533][ T8022] CPU: 1 PID: 8022 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 829.774867][ T8022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.784982][ T8022] Call Trace: [ 829.788265][ T8022] dump_stack+0x137/0x19d [ 829.792579][ T8022] should_fail+0x23c/0x250 [ 829.796996][ T8022] ? __kernfs_new_node+0x6a/0x330 [ 829.802026][ T8022] __should_failslab+0x81/0x90 [ 829.807160][ T8022] should_failslab+0x5/0x20 [ 829.811715][ T8022] kmem_cache_alloc+0x46/0x300 [ 829.816500][ T8022] __kernfs_new_node+0x6a/0x330 [ 829.821605][ T8022] ? select_task_rq_fair+0x179/0xbd0 [ 829.826919][ T8022] ? rb_insert_color+0x2dc/0x310 [ 829.833237][ T8022] kernfs_create_dir_ns+0x5e/0x140 [ 829.838443][ T8022] internal_create_group+0x138/0x850 [ 829.843880][ T8022] ? check_preempt_wakeup+0x1bb/0x350 [ 829.849240][ T8022] sysfs_create_group+0x1b/0x20 [ 829.854096][ T8022] loop_configure+0xa21/0xcb0 [ 829.858765][ T8022] lo_ioctl+0x555/0x11f0 [ 829.863034][ T8022] ? path_openat+0x19ab/0x20b0 [ 829.868217][ T8022] ? putname+0xa5/0xc0 [ 829.872287][ T8022] ? ___cache_free+0x3c/0x300 [ 829.877938][ T8022] ? blkdev_common_ioctl+0x9c3/0x1010 [ 829.883386][ T8022] ? selinux_file_ioctl+0x8e0/0x970 [ 829.888825][ T8022] ? lo_release+0x120/0x120 [ 829.894390][ T8022] blkdev_ioctl+0x1d0/0x3c0 [ 829.898956][ T8022] block_ioctl+0x6d/0x80 [ 829.903251][ T8022] ? blkdev_iopoll+0x70/0x70 [ 829.908054][ T8022] __se_sys_ioctl+0xcb/0x140 [ 829.912663][ T8022] __x64_sys_ioctl+0x3f/0x50 [ 829.917262][ T8022] do_syscall_64+0x34/0x50 [ 829.921790][ T8022] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 829.927875][ T8022] RIP: 0033:0x466217 [ 829.931770][ T8022] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 829.951720][ T8022] RSP: 002b:00007f5c9b48bf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 829.963822][ T8022] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 829.971886][ T8022] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 829.979971][ T8022] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 829.988025][ T8022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 829.996012][ T8022] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 830.004080][ T8022] loop2: detected capacity change from 0 to 6 [ 830.014778][ T8004] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 830.025049][ T8004] EXT4-fs (loop0): group descriptors corrupted! 14:12:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 830.042870][ T8023] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 830.053140][ T8023] EXT4-fs (loop1): group descriptors corrupted! [ 830.067329][ T8022] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 830.076001][ T8026] loop4: detected capacity change from 0 to 6 [ 830.079591][ T8034] FAULT_INJECTION: forcing a failure. [ 830.079591][ T8034] name failslab, interval 1, probability 0, space 0, times 0 [ 830.094579][ T8038] loop5: detected capacity change from 0 to 24576 [ 830.094785][ T8034] CPU: 1 PID: 8034 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 830.104185][ T8038] EXT4-fs (loop5): unsupported descriptor size 0 [ 830.111204][ T8034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.111218][ T8034] Call Trace: [ 830.111227][ T8034] dump_stack+0x137/0x19d [ 830.111248][ T8034] should_fail+0x23c/0x250 [ 830.135830][ T8026] FAT-fs (loop4): Directory bread(block 6) failed [ 830.139845][ T8034] ? loop_set_status_from_info+0x3a0/0x3a0 [ 830.139878][ T8034] __should_failslab+0x81/0x90 [ 830.157015][ T8034] ? __kthread_create_on_node+0x7a/0x290 [ 830.162660][ T8034] should_failslab+0x5/0x20 [ 830.167428][ T8034] kmem_cache_alloc_trace+0x49/0x320 [ 830.172715][ T8034] ? loop_set_status_from_info+0x3a0/0x3a0 [ 830.178734][ T8034] __kthread_create_on_node+0x7a/0x290 [ 830.184190][ T8034] ? loop_set_status_from_info+0x3a0/0x3a0 [ 830.190000][ T8034] kthread_create_on_node+0x72/0xa0 [ 830.195226][ T8034] loop_configure+0x597/0xcb0 [ 830.200175][ T8034] ? mntput+0x45/0x70 [ 830.204563][ T8034] lo_ioctl+0x555/0x11f0 [ 830.208861][ T8034] ? path_openat+0x19ab/0x20b0 [ 830.213683][ T8034] ? putname+0xa5/0xc0 [ 830.217957][ T8034] ? ___cache_free+0x3c/0x300 [ 830.222636][ T8034] ? blkdev_common_ioctl+0x9c3/0x1010 [ 830.228025][ T8034] ? selinux_file_ioctl+0x8e0/0x970 [ 830.233421][ T8034] ? lo_release+0x120/0x120 [ 830.237934][ T8034] blkdev_ioctl+0x1d0/0x3c0 [ 830.242455][ T8034] block_ioctl+0x6d/0x80 [ 830.246894][ T8034] ? blkdev_iopoll+0x70/0x70 [ 830.251505][ T8034] __se_sys_ioctl+0xcb/0x140 [ 830.256283][ T8034] __x64_sys_ioctl+0x3f/0x50 [ 830.260955][ T8034] do_syscall_64+0x34/0x50 [ 830.266096][ T8034] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 830.272737][ T8034] RIP: 0033:0x466217 [ 830.276827][ T8034] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 830.297674][ T8034] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 830.306618][ T8034] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 830.314735][ T8034] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 830.322925][ T8034] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 830.330986][ T8034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 14:12:32 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 830.339524][ T8034] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 14:12:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000050000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000250000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 830.386636][ T8047] FAULT_INJECTION: forcing a failure. [ 830.386636][ T8047] name failslab, interval 1, probability 0, space 0, times 0 [ 830.399331][ T8047] CPU: 1 PID: 8047 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 830.409653][ T8047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.419865][ T8047] Call Trace: [ 830.423148][ T8047] dump_stack+0x137/0x19d [ 830.427547][ T8047] should_fail+0x23c/0x250 [ 830.431986][ T8047] ? __kernfs_new_node+0x6a/0x330 14:12:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b1385431", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:32 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x10e0000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:32 executing program 2 (fault-call:0 fault-nth:15): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 830.437023][ T8047] __should_failslab+0x81/0x90 [ 830.441796][ T8047] should_failslab+0x5/0x20 [ 830.446366][ T8047] kmem_cache_alloc+0x46/0x300 [ 830.451136][ T8047] __kernfs_new_node+0x6a/0x330 [ 830.456061][ T8047] ? select_task_rq_fair+0x179/0xbd0 [ 830.461359][ T8047] ? rb_insert_color+0x2fa/0x310 [ 830.468945][ T8047] kernfs_create_dir_ns+0x5e/0x140 [ 830.474701][ T8047] internal_create_group+0x138/0x850 [ 830.480082][ T8047] ? check_preempt_wakeup+0x1bb/0x350 [ 830.485721][ T8047] sysfs_create_group+0x1b/0x20 [ 830.490742][ T8047] loop_configure+0xa21/0xcb0 [ 830.495418][ T8047] lo_ioctl+0x555/0x11f0 [ 830.499676][ T8047] ? path_openat+0x19ab/0x20b0 [ 830.504616][ T8047] ? putname+0xa5/0xc0 [ 830.508694][ T8047] ? ___cache_free+0x3c/0x300 [ 830.513356][ T8047] ? blkdev_common_ioctl+0x9c3/0x1010 [ 830.519023][ T8047] ? selinux_file_ioctl+0x8e0/0x970 [ 830.524265][ T8047] ? lo_release+0x120/0x120 [ 830.528758][ T8047] blkdev_ioctl+0x1d0/0x3c0 [ 830.533357][ T8047] block_ioctl+0x6d/0x80 [ 830.537661][ T8047] ? blkdev_iopoll+0x70/0x70 [ 830.542400][ T8047] __se_sys_ioctl+0xcb/0x140 [ 830.547094][ T8047] __x64_sys_ioctl+0x3f/0x50 [ 830.551770][ T8047] do_syscall_64+0x34/0x50 [ 830.556211][ T8047] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 830.562293][ T8047] RIP: 0033:0x466217 [ 830.566211][ T8047] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 830.586952][ T8047] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 830.595360][ T8047] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 830.603539][ T8047] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 830.611655][ T8047] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 830.619620][ T8047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 830.627753][ T8047] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 830.636159][ T8047] loop3: detected capacity change from 0 to 6 [ 830.660312][ T8050] loop1: detected capacity change from 0 to 24576 [ 830.667037][ T8058] FAULT_INJECTION: forcing a failure. [ 830.667037][ T8058] name failslab, interval 1, probability 0, space 0, times 0 [ 830.667052][ T8056] loop0: detected capacity change from 0 to 24576 [ 830.668287][ T8060] loop5: detected capacity change from 0 to 24576 [ 830.679825][ T8058] CPU: 1 PID: 8058 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 830.689444][ T8056] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 830.694031][ T8058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.694045][ T8058] Call Trace: [ 830.694053][ T8058] dump_stack+0x137/0x19d [ 830.704147][ T8056] EXT4-fs (loop0): group descriptors corrupted! [ 830.714785][ T8058] should_fail+0x23c/0x250 [ 830.714810][ T8058] ? __kernfs_new_node+0x6a/0x330 [ 830.748286][ T8058] __should_failslab+0x81/0x90 [ 830.753041][ T8058] should_failslab+0x5/0x20 [ 830.757551][ T8058] kmem_cache_alloc+0x46/0x300 [ 830.762303][ T8058] ? __cond_resched+0x11/0x40 [ 830.766995][ T8058] __kernfs_new_node+0x6a/0x330 [ 830.771975][ T8058] ? mutex_spin_on_owner+0x14c/0x170 [ 830.777297][ T8058] ? __mutex_lock+0x657/0x670 [ 830.781962][ T8058] ? rb_insert_color+0x7e/0x310 [ 830.787521][ T8058] kernfs_new_node+0x5b/0xd0 [ 830.792549][ T8058] __kernfs_create_file+0x45/0x1a0 [ 830.797763][ T8058] sysfs_add_file_mode_ns+0x1c1/0x250 [ 830.803219][ T8058] internal_create_group+0x2e4/0x850 [ 830.809279][ T8058] sysfs_create_group+0x1b/0x20 [ 830.814144][ T8058] loop_configure+0xa21/0xcb0 [ 830.818809][ T8058] lo_ioctl+0x555/0x11f0 [ 830.823068][ T8058] ? path_openat+0x19ab/0x20b0 [ 830.828566][ T8058] ? putname+0xa5/0xc0 [ 830.832761][ T8058] ? ___cache_free+0x3c/0x300 [ 830.837422][ T8058] ? blkdev_common_ioctl+0x9c3/0x1010 [ 830.842959][ T8058] ? selinux_file_ioctl+0x8e0/0x970 [ 830.848158][ T8058] ? lo_release+0x120/0x120 [ 830.852990][ T8058] blkdev_ioctl+0x1d0/0x3c0 [ 830.860091][ T8058] block_ioctl+0x6d/0x80 [ 830.865029][ T8058] ? blkdev_iopoll+0x70/0x70 [ 830.869609][ T8058] __se_sys_ioctl+0xcb/0x140 [ 830.874356][ T8058] __x64_sys_ioctl+0x3f/0x50 [ 830.878934][ T8058] do_syscall_64+0x34/0x50 [ 830.883337][ T8058] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 830.889314][ T8058] RIP: 0033:0x466217 [ 830.893210][ T8058] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 830.913100][ T8058] RSP: 002b:00007f5c9b48bf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 830.921516][ T8058] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 830.929497][ T8058] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 830.937468][ T8058] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 830.945424][ T8058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 830.953782][ T8058] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 830.962374][ T8058] loop2: detected capacity change from 0 to 6 [ 830.977574][ T8050] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 830.983569][ T8060] EXT4-fs (loop5): unsupported descriptor size 0 [ 830.987936][ T8050] EXT4-fs (loop1): group descriptors corrupted! 14:12:32 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000260000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 831.003939][ T8058] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 831.021454][ T8074] loop4: detected capacity change from 0 to 6 [ 831.194333][ T8081] FAULT_INJECTION: forcing a failure. [ 831.194333][ T8081] name failslab, interval 1, probability 0, space 0, times 0 [ 831.207506][ T8081] CPU: 1 PID: 8081 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 831.221768][ T8081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:12:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000060000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b1385431", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:32 executing program 2 (fault-call:0 fault-nth:16): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 831.244187][ T8081] Call Trace: [ 831.247503][ T8081] dump_stack+0x137/0x19d [ 831.251934][ T8081] should_fail+0x23c/0x250 [ 831.256371][ T8081] ? __kernfs_new_node+0x6a/0x330 [ 831.267623][ T8081] __should_failslab+0x81/0x90 [ 831.272438][ T8081] should_failslab+0x5/0x20 [ 831.277849][ T8081] kmem_cache_alloc+0x46/0x300 [ 831.282729][ T8081] ? __cond_resched+0x11/0x40 [ 831.287411][ T8081] __kernfs_new_node+0x6a/0x330 [ 831.292320][ T8081] ? __mutex_lock+0x657/0x670 [ 831.295894][ T8074] loop4: detected capacity change from 0 to 6 [ 831.297114][ T8081] ? __mutex_lock+0x657/0x670 [ 831.297141][ T8081] ? rb_insert_color+0x7e/0x310 [ 831.303673][ T8090] FAULT_INJECTION: forcing a failure. [ 831.303673][ T8090] name failslab, interval 1, probability 0, space 0, times 0 [ 831.307928][ T8081] kernfs_new_node+0x5b/0xd0 [ 831.307963][ T8081] __kernfs_create_file+0x45/0x1a0 [ 831.335451][ T8081] sysfs_add_file_mode_ns+0x1c1/0x250 [ 831.341031][ T8081] internal_create_group+0x2e4/0x850 [ 831.346340][ T8081] sysfs_create_group+0x1b/0x20 [ 831.351235][ T8081] loop_configure+0xa21/0xcb0 [ 831.355931][ T8081] lo_ioctl+0x555/0x11f0 [ 831.360423][ T8081] ? path_openat+0x19ab/0x20b0 [ 831.365299][ T8081] ? putname+0xa5/0xc0 [ 831.370257][ T8081] ? ___cache_free+0x3c/0x300 [ 831.375998][ T8081] ? blkdev_common_ioctl+0x9c3/0x1010 [ 831.381466][ T8081] ? selinux_file_ioctl+0x8e0/0x970 [ 831.386944][ T8081] ? lo_release+0x120/0x120 [ 831.392045][ T8081] blkdev_ioctl+0x1d0/0x3c0 [ 831.396568][ T8081] block_ioctl+0x6d/0x80 [ 831.401390][ T8081] ? blkdev_iopoll+0x70/0x70 [ 831.405992][ T8081] __se_sys_ioctl+0xcb/0x140 [ 831.411019][ T8081] __x64_sys_ioctl+0x3f/0x50 [ 831.416926][ T8081] do_syscall_64+0x34/0x50 [ 831.422243][ T8081] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 831.428178][ T8081] RIP: 0033:0x466217 [ 831.432255][ T8081] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 831.454796][ T8081] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 831.463224][ T8081] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 831.471989][ T8081] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 831.482570][ T8081] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 831.491521][ T8081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 831.501899][ T8081] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 831.509885][ T8090] CPU: 0 PID: 8090 Comm: syz-executor.2 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 831.519977][ T8090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.530065][ T8090] Call Trace: [ 831.533379][ T8090] dump_stack+0x137/0x19d [ 831.537841][ T8090] should_fail+0x23c/0x250 [ 831.538109][ T8081] loop3: detected capacity change from 0 to 6 [ 831.542369][ T8090] ? __kernfs_new_node+0x6a/0x330 [ 831.542395][ T8090] __should_failslab+0x81/0x90 [ 831.559300][ T8090] should_failslab+0x5/0x20 [ 831.563831][ T8090] kmem_cache_alloc+0x46/0x300 [ 831.568725][ T8090] __kernfs_new_node+0x6a/0x330 [ 831.573638][ T8090] ? __cond_resched+0x11/0x40 [ 831.578324][ T8090] ? mutex_lock+0x9/0x30 [ 831.583051][ T8090] kernfs_new_node+0x5b/0xd0 [ 831.587737][ T8090] __kernfs_create_file+0x45/0x1a0 [ 831.593122][ T8090] sysfs_add_file_mode_ns+0x1c1/0x250 [ 831.598581][ T8090] internal_create_group+0x2e4/0x850 [ 831.603880][ T8090] sysfs_create_group+0x1b/0x20 [ 831.608791][ T8090] loop_configure+0xa21/0xcb0 [ 831.613477][ T8090] lo_ioctl+0x555/0x11f0 [ 831.617727][ T8090] ? path_openat+0x19ab/0x20b0 [ 831.622619][ T8090] ? putname+0xa5/0xc0 [ 831.626700][ T8090] ? ___cache_free+0x3c/0x300 [ 831.631383][ T8090] ? blkdev_common_ioctl+0x9c3/0x1010 [ 831.636842][ T8090] ? selinux_file_ioctl+0x8e0/0x970 [ 831.642177][ T8090] ? lo_release+0x120/0x120 [ 831.646715][ T8090] blkdev_ioctl+0x1d0/0x3c0 [ 831.651359][ T8090] block_ioctl+0x6d/0x80 [ 831.655631][ T8090] ? blkdev_iopoll+0x70/0x70 [ 831.660231][ T8090] __se_sys_ioctl+0xcb/0x140 [ 831.664838][ T8090] __x64_sys_ioctl+0x3f/0x50 [ 831.669588][ T8090] do_syscall_64+0x34/0x50 [ 831.674013][ T8090] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 831.680023][ T8090] RIP: 0033:0x466217 [ 831.683933][ T8090] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 831.704390][ T8090] RSP: 002b:00007f5c9b48bf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 831.713017][ T8090] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 831.721160][ T8090] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 831.729174][ T8090] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 831.737151][ T8090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 14:12:33 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 831.745204][ T8090] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 831.754370][ T8090] loop2: detected capacity change from 0 to 6 [ 831.773361][ T8099] loop0: detected capacity change from 0 to 24576 [ 831.776025][ T8097] loop1: detected capacity change from 0 to 24576 [ 831.781590][ T8098] loop5: detected capacity change from 0 to 24576 14:12:33 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x2000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 831.793623][ T8090] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 831.818959][ T8099] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 831.829144][ T8099] EXT4-fs (loop0): group descriptors corrupted! [ 831.833049][ T8097] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 831.845754][ T8097] EXT4-fs (loop1): group descriptors corrupted! [ 831.852719][ T8098] EXT4-fs (loop5): unsupported descriptor size 0 [ 831.860982][ T8111] FAULT_INJECTION: forcing a failure. [ 831.860982][ T8111] name failslab, interval 1, probability 0, space 0, times 0 [ 831.865978][ T8115] loop4: detected capacity change from 0 to 6 [ 831.874669][ T8111] CPU: 0 PID: 8111 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 831.874698][ T8111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.901287][ T8111] Call Trace: [ 831.904683][ T8111] dump_stack+0x137/0x19d [ 831.909653][ T8111] should_fail+0x23c/0x250 [ 831.914076][ T8111] ? __kernfs_new_node+0x6a/0x330 [ 831.919141][ T8111] __should_failslab+0x81/0x90 [ 831.923929][ T8111] should_failslab+0x5/0x20 [ 831.928502][ T8111] kmem_cache_alloc+0x46/0x300 [ 831.933684][ T8111] __kernfs_new_node+0x6a/0x330 [ 831.938547][ T8111] ? __cond_resched+0x11/0x40 [ 831.943224][ T8111] ? mutex_lock+0x9/0x30 [ 831.947468][ T8111] kernfs_new_node+0x5b/0xd0 [ 831.952149][ T8111] __kernfs_create_file+0x45/0x1a0 [ 831.957284][ T8111] sysfs_add_file_mode_ns+0x1c1/0x250 [ 831.962713][ T8111] internal_create_group+0x2e4/0x850 [ 831.968279][ T8111] sysfs_create_group+0x1b/0x20 [ 831.973331][ T8111] loop_configure+0xa21/0xcb0 [ 831.978041][ T8111] lo_ioctl+0x555/0x11f0 [ 831.982313][ T8111] ? path_openat+0x19ab/0x20b0 [ 831.987115][ T8111] ? putname+0xa5/0xc0 [ 831.991204][ T8111] ? ___cache_free+0x3c/0x300 [ 831.995982][ T8111] ? blkdev_common_ioctl+0x9c3/0x1010 [ 832.001392][ T8111] ? selinux_file_ioctl+0x8e0/0x970 [ 832.006632][ T8111] ? lo_release+0x120/0x120 [ 832.011161][ T8111] blkdev_ioctl+0x1d0/0x3c0 [ 832.015705][ T8111] block_ioctl+0x6d/0x80 [ 832.019983][ T8111] ? blkdev_iopoll+0x70/0x70 [ 832.024595][ T8111] __se_sys_ioctl+0xcb/0x140 [ 832.029221][ T8111] __x64_sys_ioctl+0x3f/0x50 [ 832.033855][ T8111] do_syscall_64+0x34/0x50 [ 832.038305][ T8111] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 832.044240][ T8111] RIP: 0033:0x466217 [ 832.048315][ T8111] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 832.067977][ T8111] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 832.076499][ T8111] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 832.084729][ T8111] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 832.092756][ T8111] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 832.100732][ T8111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 832.109399][ T8111] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 14:12:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000270000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:33 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 832.118628][ T8111] loop3: detected capacity change from 0 to 6 14:12:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b1385431", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000004060000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:33 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 832.164149][ T8115] FAT-fs (loop4): Directory bread(block 6) failed [ 832.181435][ T8127] loop0: detected capacity change from 0 to 24576 [ 832.217013][ T8127] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 832.226781][ T8135] FAULT_INJECTION: forcing a failure. [ 832.226781][ T8135] name failslab, interval 1, probability 0, space 0, times 0 [ 832.227241][ T8127] EXT4-fs (loop0): group descriptors corrupted! [ 832.239964][ T8135] CPU: 0 PID: 8135 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 832.256298][ T8135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:12:33 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x2040000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 832.265333][ T8134] loop5: detected capacity change from 0 to 24576 [ 832.266666][ T8135] Call Trace: [ 832.266677][ T8135] dump_stack+0x137/0x19d [ 832.280875][ T8135] should_fail+0x23c/0x250 [ 832.285295][ T8135] ? __kernfs_new_node+0x6a/0x330 [ 832.290467][ T8135] __should_failslab+0x81/0x90 [ 832.295256][ T8135] should_failslab+0x5/0x20 [ 832.299772][ T8135] kmem_cache_alloc+0x46/0x300 [ 832.304707][ T8135] __kernfs_new_node+0x6a/0x330 [ 832.310336][ T8135] ? __cond_resched+0x11/0x40 [ 832.315007][ T8135] ? mutex_lock+0x9/0x30 [ 832.319699][ T8135] kernfs_new_node+0x5b/0xd0 [ 832.324339][ T8135] __kernfs_create_file+0x45/0x1a0 [ 832.329449][ T8135] sysfs_add_file_mode_ns+0x1c1/0x250 [ 832.334911][ T8135] internal_create_group+0x2e4/0x850 [ 832.340213][ T8135] sysfs_create_group+0x1b/0x20 [ 832.345254][ T8135] loop_configure+0xa21/0xcb0 [ 832.349926][ T8135] lo_ioctl+0x555/0x11f0 [ 832.354233][ T8135] ? path_openat+0x19ab/0x20b0 [ 832.359369][ T8135] ? putname+0xa5/0xc0 [ 832.363796][ T8135] ? ___cache_free+0x3c/0x300 [ 832.368922][ T8135] ? blkdev_common_ioctl+0x9c3/0x1010 [ 832.374711][ T8135] ? selinux_file_ioctl+0x8e0/0x970 [ 832.380660][ T8135] ? lo_release+0x120/0x120 [ 832.385414][ T8135] blkdev_ioctl+0x1d0/0x3c0 [ 832.389998][ T8135] block_ioctl+0x6d/0x80 [ 832.394400][ T8135] ? blkdev_iopoll+0x70/0x70 [ 832.399097][ T8135] __se_sys_ioctl+0xcb/0x140 [ 832.404415][ T8135] __x64_sys_ioctl+0x3f/0x50 [ 832.409538][ T8135] do_syscall_64+0x34/0x50 [ 832.414099][ T8135] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 832.419985][ T8135] RIP: 0033:0x466217 [ 832.423941][ T8135] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 832.445527][ T8135] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 832.453955][ T8135] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 832.461939][ T8135] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 832.470321][ T8135] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 832.479211][ T8135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 832.487869][ T8135] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 832.496430][ T8135] loop3: detected capacity change from 0 to 6 [ 832.509188][ T8134] EXT4-fs (loop5): unsupported descriptor size 0 14:12:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000280000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e14", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:34 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 832.515803][ T8145] loop2: detected capacity change from 0 to 6 [ 832.522284][ T8144] loop1: detected capacity change from 0 to 24576 [ 832.541552][ T8145] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 832.550502][ T8144] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 832.560708][ T8144] EXT4-fs (loop1): group descriptors corrupted! 14:12:34 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000070000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 832.598966][ T8152] loop4: detected capacity change from 0 to 6 [ 832.599398][ T8160] loop0: detected capacity change from 0 to 24576 14:12:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000290000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 832.649602][ T8160] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 832.658508][ T8152] loop4: detected capacity change from 0 to 6 [ 832.660050][ T8160] EXT4-fs (loop0): group descriptors corrupted! [ 832.682726][ T8177] loop1: detected capacity change from 0 to 24576 14:12:34 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x3000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 832.707278][ T8177] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 832.717465][ T8177] EXT4-fs (loop1): group descriptors corrupted! [ 832.723454][ T8182] loop5: detected capacity change from 0 to 24576 [ 832.728449][ T8185] loop2: detected capacity change from 0 to 6 [ 832.737137][ T8176] FAULT_INJECTION: forcing a failure. [ 832.737137][ T8176] name failslab, interval 1, probability 0, space 0, times 0 [ 832.749946][ T8176] CPU: 0 PID: 8176 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 832.760794][ T8176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.765973][ T8182] EXT4-fs (loop5): unsupported descriptor size 0 [ 832.771429][ T8176] Call Trace: [ 832.771442][ T8176] dump_stack+0x137/0x19d [ 832.771466][ T8176] should_fail+0x23c/0x250 [ 832.771482][ T8176] ? __kernfs_new_node+0x6a/0x330 [ 832.771501][ T8176] __should_failslab+0x81/0x90 [ 832.801107][ T8176] should_failslab+0x5/0x20 [ 832.805632][ T8176] kmem_cache_alloc+0x46/0x300 [ 832.810833][ T8176] __kernfs_new_node+0x6a/0x330 [ 832.815727][ T8176] ? __cond_resched+0x11/0x40 [ 832.820410][ T8176] ? mutex_lock+0x9/0x30 [ 832.824637][ T8176] kernfs_new_node+0x5b/0xd0 [ 832.829290][ T8176] __kernfs_create_file+0x45/0x1a0 [ 832.834450][ T8176] sysfs_add_file_mode_ns+0x1c1/0x250 [ 832.839818][ T8176] internal_create_group+0x2e4/0x850 [ 832.845208][ T8176] sysfs_create_group+0x1b/0x20 [ 832.850106][ T8176] loop_configure+0xa21/0xcb0 [ 832.854837][ T8176] lo_ioctl+0x555/0x11f0 [ 832.859161][ T8176] ? path_openat+0x19ab/0x20b0 [ 832.863976][ T8176] ? putname+0xa5/0xc0 [ 832.868026][ T8176] ? ___cache_free+0x3c/0x300 [ 832.872782][ T8176] ? blkdev_common_ioctl+0x9c3/0x1010 [ 832.878232][ T8176] ? selinux_file_ioctl+0x8e0/0x970 [ 832.883551][ T8176] ? lo_release+0x120/0x120 [ 832.888085][ T8176] blkdev_ioctl+0x1d0/0x3c0 [ 832.892707][ T8176] block_ioctl+0x6d/0x80 [ 832.897183][ T8176] ? blkdev_iopoll+0x70/0x70 [ 832.902304][ T8176] __se_sys_ioctl+0xcb/0x140 [ 832.907378][ T8176] __x64_sys_ioctl+0x3f/0x50 [ 832.912412][ T8176] do_syscall_64+0x34/0x50 [ 832.917061][ T8176] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 832.924077][ T8176] RIP: 0033:0x466217 [ 832.930274][ T8176] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 832.951801][ T8176] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 832.961765][ T8176] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 832.969764][ T8176] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 832.978226][ T8176] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 832.986680][ T8176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 832.994650][ T8176] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 14:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e14", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000001070000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 833.004059][ T8176] loop3: detected capacity change from 0 to 6 [ 833.018851][ T8185] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:34 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 833.066247][ T8198] loop4: detected capacity change from 0 to 6 [ 833.093740][ T8185] loop2: detected capacity change from 0 to 6 [ 833.101559][ T8202] loop0: detected capacity change from 0 to 24576 14:12:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000002a0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 833.110251][ T8202] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 833.120501][ T8202] EXT4-fs (loop0): group descriptors corrupted! [ 833.127670][ T8185] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 833.137790][ T8217] loop1: detected capacity change from 0 to 24576 [ 833.144668][ T8215] loop5: detected capacity change from 0 to 24576 [ 833.150687][ T8219] FAULT_INJECTION: forcing a failure. [ 833.150687][ T8219] name failslab, interval 1, probability 0, space 0, times 0 [ 833.156204][ T8198] FAT-fs (loop4): Directory bread(block 6) failed [ 833.167332][ T8219] CPU: 0 PID: 8219 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 833.167362][ T8219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.195721][ T8219] Call Trace: [ 833.198993][ T8219] dump_stack+0x137/0x19d [ 833.203324][ T8219] should_fail+0x23c/0x250 [ 833.208016][ T8219] ? __kernfs_new_node+0x6a/0x330 [ 833.213051][ T8219] __should_failslab+0x81/0x90 [ 833.217810][ T8219] should_failslab+0x5/0x20 [ 833.222437][ T8219] kmem_cache_alloc+0x46/0x300 [ 833.227376][ T8219] __kernfs_new_node+0x6a/0x330 [ 833.232360][ T8219] ? __cond_resched+0x11/0x40 [ 833.237156][ T8219] ? mutex_lock+0x9/0x30 [ 833.241418][ T8219] kernfs_new_node+0x5b/0xd0 [ 833.246011][ T8219] __kernfs_create_file+0x45/0x1a0 [ 833.251767][ T8219] sysfs_add_file_mode_ns+0x1c1/0x250 [ 833.257159][ T8219] internal_create_group+0x2e4/0x850 [ 833.262463][ T8219] sysfs_create_group+0x1b/0x20 [ 833.267333][ T8219] loop_configure+0xa21/0xcb0 [ 833.272308][ T8219] lo_ioctl+0x555/0x11f0 [ 833.276648][ T8219] ? path_openat+0x19ab/0x20b0 [ 833.281455][ T8219] ? putname+0xa5/0xc0 [ 833.285679][ T8219] ? ___cache_free+0x3c/0x300 [ 833.290482][ T8219] ? blkdev_common_ioctl+0x9c3/0x1010 [ 833.295849][ T8219] ? selinux_file_ioctl+0x8e0/0x970 [ 833.301077][ T8219] ? lo_release+0x120/0x120 [ 833.305595][ T8219] blkdev_ioctl+0x1d0/0x3c0 [ 833.310465][ T8219] block_ioctl+0x6d/0x80 [ 833.314804][ T8219] ? blkdev_iopoll+0x70/0x70 [ 833.319383][ T8219] __se_sys_ioctl+0xcb/0x140 [ 833.323979][ T8219] __x64_sys_ioctl+0x3f/0x50 [ 833.328701][ T8219] do_syscall_64+0x34/0x50 [ 833.333137][ T8219] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 833.339020][ T8219] RIP: 0033:0x466217 [ 833.342906][ T8219] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 833.362611][ T8219] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 833.371047][ T8219] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 833.379113][ T8219] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 833.387640][ T8219] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 833.396144][ T8219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 833.404486][ T8219] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 14:12:35 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:35 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e14", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 833.413342][ T8219] loop3: detected capacity change from 0 to 6 [ 833.424555][ T8215] EXT4-fs (loop5): unsupported descriptor size 0 [ 833.431133][ T8217] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 833.441456][ T8217] EXT4-fs (loop1): group descriptors corrupted! 14:12:35 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x4000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 833.500893][ T8232] loop0: detected capacity change from 0 to 24576 [ 833.515148][ T8235] FAULT_INJECTION: forcing a failure. [ 833.515148][ T8235] name failslab, interval 1, probability 0, space 0, times 0 [ 833.528398][ T8235] CPU: 1 PID: 8235 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 833.538655][ T8235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.548836][ T8235] Call Trace: [ 833.552402][ T8235] dump_stack+0x137/0x19d [ 833.556765][ T8235] should_fail+0x23c/0x250 [ 833.561209][ T8235] ? __kernfs_new_node+0x6a/0x330 [ 833.566348][ T8235] __should_failslab+0x81/0x90 [ 833.571103][ T8235] should_failslab+0x5/0x20 [ 833.577857][ T8235] kmem_cache_alloc+0x46/0x300 [ 833.582820][ T8235] __kernfs_new_node+0x6a/0x330 [ 833.587690][ T8235] ? __cond_resched+0x11/0x40 [ 833.592392][ T8235] ? mutex_lock+0x9/0x30 [ 833.596652][ T8235] kernfs_new_node+0x5b/0xd0 [ 833.601589][ T8235] __kernfs_create_file+0x45/0x1a0 [ 833.606684][ T8235] sysfs_add_file_mode_ns+0x1c1/0x250 [ 833.612058][ T8235] internal_create_group+0x2e4/0x850 [ 833.617341][ T8235] sysfs_create_group+0x1b/0x20 [ 833.622428][ T8235] loop_configure+0xa21/0xcb0 [ 833.627360][ T8235] lo_ioctl+0x555/0x11f0 [ 833.631619][ T8235] ? path_openat+0x19ab/0x20b0 [ 833.636998][ T8235] ? putname+0xa5/0xc0 [ 833.641162][ T8235] ? ___cache_free+0x3c/0x300 [ 833.646011][ T8235] ? blkdev_common_ioctl+0x9c3/0x1010 [ 833.651446][ T8235] ? selinux_file_ioctl+0x8e0/0x970 [ 833.656748][ T8235] ? lo_release+0x120/0x120 [ 833.661259][ T8235] blkdev_ioctl+0x1d0/0x3c0 [ 833.665843][ T8235] block_ioctl+0x6d/0x80 [ 833.670073][ T8235] ? blkdev_iopoll+0x70/0x70 [ 833.675143][ T8235] __se_sys_ioctl+0xcb/0x140 [ 833.679772][ T8235] __x64_sys_ioctl+0x3f/0x50 [ 833.684455][ T8235] do_syscall_64+0x34/0x50 [ 833.688973][ T8235] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 833.695061][ T8235] RIP: 0033:0x466217 [ 833.698961][ T8235] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 833.719699][ T8235] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 833.728307][ T8235] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 833.737469][ T8235] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 833.745885][ T8235] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 833.754207][ T8235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 833.762179][ T8235] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 833.770457][ T8235] loop3: detected capacity change from 0 to 6 [ 833.791510][ T8232] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 14:12:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000090000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 833.797085][ T8243] loop5: detected capacity change from 0 to 24576 [ 833.801664][ T8232] EXT4-fs (loop0): group descriptors corrupted! [ 833.825107][ T8249] loop2: detected capacity change from 0 to 6 14:12:35 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 833.854403][ T8243] EXT4-fs (loop5): unsupported descriptor size 0 [ 833.882966][ T8254] loop1: detected capacity change from 0 to 24576 [ 833.894997][ T8249] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000002b0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 833.906550][ T8254] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 833.915500][ T8266] loop3: detected capacity change from 0 to 6 [ 833.916931][ T8254] EXT4-fs (loop1): group descriptors corrupted! [ 833.923772][ T8266] FAULT_INJECTION: forcing a failure. [ 833.923772][ T8266] name failslab, interval 1, probability 0, space 0, times 0 [ 833.944175][ T8266] CPU: 0 PID: 8266 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 833.954695][ T8266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.963311][ T8264] loop4: detected capacity change from 0 to 6 [ 833.964773][ T8266] Call Trace: [ 833.964784][ T8266] dump_stack+0x137/0x19d [ 833.978754][ T8266] should_fail+0x23c/0x250 [ 833.983687][ T8266] __should_failslab+0x81/0x90 [ 833.989627][ T8266] ? kobject_uevent_env+0x1a7/0xc40 [ 833.995894][ T8266] should_failslab+0x5/0x20 [ 834.000394][ T8266] kmem_cache_alloc_trace+0x49/0x320 [ 834.005770][ T8266] ? vprintk_func+0x137/0x140 [ 834.011023][ T8266] ? dev_uevent_filter+0x70/0x70 [ 834.016393][ T8266] kobject_uevent_env+0x1a7/0xc40 [ 834.021587][ T8266] kobject_uevent+0x18/0x20 [ 834.026196][ T8266] loop_configure+0xb3c/0xcb0 [ 834.030874][ T8266] lo_ioctl+0x555/0x11f0 [ 834.035124][ T8266] ? path_openat+0x19ab/0x20b0 [ 834.040369][ T8266] ? putname+0xa5/0xc0 [ 834.044489][ T8266] ? ___cache_free+0x3c/0x300 [ 834.049276][ T8266] ? blkdev_common_ioctl+0x9c3/0x1010 [ 834.054812][ T8266] ? selinux_file_ioctl+0x8e0/0x970 [ 834.061059][ T8266] ? lo_release+0x120/0x120 [ 834.066019][ T8266] blkdev_ioctl+0x1d0/0x3c0 [ 834.071001][ T8266] block_ioctl+0x6d/0x80 [ 834.075239][ T8266] ? blkdev_iopoll+0x70/0x70 [ 834.079848][ T8266] __se_sys_ioctl+0xcb/0x140 [ 834.084577][ T8266] __x64_sys_ioctl+0x3f/0x50 [ 834.089229][ T8266] do_syscall_64+0x34/0x50 [ 834.093744][ T8266] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 834.099687][ T8266] RIP: 0033:0x466217 [ 834.103569][ T8266] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 834.123266][ T8266] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 834.131706][ T8266] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 834.139708][ T8266] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 834.147900][ T8266] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 14:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 834.156123][ T8266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 834.164463][ T8266] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 834.190171][ T8264] FAT-fs (loop4): Directory bread(block 6) failed [ 834.203048][ T8271] loop0: detected capacity change from 0 to 24576 14:12:35 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 834.239614][ T8271] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 834.250026][ T8271] EXT4-fs (loop0): group descriptors corrupted! [ 834.262096][ T8279] loop5: detected capacity change from 0 to 24576 [ 834.268925][ T8249] loop2: detected capacity change from 0 to 6 [ 834.278510][ T8279] EXT4-fs (loop5): unsupported descriptor size 0 14:12:35 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x5000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000000a0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 834.285586][ T8249] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000002c0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 834.344154][ T8291] loop3: detected capacity change from 0 to 6 [ 834.350334][ T8291] FAULT_INJECTION: forcing a failure. [ 834.350334][ T8291] name failslab, interval 1, probability 0, space 0, times 0 [ 834.362995][ T8291] CPU: 1 PID: 8291 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 834.373110][ T8291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.383268][ T8291] Call Trace: [ 834.384699][ T8300] loop1: detected capacity change from 0 to 24576 [ 834.387186][ T8291] dump_stack+0x137/0x19d [ 834.387215][ T8291] should_fail+0x23c/0x250 [ 834.387234][ T8291] __should_failslab+0x81/0x90 [ 834.407272][ T8291] ? kobject_uevent_env+0x1a7/0xc40 [ 834.412768][ T8291] should_failslab+0x5/0x20 [ 834.417666][ T8291] kmem_cache_alloc_trace+0x49/0x320 [ 834.423045][ T8291] ? vprintk_func+0x137/0x140 [ 834.427728][ T8291] ? dev_uevent_filter+0x70/0x70 [ 834.432696][ T8291] kobject_uevent_env+0x1a7/0xc40 [ 834.437847][ T8291] kobject_uevent+0x18/0x20 [ 834.442358][ T8291] loop_configure+0xb3c/0xcb0 [ 834.447137][ T8291] lo_ioctl+0x555/0x11f0 [ 834.451382][ T8291] ? path_openat+0x19ab/0x20b0 [ 834.456153][ T8291] ? putname+0xa5/0xc0 [ 834.460226][ T8291] ? ___cache_free+0x3c/0x300 [ 834.464913][ T8291] ? blkdev_common_ioctl+0x9c3/0x1010 [ 834.470361][ T8291] ? selinux_file_ioctl+0x8e0/0x970 [ 834.475568][ T8291] ? lo_release+0x120/0x120 [ 834.480084][ T8291] blkdev_ioctl+0x1d0/0x3c0 [ 834.484707][ T8291] block_ioctl+0x6d/0x80 [ 834.489071][ T8291] ? blkdev_iopoll+0x70/0x70 [ 834.493852][ T8291] __se_sys_ioctl+0xcb/0x140 [ 834.498592][ T8291] __x64_sys_ioctl+0x3f/0x50 [ 834.503214][ T8291] do_syscall_64+0x34/0x50 [ 834.510440][ T8291] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 834.516354][ T8291] RIP: 0033:0x466217 [ 834.522867][ T8291] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 834.542614][ T8291] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 834.551494][ T8291] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 834.559481][ T8291] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 834.567465][ T8291] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 834.575456][ T8291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 834.583620][ T8291] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 14:12:36 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 834.594944][ T8304] loop5: detected capacity change from 0 to 24576 [ 834.602305][ T8300] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 834.612634][ T8300] EXT4-fs (loop1): group descriptors corrupted! [ 834.622028][ T8297] loop4: detected capacity change from 0 to 6 14:12:36 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 834.644998][ T8304] EXT4-fs (loop5): unsupported descriptor size 0 [ 834.645007][ T8297] FAT-fs (loop4): Directory bread(block 6) failed [ 834.656587][ T8315] loop2: detected capacity change from 0 to 6 [ 834.677549][ T8315] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 834.682724][ T8319] loop0: detected capacity change from 0 to 24576 14:12:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000000b0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 834.697220][ T8319] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 834.707556][ T8319] EXT4-fs (loop0): group descriptors corrupted! [ 834.771806][ T8331] loop3: detected capacity change from 0 to 6 [ 834.780994][ T8332] loop1: detected capacity change from 0 to 24576 [ 834.791044][ T8332] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 834.798026][ T8331] FAULT_INJECTION: forcing a failure. [ 834.798026][ T8331] name failslab, interval 1, probability 0, space 0, times 0 [ 834.801319][ T8332] EXT4-fs (loop1): group descriptors corrupted! 14:12:36 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x6000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000002d0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 834.813953][ T8331] CPU: 1 PID: 8331 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 834.830881][ T8331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.841869][ T8331] Call Trace: [ 834.845270][ T8331] dump_stack+0x137/0x19d [ 834.849608][ T8331] should_fail+0x23c/0x250 [ 834.854025][ T8331] __should_failslab+0x81/0x90 [ 834.858811][ T8331] should_failslab+0x5/0x20 [ 834.863344][ T8331] kmem_cache_alloc_node+0x56/0x2f0 [ 834.868561][ T8331] ? __alloc_skb+0xed/0x420 [ 834.873312][ T8331] __alloc_skb+0xed/0x420 [ 834.877646][ T8331] alloc_uevent_skb+0x5b/0x120 [ 834.882498][ T8331] kobject_uevent_env+0x863/0xc40 [ 834.887529][ T8331] kobject_uevent+0x18/0x20 [ 834.892058][ T8331] loop_configure+0xb3c/0xcb0 [ 834.897090][ T8331] lo_ioctl+0x555/0x11f0 [ 834.901446][ T8331] ? path_openat+0x19ab/0x20b0 [ 834.906310][ T8331] ? putname+0xa5/0xc0 [ 834.910398][ T8331] ? ___cache_free+0x3c/0x300 [ 834.917592][ T8331] ? blkdev_common_ioctl+0x9c3/0x1010 [ 834.923064][ T8331] ? selinux_file_ioctl+0x8e0/0x970 [ 834.928304][ T8331] ? lo_release+0x120/0x120 [ 834.932828][ T8331] blkdev_ioctl+0x1d0/0x3c0 [ 834.939162][ T8331] block_ioctl+0x6d/0x80 [ 834.943406][ T8331] ? blkdev_iopoll+0x70/0x70 [ 834.947993][ T8331] __se_sys_ioctl+0xcb/0x140 [ 834.952608][ T8331] __x64_sys_ioctl+0x3f/0x50 [ 834.957875][ T8331] do_syscall_64+0x34/0x50 [ 834.962543][ T8331] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 834.968452][ T8331] RIP: 0033:0x466217 [ 834.972340][ T8331] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 834.991997][ T8331] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 835.001056][ T8331] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 835.009055][ T8331] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 835.018749][ T8331] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 835.026733][ T8331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 835.034776][ T8331] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 835.044519][ T8315] loop2: detected capacity change from 0 to 6 [ 835.066722][ T8340] loop5: detected capacity change from 0 to 24576 14:12:36 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000000c0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 835.088734][ T8340] EXT4-fs (loop5): unsupported descriptor size 0 [ 835.098116][ T8354] loop0: detected capacity change from 0 to 24576 [ 835.105086][ T8355] loop4: detected capacity change from 0 to 6 [ 835.121212][ T8355] FAT-fs (loop4): Directory bread(block 6) failed [ 835.123523][ T8354] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 14:12:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d550100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:36 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x6040000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:36 executing program 3 (fault-call:0 fault-nth:24): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 835.136605][ T8360] loop1: detected capacity change from 0 to 24576 [ 835.137883][ T8354] EXT4-fs (loop0): group descriptors corrupted! [ 835.152241][ T8360] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 835.162389][ T8360] EXT4-fs (loop1): group descriptors corrupted! 14:12:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000000d0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 835.192013][ T8372] loop5: detected capacity change from 0 to 24576 [ 835.196492][ T8375] loop2: detected capacity change from 0 to 6 [ 835.200368][ T8372] EXT4-fs (loop5): unsupported descriptor size 0 [ 835.219813][ T8376] loop3: detected capacity change from 0 to 6 [ 835.231156][ T8376] FAULT_INJECTION: forcing a failure. [ 835.231156][ T8376] name failslab, interval 1, probability 0, space 0, times 0 [ 835.244166][ T8376] CPU: 1 PID: 8376 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 835.254328][ T8376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.264984][ T8376] Call Trace: [ 835.268516][ T8376] dump_stack+0x137/0x19d [ 835.272962][ T8376] should_fail+0x23c/0x250 [ 835.277447][ T8376] __should_failslab+0x81/0x90 [ 835.282281][ T8376] should_failslab+0x5/0x20 [ 835.286930][ T8376] kmem_cache_alloc_node_trace+0x59/0x300 [ 835.292776][ T8376] ? __kmalloc_node_track_caller+0x30/0x40 [ 835.299302][ T8376] __kmalloc_node_track_caller+0x30/0x40 [ 835.305132][ T8376] ? alloc_uevent_skb+0x5b/0x120 [ 835.310065][ T8376] __alloc_skb+0x187/0x420 [ 835.314535][ T8376] alloc_uevent_skb+0x5b/0x120 [ 835.319297][ T8376] kobject_uevent_env+0x863/0xc40 [ 835.324415][ T8376] kobject_uevent+0x18/0x20 [ 835.328922][ T8376] loop_configure+0xb3c/0xcb0 [ 835.333688][ T8376] lo_ioctl+0x555/0x11f0 [ 835.338031][ T8376] ? path_openat+0x19ab/0x20b0 [ 835.342869][ T8376] ? putname+0xa5/0xc0 [ 835.347113][ T8376] ? ___cache_free+0x3c/0x300 [ 835.351809][ T8376] ? blkdev_common_ioctl+0x9c3/0x1010 [ 835.357359][ T8376] ? selinux_file_ioctl+0x8e0/0x970 [ 835.364892][ T8376] ? lo_release+0x120/0x120 [ 835.369432][ T8376] blkdev_ioctl+0x1d0/0x3c0 [ 835.373957][ T8376] block_ioctl+0x6d/0x80 [ 835.378219][ T8376] ? blkdev_iopoll+0x70/0x70 [ 835.382802][ T8376] __se_sys_ioctl+0xcb/0x140 [ 835.387576][ T8376] __x64_sys_ioctl+0x3f/0x50 [ 835.392175][ T8376] do_syscall_64+0x34/0x50 [ 835.396588][ T8376] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 835.402476][ T8376] RIP: 0033:0x466217 [ 835.406375][ T8376] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 835.426039][ T8376] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 835.434604][ T8376] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 835.442569][ T8376] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 835.450555][ T8376] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 835.458663][ T8376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 835.466871][ T8376] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 [ 835.485276][ T8375] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000002e0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:37 executing program 3 (fault-call:0 fault-nth:25): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d550100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 835.493995][ T8386] loop4: detected capacity change from 0 to 6 [ 835.534941][ T8399] loop1: detected capacity change from 0 to 24576 [ 835.546398][ T8399] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 835.556550][ T8399] EXT4-fs (loop1): group descriptors corrupted! [ 835.564624][ T8375] loop2: detected capacity change from 0 to 6 [ 835.570192][ T8396] loop0: detected capacity change from 0 to 24576 14:12:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000000e0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 835.581440][ T8396] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 835.592207][ T8396] EXT4-fs (loop0): group descriptors corrupted! [ 835.592903][ T8407] loop3: detected capacity change from 0 to 6 [ 835.607173][ T8406] loop5: detected capacity change from 0 to 24576 [ 835.609299][ T8375] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 835.613902][ T8386] loop4: detected capacity change from 0 to 6 [ 835.623508][ T8407] FAULT_INJECTION: forcing a failure. [ 835.623508][ T8407] name failslab, interval 1, probability 0, space 0, times 0 [ 835.642502][ T8407] CPU: 0 PID: 8407 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 835.653471][ T8407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.664450][ T8407] Call Trace: [ 835.667729][ T8407] dump_stack+0x137/0x19d [ 835.672313][ T8407] should_fail+0x23c/0x250 [ 835.676810][ T8407] ? skb_clone+0x12c/0x1f0 [ 835.682475][ T8407] __should_failslab+0x81/0x90 [ 835.687498][ T8407] should_failslab+0x5/0x20 [ 835.692231][ T8407] kmem_cache_alloc+0x46/0x300 [ 835.697126][ T8407] skb_clone+0x12c/0x1f0 [ 835.701453][ T8407] netlink_broadcast_filtered+0x50d/0xb90 [ 835.707205][ T8407] ? skb_put+0xb9/0xf0 [ 835.712000][ T8407] netlink_broadcast+0x35/0x50 [ 835.716892][ T8407] kobject_uevent_env+0x8c9/0xc40 [ 835.722297][ T8407] kobject_uevent+0x18/0x20 [ 835.727082][ T8407] loop_configure+0xb3c/0xcb0 [ 835.731793][ T8407] lo_ioctl+0x555/0x11f0 [ 835.736118][ T8407] ? path_openat+0x19ab/0x20b0 [ 835.741071][ T8407] ? putname+0xa5/0xc0 [ 835.745155][ T8407] ? ___cache_free+0x3c/0x300 [ 835.749824][ T8407] ? blkdev_common_ioctl+0x9c3/0x1010 [ 835.755338][ T8407] ? selinux_file_ioctl+0x8e0/0x970 [ 835.760658][ T8407] ? lo_release+0x120/0x120 [ 835.765291][ T8407] blkdev_ioctl+0x1d0/0x3c0 [ 835.769814][ T8407] block_ioctl+0x6d/0x80 [ 835.774069][ T8407] ? blkdev_iopoll+0x70/0x70 [ 835.779166][ T8407] __se_sys_ioctl+0xcb/0x140 [ 835.783856][ T8407] __x64_sys_ioctl+0x3f/0x50 [ 835.788657][ T8407] do_syscall_64+0x34/0x50 [ 835.793274][ T8407] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 835.799519][ T8407] RIP: 0033:0x466217 [ 835.803415][ T8407] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 835.823667][ T8407] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:12:37 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 835.832209][ T8407] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 835.840236][ T8407] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 835.848310][ T8407] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 835.856406][ T8407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 835.864442][ T8407] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 14:12:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000002f0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:37 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x7000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:37 executing program 3 (fault-call:0 fault-nth:26): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 835.892935][ T8406] EXT4-fs (loop5): unsupported descriptor size 0 14:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d550100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 835.967522][ T8430] loop2: detected capacity change from 0 to 6 [ 835.984889][ T8431] loop1: detected capacity change from 0 to 24576 [ 835.991549][ T8442] loop0: detected capacity change from 0 to 24576 [ 835.998295][ T8444] loop3: detected capacity change from 0 to 6 [ 836.005336][ T8430] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 836.006824][ T8444] FAULT_INJECTION: forcing a failure. [ 836.006824][ T8444] name failslab, interval 1, probability 0, space 0, times 0 [ 836.028296][ T8444] CPU: 1 PID: 8444 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 836.038781][ T8444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.048857][ T8444] Call Trace: [ 836.052146][ T8444] dump_stack+0x137/0x19d [ 836.056502][ T8444] should_fail+0x23c/0x250 [ 836.060946][ T8444] __should_failslab+0x81/0x90 [ 836.065767][ T8444] ? call_usermodehelper_setup+0x81/0x160 [ 836.071472][ T8444] should_failslab+0x5/0x20 [ 836.075967][ T8444] kmem_cache_alloc_trace+0x49/0x320 [ 836.081296][ T8444] ? add_uevent_var+0x16e/0x1c0 [ 836.086209][ T8444] ? __kfree_skb+0xfe/0x150 [ 836.090782][ T8444] call_usermodehelper_setup+0x81/0x160 [ 836.096316][ T8444] ? add_uevent_var+0x1c0/0x1c0 [ 836.101155][ T8444] kobject_uevent_env+0xb31/0xc40 [ 836.106304][ T8444] kobject_uevent+0x18/0x20 [ 836.110814][ T8444] loop_configure+0xb3c/0xcb0 [ 836.115497][ T8444] lo_ioctl+0x555/0x11f0 [ 836.119788][ T8444] ? path_openat+0x19ab/0x20b0 [ 836.124685][ T8444] ? putname+0xa5/0xc0 [ 836.128767][ T8444] ? ___cache_free+0x3c/0x300 [ 836.133630][ T8444] ? blkdev_common_ioctl+0x9c3/0x1010 [ 836.138986][ T8444] ? selinux_file_ioctl+0x8e0/0x970 [ 836.144189][ T8444] ? lo_release+0x120/0x120 [ 836.148707][ T8444] blkdev_ioctl+0x1d0/0x3c0 [ 836.155420][ T8444] block_ioctl+0x6d/0x80 [ 836.159930][ T8444] ? blkdev_iopoll+0x70/0x70 [ 836.164647][ T8444] __se_sys_ioctl+0xcb/0x140 [ 836.169647][ T8444] __x64_sys_ioctl+0x3f/0x50 [ 836.174311][ T8444] do_syscall_64+0x34/0x50 [ 836.178736][ T8444] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 836.184642][ T8444] RIP: 0033:0x466217 [ 836.188526][ T8444] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.209651][ T8444] RSP: 002b:00007f236f4c2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 836.218161][ T8444] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 836.226165][ T8444] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 836.234334][ T8444] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 836.243044][ T8444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 836.251026][ T8444] R13: 0000000000000004 R14: 00000000200002b0 R15: 0000000000000002 14:12:38 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:38 executing program 3 (fault-call:0 fault-nth:27): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 836.284603][ T8431] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 836.295860][ T8431] EXT4-fs (loop1): group descriptors corrupted! [ 836.300482][ T8447] loop4: detected capacity change from 0 to 6 [ 836.307544][ T8442] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 836.308796][ T8450] loop5: detected capacity change from 0 to 24576 [ 836.318500][ T8442] EXT4-fs (loop0): group descriptors corrupted! 14:12:38 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x8000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000000f0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 836.357121][ T8447] FAT-fs (loop4): Directory bread(block 6) failed [ 836.367293][ T8450] EXT4-fs (loop5): unsupported descriptor size 0 14:12:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000300000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 836.418113][ T8467] loop2: detected capacity change from 0 to 6 [ 836.425938][ T8467] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 836.459762][ T8466] loop3: detected capacity change from 0 to 6 [ 836.469325][ T8466] FAULT_INJECTION: forcing a failure. [ 836.469325][ T8466] name failslab, interval 1, probability 0, space 0, times 0 [ 836.477044][ T8480] loop4: detected capacity change from 0 to 6 [ 836.482100][ T8466] CPU: 1 PID: 8466 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 836.488331][ T8479] loop1: detected capacity change from 0 to 24576 [ 836.498274][ T8466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.498292][ T8466] Call Trace: [ 836.498300][ T8466] dump_stack+0x137/0x19d [ 836.498325][ T8466] should_fail+0x23c/0x250 [ 836.509542][ T8479] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 836.515012][ T8466] ? getname_flags+0x84/0x3d0 [ 836.515045][ T8466] __should_failslab+0x81/0x90 [ 836.519494][ T8479] EXT4-fs (loop1): group descriptors corrupted! [ 836.523793][ T8466] should_failslab+0x5/0x20 14:12:38 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x9000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 836.530241][ T8480] FAT-fs (loop4): Directory bread(block 6) failed [ 836.538690][ T8466] kmem_cache_alloc+0x46/0x300 [ 836.538721][ T8466] getname_flags+0x84/0x3d0 [ 836.562762][ T8482] loop0: detected capacity change from 0 to 24576 [ 836.565436][ T8466] do_mkdirat+0x3b/0x200 [ 836.565462][ T8466] __x64_sys_mkdir+0x32/0x40 [ 836.572251][ T8482] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 836.574715][ T8466] do_syscall_64+0x34/0x50 14:12:38 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 836.581165][ T8482] EXT4-fs (loop0): group descriptors corrupted! [ 836.585882][ T8466] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 836.595400][ T8488] loop5: detected capacity change from 0 to 24576 [ 836.601770][ T8466] RIP: 0033:0x465567 [ 836.601794][ T8466] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.601811][ T8466] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 14:12:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000004100000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000310000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 836.601830][ T8466] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000465567 [ 836.601840][ T8466] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 836.601853][ T8466] RBP: 00007f236f4c3040 R08: 0000000000000000 R09: ffffffffffffffff [ 836.610087][ T8488] EXT4-fs (loop5): unsupported descriptor size 0 [ 836.612598][ T8466] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200000c0 [ 836.612615][ T8466] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 836.637353][ T8495] loop2: detected capacity change from 0 to 6 14:12:38 executing program 3 (fault-call:0 fault-nth:28): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 836.739281][ T8495] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 836.759633][ T8511] loop4: detected capacity change from 0 to 6 [ 836.768300][ T8513] loop0: detected capacity change from 0 to 24576 [ 836.776588][ T8512] loop1: detected capacity change from 0 to 24576 [ 836.788995][ T8519] loop3: detected capacity change from 0 to 6 [ 836.796174][ T8512] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 836.797333][ T8513] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 836.806449][ T8512] EXT4-fs (loop1): group descriptors corrupted! [ 836.816881][ T8513] EXT4-fs (loop0): group descriptors corrupted! [ 836.822141][ T8523] loop5: detected capacity change from 0 to 24576 14:12:38 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xa000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 836.824992][ T8511] FAT-fs (loop4): Directory bread(block 6) failed [ 836.830553][ T8519] FAULT_INJECTION: forcing a failure. [ 836.830553][ T8519] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 836.850053][ T8495] loop2: detected capacity change from 0 to 6 [ 836.855643][ T8519] CPU: 1 PID: 8519 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 836.871918][ T8519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.882061][ T8519] Call Trace: [ 836.885505][ T8519] dump_stack+0x137/0x19d [ 836.889839][ T8519] should_fail+0x23c/0x250 [ 836.894257][ T8519] should_fail_usercopy+0x16/0x20 [ 836.899429][ T8519] strncpy_from_user+0x21/0x250 [ 836.904283][ T8519] getname_flags+0xb8/0x3d0 [ 836.908878][ T8519] do_mkdirat+0x3b/0x200 [ 836.913131][ T8519] __x64_sys_mkdir+0x32/0x40 [ 836.917723][ T8519] do_syscall_64+0x34/0x50 [ 836.922250][ T8519] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 836.928213][ T8519] RIP: 0033:0x465567 [ 836.932124][ T8519] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.951821][ T8519] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 836.960751][ T8519] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000465567 [ 836.968818][ T8519] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 836.976818][ T8519] RBP: 00007f236f4c3040 R08: 0000000000000000 R09: ffffffffffffffff 14:12:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000020100000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000320000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 836.985150][ T8519] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200000c0 [ 836.993161][ T8519] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 837.009169][ T8523] EXT4-fs (loop5): unsupported descriptor size 0 14:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 837.047193][ T8495] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:38 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:38 executing program 3 (fault-call:0 fault-nth:29): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 837.147233][ T8549] loop5: detected capacity change from 0 to 24576 [ 837.164073][ T8553] loop4: detected capacity change from 0 to 6 [ 837.174426][ T8551] loop1: detected capacity change from 0 to 24576 [ 837.181028][ T8549] EXT4-fs (loop5): unsupported descriptor size 0 [ 837.184944][ T8559] loop3: detected capacity change from 0 to 6 [ 837.194155][ T8559] FAULT_INJECTION: forcing a failure. [ 837.194155][ T8559] name failslab, interval 1, probability 0, space 0, times 0 [ 837.202568][ T8553] FAT-fs (loop4): Directory bread(block 6) failed [ 837.206958][ T8559] CPU: 1 PID: 8559 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 837.220001][ T8551] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 837.224198][ T8559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.234413][ T8551] EXT4-fs (loop1): group descriptors corrupted! [ 837.244442][ T8559] Call Trace: [ 837.244456][ T8559] dump_stack+0x137/0x19d [ 837.244479][ T8559] should_fail+0x23c/0x250 [ 837.253361][ T8564] loop2: detected capacity change from 0 to 6 [ 837.254498][ T8559] ? __d_alloc+0x36/0x370 [ 837.273668][ T8559] __should_failslab+0x81/0x90 [ 837.278478][ T8559] should_failslab+0x5/0x20 [ 837.283000][ T8559] kmem_cache_alloc+0x46/0x300 [ 837.287836][ T8559] __d_alloc+0x36/0x370 [ 837.292072][ T8559] d_alloc+0x2a/0x130 [ 837.296073][ T8559] __lookup_hash+0x8f/0x180 [ 837.300821][ T8559] filename_create+0xdb/0x3c0 [ 837.305516][ T8559] do_mkdirat+0x59/0x200 [ 837.309768][ T8559] __x64_sys_mkdir+0x32/0x40 [ 837.314838][ T8559] do_syscall_64+0x34/0x50 [ 837.319269][ T8559] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 837.325256][ T8559] RIP: 0033:0x465567 [ 837.329163][ T8559] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 837.348782][ T8559] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 837.358159][ T8559] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000465567 [ 837.366253][ T8559] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 837.374244][ T8559] RBP: 00007f236f4c3040 R08: 0000000000000000 R09: ffffffffffffffff [ 837.382227][ T8559] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200000c0 [ 837.390452][ T8559] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 14:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x5, &(0x7f0000000200)=[{&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:39 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xb000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 837.412192][ T8552] loop0: detected capacity change from 0 to 24576 [ 837.414534][ T8564] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 837.439140][ T8552] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 837.449551][ T8552] EXT4-fs (loop0): group descriptors corrupted! 14:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x5, &(0x7f0000000200)=[{&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:39 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 837.457118][ T8574] loop5: detected capacity change from 0 to 24576 [ 837.466012][ T8574] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:12:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000110000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:39 executing program 3 (fault-call:0 fault-nth:30): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000330000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 837.523627][ T8590] loop2: detected capacity change from 0 to 6 [ 837.545017][ T8595] loop5: detected capacity change from 0 to 24576 [ 837.554994][ T8596] loop1: detected capacity change from 0 to 24576 [ 837.562289][ T8587] loop4: detected capacity change from 0 to 6 [ 837.573170][ T8590] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 837.581825][ T8596] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 837.592043][ T8596] EXT4-fs (loop1): group descriptors corrupted! [ 837.593186][ T8587] FAT-fs (loop4): Directory bread(block 6) failed [ 837.599177][ T8603] loop3: detected capacity change from 0 to 6 [ 837.605488][ T8595] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 837.615343][ T8603] FAULT_INJECTION: forcing a failure. [ 837.615343][ T8603] name failslab, interval 1, probability 0, space 0, times 0 [ 837.632523][ T8603] CPU: 1 PID: 8603 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 837.643161][ T8603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.653543][ T8603] Call Trace: [ 837.656832][ T8603] dump_stack+0x137/0x19d [ 837.661678][ T8603] should_fail+0x23c/0x250 [ 837.666754][ T8603] ? ext4_alloc_inode+0x27/0x300 [ 837.671715][ T8603] __should_failslab+0x81/0x90 [ 837.677202][ T8603] ? set_qf_name+0x230/0x230 [ 837.681800][ T8603] should_failslab+0x5/0x20 [ 837.686383][ T8603] kmem_cache_alloc+0x46/0x300 [ 837.691673][ T8603] ? ebitmap_destroy+0x91/0xa0 [ 837.696638][ T8603] ? set_qf_name+0x230/0x230 [ 837.701392][ T8603] ext4_alloc_inode+0x27/0x300 [ 837.706160][ T8603] ? set_qf_name+0x230/0x230 [ 837.710761][ T8603] new_inode_pseudo+0x38/0x1c0 [ 837.715546][ T8603] new_inode+0x21/0x120 [ 837.719722][ T8603] __ext4_new_inode+0x126/0x2f10 [ 837.724678][ T8603] ? __dquot_initialize+0x131/0x7e0 [ 837.729986][ T8603] ext4_mkdir+0x28a/0x760 [ 837.734317][ T8603] vfs_mkdir+0x135/0x1f0 [ 837.738667][ T8603] do_mkdirat+0x11d/0x200 [ 837.743020][ T8603] __x64_sys_mkdir+0x32/0x40 [ 837.747659][ T8603] do_syscall_64+0x34/0x50 [ 837.752102][ T8603] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 837.758069][ T8603] RIP: 0033:0x465567 [ 837.761965][ T8603] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 837.782027][ T8603] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 837.790634][ T8603] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000465567 [ 837.798685][ T8603] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 837.807444][ T8603] RBP: 00007f236f4c3040 R08: 0000000000000000 R09: ffffffffffffffff [ 837.815417][ T8603] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200000c0 14:12:39 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xc000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x5, &(0x7f0000000200)=[{&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 837.823842][ T8603] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 837.855059][ T8612] loop0: detected capacity change from 0 to 24576 14:12:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000120000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 837.874846][ T8590] loop2: detected capacity change from 0 to 6 [ 837.898616][ T8627] loop1: detected capacity change from 0 to 24576 [ 837.905500][ T8590] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 837.909764][ T8612] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 14:12:39 executing program 3 (fault-call:0 fault-nth:31): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 837.924164][ T8612] EXT4-fs (loop0): group descriptors corrupted! [ 837.928890][ T8627] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 837.941611][ T8627] EXT4-fs (loop1): group descriptors corrupted! [ 837.950749][ T8634] loop5: detected capacity change from 0 to 24576 [ 837.952075][ T8638] loop3: detected capacity change from 0 to 6 [ 837.958291][ T8631] loop4: detected capacity change from 0 to 6 [ 837.970290][ T8638] FAULT_INJECTION: forcing a failure. [ 837.970290][ T8638] name failslab, interval 1, probability 0, space 0, times 0 [ 837.974074][ T8634] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 837.983272][ T8638] CPU: 0 PID: 8638 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 837.999478][ T8631] FAT-fs (loop4): Directory bread(block 6) failed [ 838.001755][ T8638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.001771][ T8638] Call Trace: [ 838.001780][ T8638] dump_stack+0x137/0x19d [ 838.027683][ T8638] should_fail+0x23c/0x250 [ 838.032355][ T8638] ? security_inode_alloc+0x30/0x180 [ 838.037970][ T8638] __should_failslab+0x81/0x90 [ 838.044050][ T8638] should_failslab+0x5/0x20 [ 838.049158][ T8638] kmem_cache_alloc+0x46/0x300 [ 838.054127][ T8638] security_inode_alloc+0x30/0x180 [ 838.059354][ T8638] inode_init_always+0x20b/0x420 [ 838.064641][ T8638] ? set_qf_name+0x230/0x230 [ 838.070653][ T8638] new_inode_pseudo+0x73/0x1c0 [ 838.076913][ T8638] new_inode+0x21/0x120 [ 838.081142][ T8638] __ext4_new_inode+0x126/0x2f10 [ 838.086085][ T8638] ? __dquot_initialize+0x131/0x7e0 [ 838.091565][ T8638] ext4_mkdir+0x28a/0x760 [ 838.095983][ T8638] vfs_mkdir+0x135/0x1f0 [ 838.100231][ T8638] do_mkdirat+0x11d/0x200 [ 838.104549][ T8638] __x64_sys_mkdir+0x32/0x40 [ 838.109129][ T8638] do_syscall_64+0x34/0x50 [ 838.113619][ T8638] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 838.119546][ T8638] RIP: 0033:0x465567 [ 838.123429][ T8638] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 838.145087][ T8638] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 838.153556][ T8638] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000465567 [ 838.161521][ T8638] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 14:12:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000130000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 838.169485][ T8638] RBP: 00007f236f4c3040 R08: 0000000000000000 R09: ffffffffffffffff [ 838.177615][ T8638] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200000c0 [ 838.185921][ T8638] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 14:12:39 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:39 executing program 3 (fault-call:0 fault-nth:32): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:39 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xd000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000340000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 838.290726][ T8657] loop5: detected capacity change from 0 to 24576 [ 838.296407][ T8655] loop1: detected capacity change from 0 to 24576 [ 838.299371][ T8657] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 838.326907][ T8663] loop3: detected capacity change from 0 to 6 [ 838.333991][ T8655] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 838.335354][ T8663] FAULT_INJECTION: forcing a failure. [ 838.335354][ T8663] name failslab, interval 1, probability 0, space 0, times 0 [ 838.344211][ T8655] EXT4-fs (loop1): group descriptors corrupted! [ 838.363235][ T8663] CPU: 1 PID: 8663 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 838.373418][ T8663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.383650][ T8663] Call Trace: [ 838.387543][ T8663] dump_stack+0x137/0x19d [ 838.392262][ T8663] should_fail+0x23c/0x250 [ 838.399170][ T8663] __should_failslab+0x81/0x90 [ 838.404049][ T8663] ? sidtab_sid2str_get+0x9c/0x130 [ 838.411759][ T8663] should_failslab+0x5/0x20 [ 838.416381][ T8663] __kmalloc_track_caller+0x64/0x360 [ 838.421936][ T8663] kmemdup+0x21/0x50 [ 838.426270][ T8663] sidtab_sid2str_get+0x9c/0x130 [ 838.431384][ T8663] security_sid_to_context_core+0x1cb/0x2d0 [ 838.437306][ T8663] security_sid_to_context_force+0x2f/0x40 [ 838.443116][ T8663] selinux_inode_init_security+0x496/0x540 [ 838.448935][ T8663] security_inode_init_security+0xd7/0x260 [ 838.454845][ T8663] ? ext4_init_security+0x40/0x40 [ 838.459869][ T8663] ext4_init_security+0x30/0x40 [ 838.464804][ T8663] __ext4_new_inode+0x2944/0x2f10 [ 838.470182][ T8663] ext4_mkdir+0x28a/0x760 [ 838.474783][ T8663] vfs_mkdir+0x135/0x1f0 [ 838.479138][ T8663] do_mkdirat+0x11d/0x200 [ 838.483640][ T8663] __x64_sys_mkdir+0x32/0x40 [ 838.488299][ T8663] do_syscall_64+0x34/0x50 [ 838.492791][ T8663] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 838.498700][ T8663] RIP: 0033:0x465567 [ 838.502591][ T8663] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 838.522367][ T8663] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 838.530802][ T8663] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000465567 14:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 838.538785][ T8663] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 838.546765][ T8663] RBP: 00007f236f4c3040 R08: 0000000000000000 R09: ffffffffffffffff [ 838.554817][ T8663] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200000c0 [ 838.562874][ T8663] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 838.585109][ T8668] loop2: detected capacity change from 0 to 6 [ 838.605233][ T8669] loop0: detected capacity change from 0 to 24576 [ 838.630822][ T8668] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 838.641087][ T8669] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 14:12:40 executing program 3 (fault-call:0 fault-nth:33): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000180000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 838.652206][ T8669] EXT4-fs (loop0): group descriptors corrupted! 14:12:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000350000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 838.701758][ T8686] loop5: detected capacity change from 0 to 24576 [ 838.710766][ T8668] loop2: detected capacity change from 0 to 6 [ 838.718845][ T8687] loop4: detected capacity change from 0 to 6 [ 838.734914][ T8698] loop3: detected capacity change from 0 to 6 [ 838.741244][ T8668] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 838.751534][ T8686] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 838.753046][ T8687] FAT-fs (loop4): Directory bread(block 6) failed [ 838.768067][ T8698] FAULT_INJECTION: forcing a failure. [ 838.768067][ T8698] name failslab, interval 1, probability 0, space 0, times 0 [ 838.780952][ T8698] CPU: 1 PID: 8698 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 838.785477][ T8700] loop1: detected capacity change from 0 to 24576 [ 838.791036][ T8698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.791053][ T8698] Call Trace: [ 838.791062][ T8698] dump_stack+0x137/0x19d [ 838.791087][ T8698] should_fail+0x23c/0x250 [ 838.819554][ T8698] __should_failslab+0x81/0x90 [ 838.824317][ T8698] ? kcalloc+0x32/0x50 [ 838.828397][ T8698] should_failslab+0x5/0x20 [ 838.832898][ T8698] __kmalloc+0x66/0x360 [ 838.837253][ T8698] kcalloc+0x32/0x50 [ 838.841154][ T8698] ext4_find_extent+0x21c/0x7f0 [ 838.845998][ T8698] ? __cond_resched+0x11/0x40 [ 838.850669][ T8698] ext4_ext_map_blocks+0xd9/0x1f00 [ 838.855778][ T8698] ? mark_buffer_dirty+0x151/0x200 [ 838.860948][ T8698] ? __ext4_handle_dirty_metadata+0x20c/0x590 [ 838.867024][ T8698] ? __down_read_common+0x16b/0x5a0 [ 838.872308][ T8698] ? percpu_counter_add_batch+0x69/0xd0 [ 838.877855][ T8698] ? ext4_es_lookup_extent+0x206/0x490 [ 838.883401][ T8698] ext4_map_blocks+0x1be/0xef0 [ 838.888655][ T8698] ext4_getblk+0xb1/0x3d0 [ 838.893003][ T8698] ext4_bread+0x28/0x130 [ 838.897469][ T8698] ext4_append+0xd1/0x1c0 [ 838.901793][ T8698] ext4_init_new_dir+0x177/0x500 [ 838.906814][ T8698] ext4_mkdir+0x329/0x760 [ 838.911198][ T8698] vfs_mkdir+0x135/0x1f0 [ 838.915551][ T8698] do_mkdirat+0x11d/0x200 [ 838.919873][ T8698] __x64_sys_mkdir+0x32/0x40 [ 838.924462][ T8698] do_syscall_64+0x34/0x50 [ 838.928877][ T8698] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 838.934783][ T8698] RIP: 0033:0x465567 [ 838.938688][ T8698] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 838.958762][ T8698] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 838.967181][ T8698] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000465567 [ 838.975695][ T8698] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 838.983764][ T8698] RBP: 00007f236f4c3040 R08: 0000000000000000 R09: ffffffffffffffff [ 838.991849][ T8698] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200000c0 14:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 838.999837][ T8698] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 839.009659][ T8700] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 839.019946][ T8700] EXT4-fs (loop1): group descriptors corrupted! [ 839.031358][ T8706] loop0: detected capacity change from 0 to 24576 [ 839.040073][ T8706] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 14:12:40 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xe000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:40 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000190000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:40 executing program 3 (fault-call:0 fault-nth:34): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 839.050198][ T8706] EXT4-fs (loop0): group descriptors corrupted! [ 839.062187][ T8712] loop5: detected capacity change from 0 to 24576 [ 839.070062][ T8712] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:12:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000360000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 839.113885][ T8719] loop4: detected capacity change from 0 to 6 [ 839.122057][ T8719] FAT-fs (loop4): Directory bread(block 6) failed [ 839.134641][ T8726] loop1: detected capacity change from 0 to 24576 [ 839.140262][ T8728] loop3: detected capacity change from 0 to 6 [ 839.148435][ T8728] FAULT_INJECTION: forcing a failure. [ 839.148435][ T8728] name failslab, interval 1, probability 0, space 0, times 0 [ 839.161478][ T8728] CPU: 0 PID: 8728 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 839.171706][ T8728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.181774][ T8728] Call Trace: [ 839.185061][ T8728] dump_stack+0x137/0x19d [ 839.189403][ T8728] should_fail+0x23c/0x250 [ 839.193908][ T8728] ? __es_insert_extent+0x51f/0xe80 [ 839.199113][ T8728] __should_failslab+0x81/0x90 [ 839.203898][ T8728] should_failslab+0x5/0x20 [ 839.208908][ T8728] kmem_cache_alloc+0x46/0x300 [ 839.213691][ T8728] __es_insert_extent+0x51f/0xe80 [ 839.218734][ T8728] ? __kmalloc+0x1e0/0x360 [ 839.223179][ T8728] ? kcalloc+0x32/0x50 [ 839.227275][ T8728] ext4_es_insert_extent+0x1bb/0x19d0 [ 839.232660][ T8728] ? ext4_ext_convert_to_initialized+0xf50/0xf50 [ 839.239019][ T8728] ext4_ext_map_blocks+0xf79/0x1f00 [ 839.244236][ T8728] ? __ext4_handle_dirty_metadata+0x20c/0x590 [ 839.252613][ T8728] ? __down_read_common+0x16b/0x5a0 [ 839.257935][ T8728] ? percpu_counter_add_batch+0x69/0xd0 [ 839.263860][ T8728] ? ext4_es_lookup_extent+0x206/0x490 [ 839.270891][ T8728] ext4_map_blocks+0x1be/0xef0 [ 839.430180][ T8728] ext4_getblk+0xb1/0x3d0 [ 839.434572][ T8728] ext4_bread+0x28/0x130 [ 839.439805][ T8728] ext4_append+0xd1/0x1c0 [ 839.444302][ T8728] ext4_init_new_dir+0x177/0x500 [ 839.449258][ T8728] ext4_mkdir+0x329/0x760 [ 839.453605][ T8728] vfs_mkdir+0x135/0x1f0 [ 839.457871][ T8728] do_mkdirat+0x11d/0x200 [ 839.462256][ T8728] __x64_sys_mkdir+0x32/0x40 [ 839.466931][ T8728] do_syscall_64+0x34/0x50 [ 839.471375][ T8728] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 839.477295][ T8728] RIP: 0033:0x465567 [ 839.481223][ T8728] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 839.500916][ T8728] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 839.509543][ T8728] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000465567 [ 839.517716][ T8728] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 14:12:41 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 839.525885][ T8728] RBP: 00007f236f4c3040 R08: 0000000000000000 R09: ffffffffffffffff [ 839.533865][ T8728] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200000c0 [ 839.541929][ T8728] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 839.564562][ T8733] loop0: detected capacity change from 0 to 24576 14:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040), 0x0, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 839.572946][ T8726] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 839.574198][ T8733] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 839.583570][ T8726] EXT4-fs (loop1): group descriptors corrupted! [ 839.593657][ T8733] EXT4-fs (loop0): group descriptors corrupted! [ 839.607857][ T8742] loop2: detected capacity change from 0 to 6 [ 839.617486][ T8742] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 839.623462][ T8747] loop5: detected capacity change from 0 to 24576 14:12:41 executing program 3 (fault-call:0 fault-nth:35): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000001b0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 839.665173][ T8747] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 839.682365][ T8756] loop4: detected capacity change from 0 to 6 [ 839.688692][ T8742] loop2: detected capacity change from 0 to 6 [ 839.700060][ T8742] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 839.705006][ T8768] loop1: detected capacity change from 0 to 24576 14:12:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000370000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 839.717662][ T8768] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 839.732411][ T8768] EXT4-fs (loop1): group descriptors corrupted! [ 839.734995][ T8764] loop3: detected capacity change from 0 to 6 [ 839.745509][ T8764] FAULT_INJECTION: forcing a failure. [ 839.745509][ T8764] name failslab, interval 1, probability 0, space 0, times 0 [ 839.758749][ T8764] CPU: 0 PID: 8764 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 839.760723][ T8756] FAT-fs (loop4): Directory bread(block 6) failed [ 839.768822][ T8764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.768839][ T8764] Call Trace: [ 839.768847][ T8764] dump_stack+0x137/0x19d [ 839.768871][ T8764] should_fail+0x23c/0x250 [ 839.768886][ T8764] __should_failslab+0x81/0x90 [ 839.803317][ T8764] ? kcalloc+0x32/0x50 [ 839.807400][ T8764] should_failslab+0x5/0x20 [ 839.811974][ T8764] __kmalloc+0x66/0x360 [ 839.816560][ T8764] ? kcalloc+0x32/0x50 [ 839.820623][ T8764] kcalloc+0x32/0x50 [ 839.824512][ T8764] ext4_find_extent+0x21c/0x7f0 [ 839.829422][ T8764] ? kfree+0xf0/0x1d0 [ 839.834712][ T8764] ext4_ext_map_blocks+0xd9/0x1f00 [ 839.839837][ T8764] ? __ext4_handle_dirty_metadata+0x20c/0x590 [ 839.845903][ T8764] ? __down_write_common+0x45/0x890 [ 839.851113][ T8764] ? __down_read_common+0x16b/0x5a0 [ 839.856315][ T8764] ? percpu_counter_add_batch+0x69/0xd0 [ 839.861975][ T8764] ? ext4_es_lookup_extent+0x206/0x490 [ 839.867441][ T8764] ext4_map_blocks+0x70d/0xef0 [ 839.872233][ T8764] ext4_getblk+0xb1/0x3d0 [ 839.876563][ T8764] ext4_bread+0x28/0x130 [ 839.880834][ T8764] ext4_append+0xd1/0x1c0 [ 839.886929][ T8764] ext4_init_new_dir+0x177/0x500 [ 839.891879][ T8764] ext4_mkdir+0x329/0x760 [ 839.896242][ T8764] vfs_mkdir+0x135/0x1f0 [ 839.900595][ T8764] do_mkdirat+0x11d/0x200 [ 839.905166][ T8764] __x64_sys_mkdir+0x32/0x40 [ 839.909887][ T8764] do_syscall_64+0x34/0x50 [ 839.914367][ T8764] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 839.920277][ T8764] RIP: 0033:0x465567 [ 839.924202][ T8764] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 839.943806][ T8764] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 839.952351][ T8764] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000465567 [ 839.960508][ T8764] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 14:12:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000200000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:41 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040), 0x0, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 839.968485][ T8764] RBP: 00007f236f4c3040 R08: 0000000000000000 R09: ffffffffffffffff [ 839.976540][ T8764] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200000c0 [ 839.984531][ T8764] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 14:12:41 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x10000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 840.041406][ T8784] loop2: detected capacity change from 0 to 6 [ 840.045286][ T8783] loop0: detected capacity change from 0 to 24576 [ 840.054174][ T8784] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 840.065507][ T8787] loop5: detected capacity change from 0 to 24576 [ 840.077680][ T8787] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:12:41 executing program 3 (fault-call:0 fault-nth:36): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 840.086251][ T8783] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 840.096437][ T8783] EXT4-fs (loop0): group descriptors corrupted! 14:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040), 0x0, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 840.135374][ T8800] loop1: detected capacity change from 0 to 24576 [ 840.156141][ T8799] loop4: detected capacity change from 0 to 6 [ 840.163211][ T8784] loop2: detected capacity change from 0 to 6 [ 840.163898][ T8800] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! 14:12:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000380000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 840.171125][ T8784] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 840.179594][ T8800] EXT4-fs (loop1): group descriptors corrupted! [ 840.194671][ T8808] loop3: detected capacity change from 0 to 6 [ 840.206634][ T8818] loop5: detected capacity change from 0 to 24576 [ 840.208510][ T8799] FAT-fs (loop4): Directory bread(block 6) failed [ 840.219724][ T8808] FAULT_INJECTION: forcing a failure. [ 840.219724][ T8808] name failslab, interval 1, probability 0, space 0, times 0 [ 840.232779][ T8808] CPU: 0 PID: 8808 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 840.243125][ T8808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.253272][ T8808] Call Trace: [ 840.256735][ T8808] dump_stack+0x137/0x19d [ 840.261076][ T8808] should_fail+0x23c/0x250 [ 840.265512][ T8808] ? ext4_mb_new_blocks+0x2e7/0x1f60 [ 840.270810][ T8808] __should_failslab+0x81/0x90 [ 840.275610][ T8808] should_failslab+0x5/0x20 [ 840.280128][ T8808] kmem_cache_alloc+0x46/0x300 [ 840.285035][ T8808] ext4_mb_new_blocks+0x2e7/0x1f60 [ 840.290153][ T8808] ? ext4_find_extent+0x6cf/0x7f0 [ 840.295258][ T8808] ? ext4_ext_search_right+0x300/0x540 [ 840.300754][ T8808] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 840.306537][ T8808] ext4_ext_map_blocks+0x1569/0x1f00 [ 840.311859][ T8808] ? __down_read_common+0x16b/0x5a0 [ 840.317170][ T8808] ? percpu_counter_add_batch+0x69/0xd0 [ 840.322787][ T8808] ? ext4_es_lookup_extent+0x206/0x490 [ 840.328585][ T8808] ext4_map_blocks+0x70d/0xef0 [ 840.333876][ T8808] ext4_getblk+0xb1/0x3d0 [ 840.338226][ T8808] ext4_bread+0x28/0x130 [ 840.342609][ T8808] ext4_append+0xd1/0x1c0 [ 840.346956][ T8808] ext4_init_new_dir+0x177/0x500 [ 840.351929][ T8808] ext4_mkdir+0x329/0x760 [ 840.356300][ T8808] vfs_mkdir+0x135/0x1f0 [ 840.360592][ T8808] do_mkdirat+0x11d/0x200 [ 840.364985][ T8808] __x64_sys_mkdir+0x32/0x40 [ 840.369611][ T8808] do_syscall_64+0x34/0x50 [ 840.374038][ T8808] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 840.379965][ T8808] RIP: 0033:0x465567 [ 840.383867][ T8808] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 840.403582][ T8808] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 840.412257][ T8808] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000465567 [ 840.420338][ T8808] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 840.428860][ T8808] RBP: 00007f236f4c3040 R08: 0000000000000000 R09: ffffffffffffffff 14:12:42 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 840.436840][ T8808] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200000c0 [ 840.445252][ T8808] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 840.464533][ T8818] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:12:42 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x11000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000010200000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f465", 0x33, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 840.500369][ T8827] loop0: detected capacity change from 0 to 24576 [ 840.523859][ T8827] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 840.534786][ T8827] EXT4-fs (loop0): group descriptors corrupted! 14:12:42 executing program 3 (fault-call:0 fault-nth:37): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 840.569318][ T8835] loop2: detected capacity change from 0 to 6 [ 840.575422][ T8841] loop5: detected capacity change from 0 to 24576 [ 840.622581][ T8841] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 840.629186][ T8843] loop1: detected capacity change from 0 to 24576 [ 840.640502][ T8851] loop3: detected capacity change from 0 to 6 [ 840.647909][ T8835] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 840.648257][ T8843] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! 14:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f465", 0x33, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000390000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 840.667115][ T8843] EXT4-fs (loop1): group descriptors corrupted! [ 840.674197][ T8851] FAULT_INJECTION: forcing a failure. [ 840.674197][ T8851] name failslab, interval 1, probability 0, space 0, times 0 [ 840.686897][ T8851] CPU: 0 PID: 8851 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 840.697084][ T8851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.707160][ T8851] Call Trace: [ 840.710475][ T8851] dump_stack+0x137/0x19d [ 840.714921][ T8851] should_fail+0x23c/0x250 [ 840.719408][ T8851] ? ext4_mb_new_blocks+0x6f2/0x1f60 [ 840.720591][ T8840] loop4: detected capacity change from 0 to 6 [ 840.725158][ T8851] __should_failslab+0x81/0x90 [ 840.736286][ T8851] should_failslab+0x5/0x20 [ 840.740898][ T8851] kmem_cache_alloc+0x46/0x300 [ 840.745706][ T8851] ext4_mb_new_blocks+0x6f2/0x1f60 [ 840.750909][ T8851] ? ext4_find_extent+0x6cf/0x7f0 [ 840.755942][ T8851] ? ext4_ext_search_right+0x300/0x540 [ 840.761390][ T8851] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 840.767185][ T8851] ext4_ext_map_blocks+0x1569/0x1f00 [ 840.772648][ T8851] ? __down_read_common+0x16b/0x5a0 [ 840.778177][ T8851] ? percpu_counter_add_batch+0x69/0xd0 [ 840.784342][ T8851] ? ext4_es_lookup_extent+0x206/0x490 [ 840.789906][ T8851] ext4_map_blocks+0x70d/0xef0 [ 840.794791][ T8851] ext4_getblk+0xb1/0x3d0 [ 840.799162][ T8851] ext4_bread+0x28/0x130 [ 840.803682][ T8851] ext4_append+0xd1/0x1c0 [ 840.808396][ T8851] ext4_init_new_dir+0x177/0x500 [ 840.813449][ T8851] ext4_mkdir+0x329/0x760 [ 840.817878][ T8851] vfs_mkdir+0x135/0x1f0 [ 840.822164][ T8851] do_mkdirat+0x11d/0x200 [ 840.826489][ T8851] __x64_sys_mkdir+0x32/0x40 [ 840.831182][ T8851] do_syscall_64+0x34/0x50 [ 840.835646][ T8851] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 840.842355][ T8851] RIP: 0033:0x465567 [ 840.846345][ T8851] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 840.866862][ T8851] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 840.875364][ T8851] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000465567 [ 840.883625][ T8851] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 840.891973][ T8851] RBP: 00007f236f4c3040 R08: 0000000000000000 R09: ffffffffffffffff [ 840.899944][ T8851] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200000c0 [ 840.908309][ T8851] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 14:12:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000220000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 840.969545][ T8840] FAT-fs (loop4): Directory bread(block 6) failed [ 840.978569][ T8865] loop0: detected capacity change from 0 to 24576 [ 840.981862][ T8862] loop5: detected capacity change from 0 to 24576 [ 840.994775][ T8835] loop2: detected capacity change from 0 to 6 [ 841.019105][ T8862] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 841.028740][ T8865] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 841.039584][ T8865] EXT4-fs (loop0): group descriptors corrupted! [ 841.053202][ T8835] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:42 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x12000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:42 executing program 3 (fault-call:0 fault-nth:38): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f465", 0x33, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:42 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000003a0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000250000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 841.072709][ T8878] loop1: detected capacity change from 0 to 24576 [ 841.097778][ T8878] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 841.107929][ T8878] EXT4-fs (loop1): group descriptors corrupted! [ 841.176647][ T8888] loop3: detected capacity change from 0 to 6 [ 841.182913][ T8889] loop5: detected capacity change from 0 to 24576 [ 841.188618][ T8888] FAULT_INJECTION: forcing a failure. [ 841.188618][ T8888] name failslab, interval 1, probability 0, space 0, times 0 [ 841.190345][ T8900] loop4: detected capacity change from 0 to 6 [ 841.208174][ T8888] CPU: 1 PID: 8888 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 841.227990][ T8893] loop2: detected capacity change from 0 to 6 [ 841.256700][ T8888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.256716][ T8888] Call Trace: [ 841.256729][ T8888] dump_stack+0x137/0x19d [ 841.256753][ T8888] should_fail+0x23c/0x250 [ 841.339649][ T8888] ? __es_insert_extent+0x51f/0xe80 [ 841.345128][ T8888] __should_failslab+0x81/0x90 [ 841.349927][ T8888] should_failslab+0x5/0x20 [ 841.354432][ T8888] kmem_cache_alloc+0x46/0x300 [ 841.359200][ T8888] __es_insert_extent+0x51f/0xe80 [ 841.364230][ T8888] ext4_es_insert_extent+0x1bb/0x19d0 [ 841.369626][ T8888] ? percpu_counter_add_batch+0x69/0xd0 [ 841.377384][ T8888] ? ext4_es_lookup_extent+0x206/0x490 [ 841.383075][ T8888] ext4_map_blocks+0xa4c/0xef0 [ 841.387851][ T8888] ext4_getblk+0xb1/0x3d0 [ 841.392225][ T8888] ext4_bread+0x28/0x130 [ 841.396464][ T8888] ext4_append+0xd1/0x1c0 [ 841.400852][ T8888] ext4_init_new_dir+0x177/0x500 [ 841.405786][ T8888] ext4_mkdir+0x329/0x760 [ 841.410163][ T8888] vfs_mkdir+0x135/0x1f0 [ 841.414472][ T8888] do_mkdirat+0x11d/0x200 [ 841.418813][ T8888] __x64_sys_mkdir+0x32/0x40 [ 841.423412][ T8888] do_syscall_64+0x34/0x50 [ 841.427838][ T8888] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 841.433866][ T8888] RIP: 0033:0x465567 [ 841.437753][ T8888] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.457577][ T8888] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 841.466101][ T8888] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000465567 [ 841.474094][ T8888] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 841.482071][ T8888] RBP: 00007f236f4c3040 R08: 0000000000000000 R09: ffffffffffffffff [ 841.490131][ T8888] R10: 0000000000000000 R11: 0000000000000213 R12: 00000000200000c0 [ 841.498134][ T8888] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 841.507560][ T8889] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 841.507660][ T8907] loop0: detected capacity change from 0 to 24576 [ 841.514589][ T8900] FAT-fs (loop4): Directory bread(block 6) failed [ 841.528352][ T8907] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 841.538492][ T8907] EXT4-fs (loop0): group descriptors corrupted! [ 841.551974][ T8893] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:43 executing program 3 (fault-call:0 fault-nth:39): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 841.553161][ T8902] loop1: detected capacity change from 0 to 24576 14:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 841.598714][ T8902] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 841.609025][ T8902] EXT4-fs (loop1): group descriptors corrupted! 14:12:43 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x18000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000003b0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 841.649089][ T8920] loop3: detected capacity change from 0 to 6 [ 841.657892][ T8920] FAULT_INJECTION: forcing a failure. [ 841.657892][ T8920] name failslab, interval 1, probability 0, space 0, times 0 [ 841.670734][ T8920] CPU: 0 PID: 8920 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 841.680823][ T8920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.690897][ T8920] Call Trace: [ 841.694206][ T8920] dump_stack+0x137/0x19d [ 841.698522][ T8920] should_fail+0x23c/0x250 [ 841.703467][ T8920] __should_failslab+0x81/0x90 [ 841.708481][ T8920] ? __se_sys_mount+0x4e/0x2e0 [ 841.713273][ T8920] should_failslab+0x5/0x20 [ 841.717776][ T8920] __kmalloc_track_caller+0x64/0x360 [ 841.723084][ T8920] ? strnlen_user+0x137/0x1c0 [ 841.727748][ T8920] strndup_user+0x73/0x120 [ 841.732150][ T8920] __se_sys_mount+0x4e/0x2e0 [ 841.736873][ T8920] ? mntput+0x45/0x70 [ 841.740873][ T8920] ? do_mkdirat+0x1c7/0x200 [ 841.745481][ T8920] __x64_sys_mount+0x63/0x70 [ 841.750072][ T8920] do_syscall_64+0x34/0x50 [ 841.754862][ T8920] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 841.760762][ T8920] RIP: 0033:0x46797a [ 841.764712][ T8920] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.784911][ T8920] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:12:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000002e0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 841.793344][ T8920] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 841.801308][ T8920] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 841.809274][ T8920] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 841.817346][ T8920] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 841.825617][ T8920] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 14:12:43 executing program 3 (fault-call:0 fault-nth:40): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 841.898921][ T8931] loop4: detected capacity change from 0 to 6 [ 841.900836][ T8929] loop0: detected capacity change from 0 to 24576 [ 841.905263][ T8893] loop2: detected capacity change from 0 to 6 [ 841.913668][ T8929] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 841.927937][ T8929] EXT4-fs (loop0): group descriptors corrupted! [ 841.934783][ T8940] loop5: detected capacity change from 0 to 24576 [ 841.941995][ T8893] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 841.961435][ T8931] FAT-fs (loop4): Directory bread(block 6) failed [ 841.973261][ T8940] EXT4-fs (loop5): invalid first ino: 0 [ 841.979211][ T8943] loop1: detected capacity change from 0 to 24576 14:12:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000003c0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 842.008857][ T8943] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 842.019143][ T8943] EXT4-fs (loop1): group descriptors corrupted! 14:12:43 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x19000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:43 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 842.058873][ T8954] loop3: detected capacity change from 0 to 6 [ 842.074001][ T8954] FAULT_INJECTION: forcing a failure. [ 842.074001][ T8954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 842.087120][ T8954] CPU: 1 PID: 8954 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 842.097317][ T8954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:12:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000300000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 842.107393][ T8954] Call Trace: [ 842.110679][ T8954] dump_stack+0x137/0x19d [ 842.115021][ T8954] should_fail+0x23c/0x250 [ 842.119647][ T8954] should_fail_usercopy+0x16/0x20 [ 842.120150][ T8961] loop0: detected capacity change from 0 to 24576 [ 842.124740][ T8954] _copy_from_user+0x1c/0xd0 [ 842.124768][ T8954] strndup_user+0xb0/0x120 [ 842.124791][ T8954] __se_sys_mount+0x4e/0x2e0 [ 842.124812][ T8954] ? mntput+0x45/0x70 [ 842.148821][ T8954] ? __fpregs_load_activate+0x103/0x1b0 [ 842.154402][ T8954] __x64_sys_mount+0x63/0x70 [ 842.155456][ T8969] loop1: detected capacity change from 0 to 24576 [ 842.159013][ T8954] do_syscall_64+0x34/0x50 [ 842.165613][ T8970] loop5: detected capacity change from 0 to 24576 [ 842.169863][ T8954] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 842.182869][ T8954] RIP: 0033:0x46797a [ 842.186850][ T8954] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 842.206504][ T8954] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 842.214926][ T8954] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 842.222923][ T8954] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 842.230905][ T8954] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 842.238888][ T8954] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 842.246956][ T8954] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 842.255802][ T8961] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 842.261818][ T8970] EXT4-fs (loop5): invalid first ino: 0 [ 842.265985][ T8961] EXT4-fs (loop0): group descriptors corrupted! [ 842.271969][ T8969] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 842.287988][ T8969] EXT4-fs (loop1): group descriptors corrupted! 14:12:44 executing program 3 (fault-call:0 fault-nth:41): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000003d0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000320000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 842.396542][ T8991] loop3: detected capacity change from 0 to 6 [ 842.403499][ T8994] loop5: detected capacity change from 0 to 24576 [ 842.414140][ T8991] FAULT_INJECTION: forcing a failure. [ 842.414140][ T8991] name failslab, interval 1, probability 0, space 0, times 0 [ 842.426806][ T8991] CPU: 0 PID: 8991 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 842.436885][ T8991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.444323][ T8984] loop2: detected capacity change from 0 to 6 [ 842.446958][ T8991] Call Trace: [ 842.446968][ T8991] dump_stack+0x137/0x19d [ 842.446992][ T8991] should_fail+0x23c/0x250 [ 842.454548][ T8988] loop4: detected capacity change from 0 to 6 [ 842.456337][ T8991] __should_failslab+0x81/0x90 [ 842.456364][ T8991] ? __se_sys_mount+0x91/0x2e0 [ 842.464314][ T9000] loop0: detected capacity change from 0 to 24576 [ 842.465080][ T8991] should_failslab+0x5/0x20 [ 842.491655][ T8991] __kmalloc_track_caller+0x64/0x360 [ 842.496974][ T8991] ? strnlen_user+0x137/0x1c0 [ 842.501721][ T8991] strndup_user+0x73/0x120 [ 842.506145][ T8991] __se_sys_mount+0x91/0x2e0 [ 842.511017][ T8991] ? mntput+0x45/0x70 [ 842.515085][ T8991] ? do_mkdirat+0x1c7/0x200 [ 842.519626][ T8991] __x64_sys_mount+0x63/0x70 [ 842.524271][ T8991] do_syscall_64+0x34/0x50 [ 842.528701][ T8991] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 842.534665][ T8991] RIP: 0033:0x46797a [ 842.538556][ T8991] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 842.558244][ T8991] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 842.566737][ T8991] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 842.574712][ T8991] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 842.582817][ T8991] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 842.590845][ T8991] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 842.598840][ T8991] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 842.608966][ T8984] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 842.620926][ T8988] FAT-fs (loop4): Directory bread(block 6) failed [ 842.634653][ T9000] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 14:12:44 executing program 3 (fault-call:0 fault-nth:42): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 842.644908][ T9000] EXT4-fs (loop0): group descriptors corrupted! [ 842.649893][ T9007] loop1: detected capacity change from 0 to 24576 [ 842.651634][ T8994] EXT4-fs (loop5): invalid first ino: 0 [ 842.683454][ T8984] loop2: detected capacity change from 0 to 6 14:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:44 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x20000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000003e0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 842.696052][ T8984] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 842.705173][ T9007] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 842.715823][ T9007] EXT4-fs (loop1): group descriptors corrupted! [ 842.724753][ T9021] loop3: detected capacity change from 0 to 6 14:12:44 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000001320000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 842.751277][ T9021] FAULT_INJECTION: forcing a failure. [ 842.751277][ T9021] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 842.764380][ T9021] CPU: 1 PID: 9021 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 842.774834][ T9021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.785093][ T9021] Call Trace: [ 842.788424][ T9021] dump_stack+0x137/0x19d [ 842.792790][ T9021] should_fail+0x23c/0x250 [ 842.795374][ T9034] loop5: detected capacity change from 0 to 24576 [ 842.797220][ T9021] should_fail_usercopy+0x16/0x20 [ 842.809482][ T9021] _copy_from_user+0x1c/0xd0 [ 842.813170][ T9035] loop0: detected capacity change from 0 to 24576 [ 842.815232][ T9021] strndup_user+0xb0/0x120 [ 842.821968][ T9038] loop2: detected capacity change from 0 to 6 [ 842.826130][ T9021] __se_sys_mount+0x91/0x2e0 [ 842.826159][ T9021] ? mntput+0x45/0x70 [ 842.840782][ T9021] ? do_mkdirat+0x1c7/0x200 [ 842.845295][ T9021] __x64_sys_mount+0x63/0x70 [ 842.850005][ T9021] do_syscall_64+0x34/0x50 [ 842.854437][ T9021] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 842.860338][ T9021] RIP: 0033:0x46797a [ 842.864230][ T9021] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 842.884041][ T9021] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 842.892481][ T9021] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 842.900569][ T9021] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 842.910722][ T9021] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 842.918792][ T9021] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 842.926773][ T9021] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 842.940051][ T9038] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 842.941893][ T9040] loop4: detected capacity change from 0 to 6 [ 842.961017][ T9035] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 842.969166][ T9040] FAT-fs (loop4): Directory bread(block 6) failed [ 842.971225][ T9035] EXT4-fs (loop0): group descriptors corrupted! [ 842.983146][ T9034] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 842.996335][ T9052] loop1: detected capacity change from 0 to 24576 14:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:44 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x20100000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:44 executing program 3 (fault-call:0 fault-nth:43): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000003f0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000001330000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 843.004768][ T9052] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 843.014947][ T9052] EXT4-fs (loop1): group descriptors corrupted! [ 843.023646][ T9038] loop2: detected capacity change from 0 to 6 [ 843.042665][ T9038] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:44 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x12, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 843.135034][ T9063] loop3: detected capacity change from 0 to 6 [ 843.149443][ T9063] FAULT_INJECTION: forcing a failure. [ 843.149443][ T9063] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 843.163815][ T9063] CPU: 1 PID: 9063 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 843.177150][ T9063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.184415][ T9081] loop4: detected capacity change from 0 to 6 [ 843.187206][ T9063] Call Trace: [ 843.187217][ T9063] dump_stack+0x137/0x19d [ 843.194853][ T9076] loop5: detected capacity change from 0 to 24576 [ 843.198135][ T9063] should_fail+0x23c/0x250 [ 843.198169][ T9063] should_fail_usercopy+0x16/0x20 [ 843.208958][ T9077] loop1: detected capacity change from 0 to 24576 [ 843.213278][ T9063] _copy_from_user+0x1c/0xd0 [ 843.213309][ T9063] strndup_user+0xb0/0x120 [ 843.234114][ T9063] __se_sys_mount+0x91/0x2e0 [ 843.234703][ T9083] loop0: detected capacity change from 0 to 24576 [ 843.238847][ T9063] ? mntput+0x45/0x70 [ 843.238873][ T9063] ? do_mkdirat+0x1c7/0x200 [ 843.247267][ T9086] loop2: detected capacity change from 0 to 6 [ 843.249266][ T9063] __x64_sys_mount+0x63/0x70 [ 843.265730][ T9063] do_syscall_64+0x34/0x50 [ 843.270138][ T9063] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 843.276210][ T9063] RIP: 0033:0x46797a [ 843.280147][ T9063] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 843.303601][ T9063] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 843.312499][ T9063] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 843.320720][ T9063] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 843.328689][ T9063] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 843.336739][ T9063] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 843.344812][ T9063] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 843.364342][ T9081] loop4: detected capacity change from 0 to 6 [ 843.371605][ T9076] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 14:12:45 executing program 3 (fault-call:0 fault-nth:44): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 843.380926][ T9077] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 843.391044][ T9077] EXT4-fs (loop1): group descriptors corrupted! [ 843.403623][ T9086] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 843.410658][ T9083] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 843.423918][ T9083] EXT4-fs (loop0): group descriptors corrupted! 14:12:45 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x22000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000003f0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 843.478896][ T9108] loop4: detected capacity change from 0 to 6 [ 843.480048][ T9104] loop3: detected capacity change from 0 to 6 [ 843.509289][ T9086] loop2: detected capacity change from 0 to 6 [ 843.519961][ T9108] FAT-fs (loop4): Directory bread(block 6) failed 14:12:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000400000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 843.521128][ T9115] loop5: detected capacity change from 0 to 24576 [ 843.531716][ T9104] FAULT_INJECTION: forcing a failure. [ 843.531716][ T9104] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 843.546170][ T9104] CPU: 1 PID: 9104 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 843.548194][ T9115] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 843.556302][ T9104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.556320][ T9104] Call Trace: [ 843.556328][ T9104] dump_stack+0x137/0x19d [ 843.556353][ T9104] should_fail+0x23c/0x250 [ 843.586655][ T9104] should_fail_usercopy+0x16/0x20 [ 843.591781][ T9104] _copy_from_user+0x1c/0xd0 [ 843.596518][ T9104] __se_sys_mount+0x115/0x2e0 [ 843.602057][ T9104] ? mntput+0x45/0x70 [ 843.606037][ T9104] ? __fpregs_load_activate+0x103/0x1b0 [ 843.611636][ T9104] __x64_sys_mount+0x63/0x70 [ 843.617215][ T9104] do_syscall_64+0x34/0x50 [ 843.621671][ T9104] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 843.627638][ T9104] RIP: 0033:0x46797a [ 843.631544][ T9104] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 843.651202][ T9104] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 843.659622][ T9104] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 843.667598][ T9104] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 14:12:45 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x25000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 843.675570][ T9104] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 843.683595][ T9104] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 843.691564][ T9104] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 843.713604][ T9086] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 843.722025][ T9122] loop1: detected capacity change from 0 to 24576 14:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:45 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x22, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 843.729775][ T9122] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 843.739913][ T9122] EXT4-fs (loop1): group descriptors corrupted! [ 843.746295][ T9130] loop0: detected capacity change from 0 to 24576 14:12:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000400000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:45 executing program 3 (fault-call:0 fault-nth:45): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000800400000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 843.785085][ T9130] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 843.795325][ T9130] EXT4-fs (loop0): group descriptors corrupted! [ 843.802446][ T9139] loop5: detected capacity change from 0 to 24576 [ 843.810472][ T9139] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 843.824441][ T9146] loop4: detected capacity change from 0 to 6 14:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:45 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x3f000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 843.871571][ T9146] FAT-fs (loop4): Directory bread(block 6) failed [ 843.881861][ T9148] loop3: detected capacity change from 0 to 6 [ 843.891620][ T9148] FAULT_INJECTION: forcing a failure. [ 843.891620][ T9148] name failslab, interval 1, probability 0, space 0, times 0 [ 843.905942][ T9148] CPU: 0 PID: 9148 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 843.914858][ T9163] loop0: detected capacity change from 0 to 24576 [ 843.916086][ T9148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.916126][ T9148] Call Trace: [ 843.924487][ T9164] loop5: detected capacity change from 0 to 24576 [ 843.933034][ T9148] dump_stack+0x137/0x19d [ 843.936461][ T9165] loop2: detected capacity change from 0 to 6 [ 843.942767][ T9148] should_fail+0x23c/0x250 [ 843.942788][ T9148] ? getname_flags+0x84/0x3d0 [ 843.951134][ T9160] loop1: detected capacity change from 0 to 24576 [ 843.953580][ T9148] __should_failslab+0x81/0x90 [ 843.953655][ T9148] should_failslab+0x5/0x20 [ 843.960351][ T9160] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 843.962682][ T9148] kmem_cache_alloc+0x46/0x300 [ 843.969165][ T9160] EXT4-fs (loop1): group descriptors corrupted! [ 843.973873][ T9148] getname_flags+0x84/0x3d0 [ 843.981615][ T9163] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 843.988656][ T9148] ? should_fail+0xd6/0x250 [ 843.988690][ T9148] user_path_at_empty+0x28/0x50 [ 843.988714][ T9148] __se_sys_mount+0x209/0x2e0 [ 843.994315][ T9163] EXT4-fs (loop0): group descriptors corrupted! [ 844.000681][ T9148] ? mntput+0x45/0x70 [ 844.000718][ T9148] ? __fpregs_load_activate+0x103/0x1b0 [ 844.047957][ T9148] __x64_sys_mount+0x63/0x70 [ 844.052671][ T9148] do_syscall_64+0x34/0x50 [ 844.057112][ T9148] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 844.063028][ T9148] RIP: 0033:0x46797a [ 844.067597][ T9148] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 844.087391][ T9148] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 844.095806][ T9148] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 844.103795][ T9148] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 844.111948][ T9148] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 844.119939][ T9148] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 844.127934][ T9148] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 844.142216][ T9164] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 844.150750][ T9165] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000480000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 844.184627][ T9181] loop4: detected capacity change from 0 to 6 [ 844.215569][ T9181] FAT-fs (loop4): Directory bread(block 6) failed [ 844.228517][ T9165] loop2: detected capacity change from 0 to 6 14:12:45 executing program 3 (fault-call:0 fault-nth:46): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000480000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:45 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x40000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 844.246177][ T9165] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 844.285886][ T9194] loop1: detected capacity change from 0 to 24576 [ 844.293628][ T9194] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 844.303820][ T9194] EXT4-fs (loop1): group descriptors corrupted! [ 844.310764][ T9200] loop3: detected capacity change from 0 to 6 [ 844.311280][ T9203] loop5: detected capacity change from 0 to 24576 [ 844.320864][ T9200] FAULT_INJECTION: forcing a failure. [ 844.320864][ T9200] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 844.336413][ T9200] CPU: 1 PID: 9200 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 844.346500][ T9200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.356571][ T9200] Call Trace: [ 844.359914][ T9200] dump_stack+0x137/0x19d [ 844.364261][ T9200] should_fail+0x23c/0x250 [ 844.368673][ T9200] should_fail_usercopy+0x16/0x20 [ 844.373726][ T9200] strncpy_from_user+0x21/0x250 [ 844.378828][ T9200] getname_flags+0xb8/0x3d0 [ 844.383385][ T9200] ? should_fail+0xd6/0x250 [ 844.387890][ T9200] user_path_at_empty+0x28/0x50 [ 844.392865][ T9200] __se_sys_mount+0x209/0x2e0 [ 844.397609][ T9200] ? mntput+0x45/0x70 [ 844.401596][ T9200] __x64_sys_mount+0x63/0x70 [ 844.406216][ T9200] do_syscall_64+0x34/0x50 [ 844.410805][ T9200] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 844.416811][ T9200] RIP: 0033:0x46797a [ 844.420692][ T9200] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 844.441422][ T9200] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 844.449824][ T9200] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 844.457789][ T9200] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 844.465777][ T9200] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 844.473782][ T9200] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 844.481972][ T9200] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 14:12:46 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x25, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000ee490000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 844.506206][ T9202] loop0: detected capacity change from 0 to 24576 [ 844.516327][ T9203] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 14:12:46 executing program 3 (fault-call:0 fault-nth:47): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 844.549388][ T9202] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 844.559721][ T9202] EXT4-fs (loop0): group descriptors corrupted! 14:12:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 844.607746][ T9224] loop4: detected capacity change from 0 to 6 [ 844.617256][ T9228] loop1: detected capacity change from 0 to 24576 [ 844.622782][ T9226] loop2: detected capacity change from 0 to 6 [ 844.627054][ T9228] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 844.642245][ T9228] EXT4-fs (loop1): group descriptors corrupted! [ 844.644271][ T9229] loop3: detected capacity change from 0 to 6 14:12:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000004c0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 844.667434][ T9224] FAT-fs (loop4): Directory bread(block 6) failed [ 844.687642][ T9229] FAULT_INJECTION: forcing a failure. [ 844.687642][ T9229] name failslab, interval 1, probability 0, space 0, times 0 [ 844.700351][ T9229] CPU: 1 PID: 9229 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 844.710436][ T9229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.720552][ T9229] Call Trace: [ 844.723824][ T9229] dump_stack+0x137/0x19d [ 844.729094][ T9229] should_fail+0x23c/0x250 [ 844.733684][ T9229] __should_failslab+0x81/0x90 [ 844.738457][ T9229] ? alloc_fs_context+0x46/0x500 [ 844.743534][ T9229] should_failslab+0x5/0x20 [ 844.748026][ T9229] kmem_cache_alloc_trace+0x49/0x320 [ 844.753326][ T9229] alloc_fs_context+0x46/0x500 [ 844.763470][ T9229] ? strncmp+0x34/0x70 14:12:46 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x48000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 844.767572][ T9229] fs_context_for_mount+0x1d/0x20 [ 844.772587][ T9229] path_mount+0xdf5/0x1ce0 [ 844.777053][ T9229] __se_sys_mount+0x23d/0x2e0 [ 844.781738][ T9229] ? mntput+0x45/0x70 [ 844.785723][ T9229] __x64_sys_mount+0x63/0x70 [ 844.790591][ T9229] do_syscall_64+0x34/0x50 [ 844.795020][ T9229] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 844.798007][ T9237] loop5: detected capacity change from 0 to 24576 [ 844.801014][ T9229] RIP: 0033:0x46797a [ 844.801032][ T9229] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 844.801052][ T9229] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 844.801070][ T9229] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 844.801083][ T9229] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 844.801094][ T9229] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 844.801106][ T9229] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 844.801118][ T9229] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 844.886595][ T9226] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 844.892422][ T9237] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 844.900266][ T9246] loop0: detected capacity change from 0 to 24576 14:12:46 executing program 3 (fault-call:0 fault-nth:48): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000004c0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 844.948613][ T9246] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 844.959068][ T9246] EXT4-fs (loop0): group descriptors corrupted! 14:12:46 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 845.013960][ T9255] loop4: detected capacity change from 0 to 6 [ 845.046637][ T9255] FAT-fs (loop4): Directory bread(block 6) failed [ 845.054968][ T9263] loop3: detected capacity change from 0 to 6 14:12:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 845.064586][ T9268] loop1: detected capacity change from 0 to 24576 [ 845.071674][ T9271] loop2: detected capacity change from 0 to 6 [ 845.073092][ T9268] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 845.087876][ T9268] EXT4-fs (loop1): group descriptors corrupted! [ 845.097084][ T9263] FAULT_INJECTION: forcing a failure. [ 845.097084][ T9263] name failslab, interval 1, probability 0, space 0, times 0 [ 845.109723][ T9271] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 845.118415][ T9263] CPU: 0 PID: 9263 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 845.128917][ T9263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.135731][ T9280] loop5: detected capacity change from 0 to 24576 [ 845.139418][ T9263] Call Trace: [ 845.149365][ T9263] dump_stack+0x137/0x19d [ 845.153773][ T9263] should_fail+0x23c/0x250 14:12:46 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x4c000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000600000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000014e0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 845.155306][ T9280] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 845.158219][ T9263] __should_failslab+0x81/0x90 [ 845.171150][ T9263] ? legacy_init_fs_context+0x2d/0x70 [ 845.176634][ T9263] should_failslab+0x5/0x20 [ 845.181150][ T9263] kmem_cache_alloc_trace+0x49/0x320 [ 845.186485][ T9263] ? kmem_cache_alloc_trace+0x1c1/0x320 [ 845.192216][ T9263] ? alloc_fs_context+0x46/0x500 [ 845.197180][ T9263] legacy_init_fs_context+0x2d/0x70 [ 845.202378][ T9263] alloc_fs_context+0x419/0x500 [ 845.207309][ T9263] fs_context_for_mount+0x1d/0x20 [ 845.212428][ T9263] path_mount+0xdf5/0x1ce0 [ 845.217278][ T9263] __se_sys_mount+0x23d/0x2e0 [ 845.221963][ T9263] ? mntput+0x45/0x70 [ 845.225980][ T9263] ? __fpregs_load_activate+0x103/0x1b0 [ 845.231608][ T9263] __x64_sys_mount+0x63/0x70 [ 845.236383][ T9263] do_syscall_64+0x34/0x50 [ 845.241371][ T9263] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 845.247278][ T9263] RIP: 0033:0x46797a [ 845.251172][ T9263] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 845.271021][ T9263] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 845.279426][ T9263] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 845.287568][ T9263] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 845.295638][ T9263] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 845.303787][ T9263] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 845.311844][ T9263] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 845.346489][ T9271] loop2: detected capacity change from 0 to 6 [ 845.353058][ T9271] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 845.366495][ T9294] loop1: detected capacity change from 0 to 24576 [ 845.374360][ T9294] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 845.377470][ T9288] loop0: detected capacity change from 0 to 24576 14:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:47 executing program 3 (fault-call:0 fault-nth:49): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000015e0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 845.384596][ T9294] EXT4-fs (loop1): group descriptors corrupted! [ 845.438004][ T9288] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 845.440655][ T9308] loop3: detected capacity change from 0 to 6 [ 845.448162][ T9288] EXT4-fs (loop0): group descriptors corrupted! [ 845.448235][ T9306] loop5: detected capacity change from 0 to 24576 [ 845.457330][ T9308] FAULT_INJECTION: forcing a failure. [ 845.457330][ T9308] name failslab, interval 1, probability 0, space 0, times 0 [ 845.480038][ T9308] CPU: 1 PID: 9308 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 845.490116][ T9308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.500181][ T9308] Call Trace: [ 845.503502][ T9308] dump_stack+0x137/0x19d [ 845.506357][ T9310] loop4: detected capacity change from 0 to 6 [ 845.507841][ T9308] should_fail+0x23c/0x250 [ 845.507867][ T9308] __should_failslab+0x81/0x90 [ 845.507891][ T9308] ? vfs_parse_fs_string+0x5e/0xc0 [ 845.514489][ T9315] loop1: detected capacity change from 0 to 24576 [ 845.519312][ T9308] should_failslab+0x5/0x20 [ 845.519342][ T9308] __kmalloc_track_caller+0x64/0x360 [ 845.545431][ T9308] kmemdup_nul+0x27/0x70 [ 845.549782][ T9308] vfs_parse_fs_string+0x5e/0xc0 [ 845.554734][ T9308] path_mount+0xf99/0x1ce0 [ 845.555930][ T9315] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 845.559223][ T9308] __se_sys_mount+0x23d/0x2e0 [ 845.569333][ T9315] EXT4-fs (loop1): group descriptors corrupted! [ 845.574075][ T9308] ? mntput+0x45/0x70 [ 845.583111][ T9310] FAT-fs (loop4): Directory bread(block 6) failed [ 845.584314][ T9308] ? __fpregs_load_activate+0x103/0x1b0 [ 845.584343][ T9308] __x64_sys_mount+0x63/0x70 [ 845.598038][ T9328] loop2: detected capacity change from 0 to 6 [ 845.600991][ T9308] do_syscall_64+0x34/0x50 [ 845.601020][ T9308] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 845.617552][ T9308] RIP: 0033:0x46797a [ 845.619503][ T9328] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:47 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:47 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x60000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 845.621448][ T9308] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 845.621468][ T9308] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 845.621488][ T9308] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 845.661362][ T9306] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 845.666089][ T9308] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 14:12:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000015f0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000fcd48c9650000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 845.666108][ T9308] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 845.666120][ T9308] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 845.698782][ T9308] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 14:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 845.765202][ T9343] loop4: detected capacity change from 0 to 6 [ 845.771729][ T9328] loop2: detected capacity change from 0 to 6 [ 845.773225][ T9343] FAT-fs (loop4): Directory bread(block 6) failed [ 845.789939][ T9344] loop0: detected capacity change from 0 to 24576 14:12:47 executing program 3 (fault-call:0 fault-nth:50): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:47 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:47 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x68000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 845.808723][ T9328] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 845.820258][ T9344] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 845.830445][ T9344] EXT4-fs (loop0): group descriptors corrupted! [ 845.852613][ T9357] loop5: detected capacity change from 0 to 24576 14:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 845.861146][ T9357] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 845.872827][ T9354] loop1: detected capacity change from 0 to 24576 [ 845.917781][ T9354] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 845.927988][ T9354] EXT4-fs (loop1): group descriptors corrupted! [ 845.934431][ T9362] loop3: detected capacity change from 0 to 6 [ 845.934516][ T9369] loop2: detected capacity change from 0 to 6 [ 845.947948][ T9362] FAULT_INJECTION: forcing a failure. [ 845.947948][ T9362] name failslab, interval 1, probability 0, space 0, times 0 [ 845.960666][ T9362] CPU: 0 PID: 9362 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 845.960872][ T9374] loop4: detected capacity change from 0 to 6 [ 845.970745][ T9362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.970763][ T9362] Call Trace: [ 845.970771][ T9362] dump_stack+0x137/0x19d [ 845.970796][ T9362] should_fail+0x23c/0x250 [ 845.970815][ T9362] ? vfat_mount+0x40/0x40 [ 845.970850][ T9362] ? getname_kernel+0x37/0x1d0 [ 846.002089][ T9369] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 846.003759][ T9362] __should_failslab+0x81/0x90 [ 846.003789][ T9362] should_failslab+0x5/0x20 [ 846.027204][ T9362] kmem_cache_alloc+0x46/0x300 [ 846.029608][ T9374] FAT-fs (loop4): Directory bread(block 6) failed [ 846.032204][ T9362] ? avc_has_perm_noaudit+0x19a/0x240 [ 846.032233][ T9362] ? vfat_mount+0x40/0x40 [ 846.049193][ T9362] getname_kernel+0x37/0x1d0 [ 846.053833][ T9362] ? vfat_mount+0x40/0x40 [ 846.058198][ T9362] kern_path+0x19/0x40 [ 846.062346][ T9362] blkdev_get_by_path+0x54/0x1b0 14:12:47 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x6c000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000680000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 846.067481][ T9362] mount_bdev+0x47/0x290 [ 846.071793][ T9362] ? tsan.module_ctor+0x10/0x10 [ 846.077342][ T9362] vfat_mount+0x2d/0x40 [ 846.081495][ T9362] legacy_get_tree+0x70/0xc0 [ 846.086104][ T9362] vfs_get_tree+0x4a/0x1a0 [ 846.090839][ T9362] path_mount+0x11d6/0x1ce0 [ 846.095353][ T9362] __se_sys_mount+0x23d/0x2e0 [ 846.100937][ T9362] ? mntput+0x45/0x70 [ 846.104994][ T9362] __x64_sys_mount+0x63/0x70 [ 846.109587][ T9362] do_syscall_64+0x34/0x50 [ 846.114105][ T9362] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 846.120024][ T9362] RIP: 0033:0x46797a [ 846.121591][ T9382] loop5: detected capacity change from 0 to 24576 [ 846.123944][ T9362] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.123965][ T9362] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 846.123985][ T9362] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a 14:12:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000600000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 846.130699][ T9387] loop0: detected capacity change from 0 to 24576 [ 846.152398][ T9362] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 846.152418][ T9362] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 846.152430][ T9362] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 846.152442][ T9362] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 846.164045][ T9382] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 846.218915][ T9387] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 846.229225][ T9387] EXT4-fs (loop0): group descriptors corrupted! [ 846.233693][ T9395] loop1: detected capacity change from 0 to 24576 [ 846.254253][ T9395] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! 14:12:47 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:47 executing program 3 (fault-call:0 fault-nth:51): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 846.266355][ T9395] EXT4-fs (loop1): group descriptors corrupted! [ 846.298264][ T9405] loop4: detected capacity change from 0 to 6 [ 846.315843][ T9410] loop2: detected capacity change from 0 to 6 [ 846.316968][ T9411] loop5: detected capacity change from 0 to 24576 [ 846.322704][ T9405] FAT-fs (loop4): Directory bread(block 6) failed [ 846.329880][ T9411] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 14:12:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000001600000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 846.345054][ T9410] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 846.364351][ T9417] loop3: detected capacity change from 0 to 6 [ 846.375622][ T9417] FAULT_INJECTION: forcing a failure. [ 846.375622][ T9417] name failslab, interval 1, probability 0, space 0, times 0 [ 846.389469][ T9417] CPU: 1 PID: 9417 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 846.399551][ T9417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.409647][ T9417] Call Trace: [ 846.412935][ T9417] dump_stack+0x137/0x19d [ 846.417933][ T9417] should_fail+0x23c/0x250 [ 846.422363][ T9417] __should_failslab+0x81/0x90 [ 846.427179][ T9417] ? alloc_super+0x3a/0x520 [ 846.431782][ T9417] should_failslab+0x5/0x20 [ 846.436583][ T9417] kmem_cache_alloc_trace+0x49/0x320 [ 846.441905][ T9434] loop0: detected capacity change from 0 to 24576 [ 846.441962][ T9417] ? __mutex_unlock_slowpath+0x11e/0x150 [ 846.449552][ T9435] loop5: detected capacity change from 0 to 24576 [ 846.454107][ T9417] ? mount_bdev+0x290/0x290 [ 846.454132][ T9417] alloc_super+0x3a/0x520 [ 846.469462][ T9417] ? mount_bdev+0x290/0x290 [ 846.474038][ T9417] sget+0x1a5/0x400 [ 846.474912][ T9435] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 846.477870][ T9417] ? test_bdev_super+0x30/0x30 [ 846.477892][ T9417] mount_bdev+0xd3/0x290 [ 846.493798][ T9417] ? vfat_mount+0x40/0x40 [ 846.498138][ T9417] ? tsan.module_ctor+0x10/0x10 [ 846.503013][ T9417] vfat_mount+0x2d/0x40 [ 846.507308][ T9417] legacy_get_tree+0x70/0xc0 [ 846.511907][ T9417] vfs_get_tree+0x4a/0x1a0 [ 846.516588][ T9417] path_mount+0x11d6/0x1ce0 [ 846.521105][ T9417] __se_sys_mount+0x23d/0x2e0 [ 846.525829][ T9417] ? mntput+0x45/0x70 [ 846.529804][ T9417] __x64_sys_mount+0x63/0x70 [ 846.534406][ T9417] do_syscall_64+0x34/0x50 [ 846.538842][ T9417] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 846.544784][ T9417] RIP: 0033:0x46797a [ 846.548718][ T9417] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.568485][ T9417] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 846.576990][ T9417] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 846.584966][ T9417] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 14:12:48 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x74000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000006c0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 846.592960][ T9417] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 846.601018][ T9417] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 846.609783][ T9417] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 846.632290][ T9410] loop2: detected capacity change from 0 to 6 [ 846.640102][ T9444] loop1: detected capacity change from 0 to 24576 14:12:48 executing program 3 (fault-call:0 fault-nth:52): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000680000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 846.641386][ T9434] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 846.657770][ T9434] EXT4-fs (loop0): group descriptors corrupted! [ 846.666917][ T9410] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 846.680214][ T9444] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 846.690817][ T9444] EXT4-fs (loop1): group descriptors corrupted! 14:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:48 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 846.762188][ T9454] loop4: detected capacity change from 0 to 6 [ 846.798241][ T9454] FAT-fs (loop4): Directory bread(block 6) failed 14:12:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000740000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 846.807476][ T9459] loop3: detected capacity change from 0 to 6 [ 846.838421][ T9459] FAULT_INJECTION: forcing a failure. [ 846.838421][ T9459] name failslab, interval 1, probability 0, space 0, times 0 [ 846.851102][ T9459] CPU: 0 PID: 9459 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 846.861433][ T9459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.871500][ T9459] Call Trace: [ 846.874857][ T9459] dump_stack+0x137/0x19d [ 846.879257][ T9459] should_fail+0x23c/0x250 [ 846.883697][ T9459] __should_failslab+0x81/0x90 14:12:48 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x78000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 846.888832][ T9459] ? selinux_sb_alloc_security+0x2f/0xe0 [ 846.894482][ T9459] should_failslab+0x5/0x20 [ 846.895078][ T9466] loop1: detected capacity change from 0 to 24576 [ 846.899182][ T9459] kmem_cache_alloc_trace+0x49/0x320 [ 846.899210][ T9459] selinux_sb_alloc_security+0x2f/0xe0 [ 846.909261][ T9477] loop0: detected capacity change from 0 to 24576 [ 846.910992][ T9459] security_sb_alloc+0x3f/0x90 [ 846.927807][ T9459] alloc_super+0x10b/0x520 [ 846.932253][ T9459] ? mount_bdev+0x290/0x290 [ 846.936753][ T9459] sget+0x1a5/0x400 [ 846.940612][ T9459] ? test_bdev_super+0x30/0x30 [ 846.945368][ T9459] mount_bdev+0xd3/0x290 [ 846.949642][ T9459] ? vfat_mount+0x40/0x40 [ 846.953992][ T9459] ? tsan.module_ctor+0x10/0x10 [ 846.960263][ T9459] vfat_mount+0x2d/0x40 [ 846.964470][ T9459] legacy_get_tree+0x70/0xc0 [ 846.969093][ T9459] vfs_get_tree+0x4a/0x1a0 [ 846.974468][ T9459] path_mount+0x11d6/0x1ce0 [ 846.979018][ T9459] __se_sys_mount+0x23d/0x2e0 [ 846.984149][ T9459] ? mntput+0x45/0x70 [ 846.988172][ T9459] __x64_sys_mount+0x63/0x70 [ 846.993074][ T9459] do_syscall_64+0x34/0x50 [ 846.997692][ T9459] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 847.004487][ T9459] RIP: 0033:0x46797a [ 847.009278][ T9459] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 847.029386][ T9459] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 847.038574][ T9459] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 847.046562][ T9459] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 847.054644][ T9459] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 847.062763][ T9459] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 847.070769][ T9459] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 847.091709][ T9476] loop2: detected capacity change from 0 to 6 [ 847.094047][ T9477] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 847.097991][ T9467] loop5: detected capacity change from 0 to 24576 [ 847.108049][ T9477] EXT4-fs (loop0): group descriptors corrupted! [ 847.118580][ T9476] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 847.126407][ T9466] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! 14:12:48 executing program 3 (fault-call:0 fault-nth:53): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000001750000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 847.140173][ T9466] EXT4-fs (loop1): group descriptors corrupted! [ 847.146625][ T9467] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:12:48 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x7a000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 847.185477][ T9491] loop4: detected capacity change from 0 to 6 [ 847.191917][ T9495] loop3: detected capacity change from 0 to 6 [ 847.197376][ T9491] FAT-fs (loop4): Directory bread(block 6) failed [ 847.203178][ T9495] FAULT_INJECTION: forcing a failure. [ 847.203178][ T9495] name failslab, interval 1, probability 0, space 0, times 0 [ 847.217505][ T9495] CPU: 0 PID: 9495 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 847.227588][ T9495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.237657][ T9495] Call Trace: [ 847.240965][ T9495] dump_stack+0x137/0x19d [ 847.245301][ T9495] should_fail+0x23c/0x250 [ 847.249928][ T9495] __should_failslab+0x81/0x90 [ 847.254689][ T9495] ? selinux_sb_alloc_security+0x2f/0xe0 [ 847.260335][ T9495] should_failslab+0x5/0x20 [ 847.264909][ T9495] kmem_cache_alloc_trace+0x49/0x320 [ 847.270215][ T9495] selinux_sb_alloc_security+0x2f/0xe0 [ 847.276150][ T9495] security_sb_alloc+0x3f/0x90 [ 847.281187][ T9495] alloc_super+0x10b/0x520 [ 847.285771][ T9495] ? mount_bdev+0x290/0x290 [ 847.290300][ T9495] sget+0x1a5/0x400 [ 847.294132][ T9495] ? test_bdev_super+0x30/0x30 [ 847.298910][ T9495] mount_bdev+0xd3/0x290 [ 847.303211][ T9495] ? vfat_mount+0x40/0x40 [ 847.307817][ T9495] ? tsan.module_ctor+0x10/0x10 [ 847.312822][ T9495] vfat_mount+0x2d/0x40 [ 847.316980][ T9495] legacy_get_tree+0x70/0xc0 [ 847.321590][ T9495] vfs_get_tree+0x4a/0x1a0 [ 847.326101][ T9495] path_mount+0x11d6/0x1ce0 [ 847.330627][ T9495] __se_sys_mount+0x23d/0x2e0 [ 847.335401][ T9495] ? mntput+0x45/0x70 [ 847.339390][ T9495] ? __fpregs_load_activate+0x103/0x1b0 [ 847.344931][ T9495] __x64_sys_mount+0x63/0x70 [ 847.349570][ T9495] do_syscall_64+0x34/0x50 [ 847.354074][ T9495] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 847.359982][ T9495] RIP: 0033:0x46797a [ 847.364068][ T9495] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 847.384374][ T9495] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 847.396686][ T9495] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 847.404948][ T9495] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 847.414057][ T9495] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 847.423583][ T9495] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 847.431857][ T9495] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 14:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:49 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 847.464278][ T9476] loop2: detected capacity change from 0 to 6 [ 847.471644][ T9476] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000001680000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 847.507208][ T9507] loop0: detected capacity change from 0 to 24576 [ 847.519475][ T9514] loop4: detected capacity change from 0 to 6 [ 847.522917][ T9515] loop5: detected capacity change from 0 to 24576 [ 847.535737][ T9514] FAT-fs (loop4): Directory bread(block 6) failed [ 847.546313][ T9507] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 847.556956][ T9507] EXT4-fs (loop0): group descriptors corrupted! [ 847.564486][ T9520] loop1: detected capacity change from 0 to 24576 [ 847.564764][ T9528] loop2: detected capacity change from 0 to 6 [ 847.589569][ T9515] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:12:49 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x83030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000007a0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:49 executing program 3 (fault-call:0 fault-nth:54): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) [ 847.609556][ T9520] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 847.620000][ T9520] EXT4-fs (loop1): group descriptors corrupted! [ 847.627749][ T9528] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 847.695855][ T9549] loop3: detected capacity change from 0 to 6 [ 847.699926][ T9528] loop2: detected capacity change from 0 to 6 [ 847.703707][ T9549] FAULT_INJECTION: forcing a failure. [ 847.703707][ T9549] name failslab, interval 1, probability 0, space 0, times 0 [ 847.708567][ T9550] loop4: detected capacity change from 0 to 6 [ 847.721366][ T9549] CPU: 0 PID: 9549 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 847.721392][ T9549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.721402][ T9549] Call Trace: [ 847.721409][ T9549] dump_stack+0x137/0x19d [ 847.727904][ T9551] loop5: detected capacity change from 0 to 24576 [ 847.737809][ T9549] should_fail+0x23c/0x250 [ 847.737837][ T9549] __should_failslab+0x81/0x90 [ 847.737856][ T9549] ? __list_lru_init+0x70/0x520 [ 847.778092][ T9549] should_failslab+0x5/0x20 [ 847.782669][ T9549] __kmalloc+0x66/0x360 [ 847.786825][ T9549] __list_lru_init+0x70/0x520 [ 847.792088][ T9549] alloc_super+0x490/0x520 [ 847.796638][ T9549] ? mount_bdev+0x290/0x290 [ 847.801159][ T9549] sget+0x1a5/0x400 [ 847.805141][ T9549] ? test_bdev_super+0x30/0x30 [ 847.809904][ T9549] mount_bdev+0xd3/0x290 [ 847.814283][ T9549] ? vfat_mount+0x40/0x40 [ 847.818614][ T9549] ? tsan.module_ctor+0x10/0x10 [ 847.823470][ T9549] vfat_mount+0x2d/0x40 [ 847.827703][ T9549] legacy_get_tree+0x70/0xc0 [ 847.832773][ T9549] vfs_get_tree+0x4a/0x1a0 [ 847.837194][ T9549] path_mount+0x11d6/0x1ce0 [ 847.841745][ T9549] __se_sys_mount+0x23d/0x2e0 [ 847.846489][ T9549] ? mntput+0x45/0x70 [ 847.850502][ T9549] ? __fpregs_load_activate+0x103/0x1b0 [ 847.856090][ T9549] __x64_sys_mount+0x63/0x70 [ 847.860767][ T9549] do_syscall_64+0x34/0x50 [ 847.865474][ T9549] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 847.871448][ T9549] RIP: 0033:0x46797a [ 847.875348][ T9549] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 847.895566][ T9549] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 847.904510][ T9549] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 847.913013][ T9549] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 847.921008][ T9549] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 847.928994][ T9549] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 847.937066][ T9549] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 14:12:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000006c0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 847.947176][ T9528] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 847.960587][ T9560] loop0: detected capacity change from 0 to 24576 [ 847.968972][ T9560] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 847.979186][ T9560] EXT4-fs (loop0): group descriptors corrupted! [ 847.982748][ T9564] loop1: detected capacity change from 0 to 24576 14:12:49 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) 14:12:49 executing program 3 (fault-call:0 fault-nth:55): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 848.001588][ T9564] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 848.011756][ T9564] EXT4-fs (loop1): group descriptors corrupted! [ 848.028474][ T9569] loop3: detected capacity change from 0 to 6 [ 848.034427][ T9550] loop4: detected capacity change from 0 to 6 [ 848.035617][ T9569] FAULT_INJECTION: forcing a failure. [ 848.035617][ T9569] name failslab, interval 1, probability 0, space 0, times 0 [ 848.053407][ T9569] CPU: 0 PID: 9569 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 848.063587][ T9569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.073749][ T9569] Call Trace: [ 848.077106][ T9569] dump_stack+0x137/0x19d [ 848.081521][ T9569] should_fail+0x23c/0x250 [ 848.085979][ T9569] __should_failslab+0x81/0x90 [ 848.090760][ T9569] should_failslab+0x5/0x20 [ 848.095253][ T9569] kmem_cache_alloc_node_trace+0x59/0x300 [ 848.101098][ T9569] ? __radix_tree_replace+0x187/0x1a0 [ 848.106506][ T9569] ? __kmalloc_node+0x30/0x40 [ 848.111169][ T9569] __kmalloc_node+0x30/0x40 [ 848.115686][ T9569] kvmalloc_node+0x81/0xf0 [ 848.120127][ T9569] __list_lru_init+0x1dd/0x520 [ 848.124875][ T9569] alloc_super+0x490/0x520 [ 848.129318][ T9569] ? mount_bdev+0x290/0x290 [ 848.134256][ T9569] sget+0x1a5/0x400 [ 848.138083][ T9569] ? test_bdev_super+0x30/0x30 [ 848.142853][ T9569] mount_bdev+0xd3/0x290 [ 848.147083][ T9569] ? vfat_mount+0x40/0x40 [ 848.151871][ T9569] ? tsan.module_ctor+0x10/0x10 [ 848.156971][ T9569] vfat_mount+0x2d/0x40 [ 848.161131][ T9569] legacy_get_tree+0x70/0xc0 [ 848.165777][ T9569] vfs_get_tree+0x4a/0x1a0 [ 848.170258][ T9569] path_mount+0x11d6/0x1ce0 [ 848.174809][ T9569] __se_sys_mount+0x23d/0x2e0 [ 848.179587][ T9569] ? mntput+0x45/0x70 [ 848.183563][ T9569] __x64_sys_mount+0x63/0x70 [ 848.188353][ T9569] do_syscall_64+0x34/0x50 [ 848.192831][ T9569] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 848.198757][ T9569] RIP: 0033:0x46797a [ 848.202716][ T9569] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 848.224803][ T9569] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 848.233320][ T9569] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 848.241327][ T9569] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 14:12:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000740000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:49 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x86030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003840000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 848.249671][ T9569] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 848.257663][ T9569] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 848.265932][ T9569] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 848.329621][ T9578] loop5: detected capacity change from 0 to 24576 [ 848.336204][ T9587] loop4: detected capacity change from 0 to 6 [ 848.343879][ T9588] loop1: detected capacity change from 0 to 24576 [ 848.362064][ T9588] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! 14:12:49 executing program 3 (fault-call:0 fault-nth:56): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 848.373480][ T9596] loop0: detected capacity change from 0 to 24576 [ 848.373812][ T9588] EXT4-fs (loop1): group descriptors corrupted! [ 848.390169][ T9597] loop2: detected capacity change from 0 to 6 [ 848.413519][ T9596] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 848.423847][ T9596] EXT4-fs (loop0): group descriptors corrupted! 14:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) 14:12:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003860000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000007a0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:50 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x88000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 848.430165][ T9597] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 848.439004][ T9587] loop4: detected capacity change from 0 to 6 [ 848.462359][ T9611] loop3: detected capacity change from 0 to 6 [ 848.500905][ T9611] FAULT_INJECTION: forcing a failure. [ 848.500905][ T9611] name failslab, interval 1, probability 0, space 0, times 0 [ 848.511508][ T9597] loop2: detected capacity change from 0 to 6 [ 848.519183][ T9611] CPU: 1 PID: 9611 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 848.538765][ T9611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.870198][ T9611] Call Trace: [ 848.873499][ T9611] dump_stack+0x137/0x19d [ 848.877831][ T9611] should_fail+0x23c/0x250 [ 848.882251][ T9611] __should_failslab+0x81/0x90 [ 848.887024][ T9611] ? __list_lru_init+0x70/0x520 [ 848.891967][ T9611] should_failslab+0x5/0x20 [ 848.896494][ T9611] __kmalloc+0x66/0x360 [ 848.900645][ T9611] __list_lru_init+0x70/0x520 [ 848.905789][ T9611] alloc_super+0x4bf/0x520 [ 848.910254][ T9611] ? mount_bdev+0x290/0x290 [ 848.914759][ T9611] sget+0x1a5/0x400 [ 848.918887][ T9611] ? test_bdev_super+0x30/0x30 [ 848.923792][ T9611] mount_bdev+0xd3/0x290 [ 848.928119][ T9611] ? vfat_mount+0x40/0x40 [ 848.932930][ T9611] ? tsan.module_ctor+0x10/0x10 [ 848.938881][ T9611] vfat_mount+0x2d/0x40 [ 848.943066][ T9611] legacy_get_tree+0x70/0xc0 [ 848.947657][ T9611] vfs_get_tree+0x4a/0x1a0 [ 848.952065][ T9611] path_mount+0x11d6/0x1ce0 [ 848.956647][ T9611] __se_sys_mount+0x23d/0x2e0 [ 848.961323][ T9611] ? mntput+0x45/0x70 [ 848.965299][ T9611] __x64_sys_mount+0x63/0x70 [ 848.970133][ T9611] do_syscall_64+0x34/0x50 [ 848.974643][ T9611] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 848.980579][ T9611] RIP: 0033:0x46797a [ 848.984469][ T9611] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 849.004090][ T9611] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 849.012541][ T9611] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 849.020795][ T9611] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 849.029991][ T9611] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 849.037998][ T9611] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 849.047572][ T9611] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 849.067628][ T9629] loop1: detected capacity change from 0 to 24576 [ 849.078132][ T9625] loop5: detected capacity change from 0 to 24576 [ 849.078816][ T9597] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 849.095899][ T9629] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 849.106021][ T9629] EXT4-fs (loop1): group descriptors corrupted! 14:12:50 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x18000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 849.112619][ T9636] loop4: detected capacity change from 0 to 6 [ 849.128023][ T9637] loop0: detected capacity change from 0 to 24576 14:12:50 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9f, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:50 executing program 3 (fault-call:0 fault-nth:57): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000900000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 849.161634][ T9637] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 849.170664][ T9636] loop4: detected capacity change from 0 to 6 [ 849.171803][ T9637] EXT4-fs (loop0): group descriptors corrupted! 14:12:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000001880000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:50 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x89000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 849.230005][ T9653] loop3: detected capacity change from 0 to 6 [ 849.243639][ T9649] loop5: detected capacity change from 0 to 6 [ 849.267136][ T9653] FAULT_INJECTION: forcing a failure. [ 849.267136][ T9653] name failslab, interval 1, probability 0, space 0, times 0 [ 849.280069][ T9653] CPU: 0 PID: 9653 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 849.290348][ T9653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.300434][ T9653] Call Trace: [ 849.303914][ T9653] dump_stack+0x137/0x19d [ 849.308725][ T9653] should_fail+0x23c/0x250 [ 849.313647][ T9653] __should_failslab+0x81/0x90 [ 849.318541][ T9653] ? __list_lru_init+0x70/0x520 [ 849.326205][ T9653] should_failslab+0x5/0x20 [ 849.334113][ T9653] __kmalloc+0x66/0x360 [ 849.343160][ T9653] __list_lru_init+0x70/0x520 [ 849.347852][ T9653] alloc_super+0x4bf/0x520 [ 849.352299][ T9653] ? mount_bdev+0x290/0x290 [ 849.356984][ T9653] sget+0x1a5/0x400 [ 849.360815][ T9653] ? test_bdev_super+0x30/0x30 [ 849.366403][ T9653] mount_bdev+0xd3/0x290 [ 849.370745][ T9653] ? vfat_mount+0x40/0x40 [ 849.375086][ T9653] ? tsan.module_ctor+0x10/0x10 [ 849.379953][ T9653] vfat_mount+0x2d/0x40 [ 849.384680][ T9653] legacy_get_tree+0x70/0xc0 [ 849.389415][ T9653] vfs_get_tree+0x4a/0x1a0 [ 849.393930][ T9653] path_mount+0x11d6/0x1ce0 [ 849.399032][ T9653] __se_sys_mount+0x23d/0x2e0 [ 849.403731][ T9653] ? mntput+0x45/0x70 [ 849.407828][ T9653] ? __fpregs_load_activate+0x103/0x1b0 [ 849.413673][ T9653] __x64_sys_mount+0x63/0x70 [ 849.418567][ T9653] do_syscall_64+0x34/0x50 [ 849.423057][ T9653] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 849.429152][ T9653] RIP: 0033:0x46797a [ 849.433244][ T9653] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 849.453836][ T9653] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 849.462492][ T9653] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 849.477177][ T9653] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 849.485821][ T9653] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 849.493857][ T9653] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 849.501837][ T9653] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 849.536763][ T9669] loop4: detected capacity change from 0 to 6 [ 849.541174][ T9670] loop0: detected capacity change from 0 to 24576 [ 849.544283][ T9649] FAT-fs (loop5): Directory bread(block 6) failed [ 849.552462][ T9671] loop1: detected capacity change from 0 to 24576 [ 849.564741][ T9675] loop2: detected capacity change from 0 to 6 14:12:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000001890000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 849.583847][ T9670] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 849.590766][ T9669] loop4: detected capacity change from 0 to 6 [ 849.594454][ T9670] EXT4-fs (loop0): group descriptors corrupted! 14:12:51 executing program 3 (fault-call:0 fault-nth:58): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:51 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 849.627604][ T9671] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 849.638415][ T9671] EXT4-fs (loop1): group descriptors corrupted! [ 849.657700][ T9675] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:51 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x8cffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 849.688475][ T9694] FAULT_INJECTION: forcing a failure. [ 849.688475][ T9694] name failslab, interval 1, probability 0, space 0, times 0 [ 849.701431][ T9694] CPU: 0 PID: 9694 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 849.711695][ T9694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.712254][ T9697] loop3: detected capacity change from 0 to 6 [ 849.722570][ T9694] Call Trace: [ 849.722585][ T9694] dump_stack+0x137/0x19d [ 849.722612][ T9694] should_fail+0x23c/0x250 [ 849.722628][ T9694] __should_failslab+0x81/0x90 [ 849.722649][ T9694] ? __se_sys_memfd_create+0xfb/0x390 [ 849.731655][ T9698] loop4: detected capacity change from 0 to 6 [ 849.732015][ T9694] should_failslab+0x5/0x20 [ 849.746998][ T9696] loop0: detected capacity change from 0 to 24576 [ 849.750996][ T9694] __kmalloc+0x66/0x360 [ 849.751027][ T9694] ? strnlen_user+0x137/0x1c0 [ 849.778243][ T9694] __se_sys_memfd_create+0xfb/0x390 [ 849.783456][ T9694] __x64_sys_memfd_create+0x2d/0x40 [ 849.788648][ T9694] do_syscall_64+0x34/0x50 [ 849.793126][ T9694] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 849.799009][ T9694] RIP: 0033:0x466459 [ 849.803010][ T9694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 849.822863][ T9694] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 849.831302][ T9694] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 849.839340][ T9694] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004beba8 [ 849.848281][ T9694] RBP: 0000000000000006 R08: 0000000000010000 R09: ffffffffffffffff [ 849.856346][ T9694] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000008100000 [ 849.864333][ T9694] R13: 0000000020000100 R14: 0000000000c00000 R15: 0000000020000300 14:12:51 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000910000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 849.885797][ T9697] FAULT_INJECTION: forcing a failure. [ 849.885797][ T9697] name failslab, interval 1, probability 0, space 0, times 0 [ 849.901670][ T9697] CPU: 1 PID: 9697 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 849.911957][ T9697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.922210][ T9697] Call Trace: [ 849.925497][ T9697] dump_stack+0x137/0x19d [ 849.929850][ T9697] should_fail+0x23c/0x250 [ 849.935662][ T9697] __should_failslab+0x81/0x90 [ 849.940737][ T9697] ? fat_fill_super+0x60/0x2a80 [ 849.946054][ T9697] should_failslab+0x5/0x20 [ 849.949867][ T9696] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 849.950630][ T9697] kmem_cache_alloc_trace+0x49/0x320 [ 849.960809][ T9696] EXT4-fs (loop0): group descriptors corrupted! [ 849.966558][ T9697] ? bdev_name+0x1e1/0x240 [ 849.979132][ T9697] ? vfat_fill_super+0x40/0x40 [ 849.980821][ T9713] loop1: detected capacity change from 0 to 24576 [ 849.983915][ T9697] fat_fill_super+0x60/0x2a80 [ 849.983947][ T9697] ? format_decode+0x60b/0x8a0 [ 849.993454][ T9698] loop4: detected capacity change from 0 to 6 [ 849.997853][ T9697] ? vsnprintf+0xe8f/0xed0 [ 850.015583][ T9697] ? snprintf+0x6f/0x90 [ 850.019757][ T9697] ? register_shrinker_prepared+0xdf/0xf0 [ 850.020165][ T9675] loop2: detected capacity change from 0 to 6 [ 850.026448][ T9697] ? set_blocksize+0x197/0x2a0 14:12:51 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xa5, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 850.026480][ T9697] vfat_fill_super+0x2c/0x40 [ 850.026502][ T9697] mount_bdev+0x1e8/0x290 [ 850.026517][ T9697] ? vfat_mount+0x40/0x40 [ 850.026533][ T9697] ? tsan.module_ctor+0x10/0x10 [ 850.026571][ T9697] vfat_mount+0x2d/0x40 [ 850.063616][ T9697] legacy_get_tree+0x70/0xc0 [ 850.065202][ T9719] FAULT_INJECTION: forcing a failure. [ 850.065202][ T9719] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 850.068479][ T9697] vfs_get_tree+0x4a/0x1a0 [ 850.086447][ T9697] path_mount+0x11d6/0x1ce0 [ 850.091069][ T9697] __se_sys_mount+0x23d/0x2e0 [ 850.095776][ T9697] ? mntput+0x45/0x70 [ 850.099829][ T9697] ? __fpregs_load_activate+0x103/0x1b0 [ 850.105463][ T9697] __x64_sys_mount+0x63/0x70 [ 850.110160][ T9697] do_syscall_64+0x34/0x50 [ 850.114747][ T9697] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 850.120654][ T9697] RIP: 0033:0x46797a [ 850.124664][ T9697] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.144458][ T9697] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 850.152967][ T9697] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 850.160948][ T9697] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 850.169104][ T9697] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 850.177282][ T9697] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 850.186176][ T9697] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 850.195216][ T9719] CPU: 0 PID: 9719 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 850.205456][ T9719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.216219][ T9719] Call Trace: [ 850.219635][ T9719] dump_stack+0x137/0x19d [ 850.224174][ T9719] should_fail+0x23c/0x250 [ 850.230478][ T9719] should_fail_usercopy+0x16/0x20 [ 850.235960][ T9719] _copy_from_user+0x1c/0xd0 [ 850.241477][ T9719] __se_sys_memfd_create+0x137/0x390 [ 850.246961][ T9719] __x64_sys_memfd_create+0x2d/0x40 [ 850.252464][ T9719] do_syscall_64+0x34/0x50 [ 850.257009][ T9719] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 850.263977][ T9719] RIP: 0033:0x466459 [ 850.267910][ T9719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.288400][ T9719] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 850.297284][ T9719] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 850.306326][ T9719] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004beba8 [ 850.315060][ T9719] RBP: 0000000000000006 R08: 0000000000010000 R09: ffffffffffffffff [ 850.323102][ T9719] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000008100000 14:12:51 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:52 executing program 3 (fault-call:0 fault-nth:59): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 850.335294][ T9719] R13: 0000000020000100 R14: 0000000000c00000 R15: 0000000020000300 14:12:52 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x8e000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000fffffff8c0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 850.382136][ T9713] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 850.393196][ T9713] EXT4-fs (loop1): group descriptors corrupted! [ 850.415743][ T9731] FAULT_INJECTION: forcing a failure. [ 850.415743][ T9731] name failslab, interval 1, probability 0, space 0, times 0 [ 850.430481][ T9731] CPU: 1 PID: 9731 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 850.441615][ T9731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.451961][ T9731] Call Trace: [ 850.455252][ T9731] dump_stack+0x137/0x19d [ 850.459659][ T9731] should_fail+0x23c/0x250 [ 850.464102][ T9731] ? shmem_alloc_inode+0x22/0x30 [ 850.469226][ T9731] __should_failslab+0x81/0x90 [ 850.474043][ T9731] ? shmem_match+0xa0/0xa0 [ 850.479034][ T9731] should_failslab+0x5/0x20 [ 850.483894][ T9731] kmem_cache_alloc+0x46/0x300 [ 850.488750][ T9731] ? fsnotify_perm+0x59/0x2e0 [ 850.493612][ T9731] ? shmem_match+0xa0/0xa0 [ 850.498041][ T9731] shmem_alloc_inode+0x22/0x30 [ 850.502912][ T9731] new_inode_pseudo+0x38/0x1c0 [ 850.507750][ T9731] new_inode+0x21/0x120 [ 850.511959][ T9731] shmem_get_inode+0xa1/0x480 [ 850.516699][ T9731] __shmem_file_setup+0xf1/0x1d0 [ 850.522257][ T9731] shmem_file_setup+0x37/0x40 [ 850.528073][ T9731] __se_sys_memfd_create+0x1eb/0x390 [ 850.533887][ T9731] __x64_sys_memfd_create+0x2d/0x40 [ 850.539209][ T9731] do_syscall_64+0x34/0x50 [ 850.543972][ T9731] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 850.551000][ T9731] RIP: 0033:0x466459 [ 850.554889][ T9731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.574858][ T9731] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 850.584444][ T9731] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 850.592535][ T9731] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004beba8 [ 850.600821][ T9731] RBP: 0000000000000006 R08: 0000000000010000 R09: ffffffffffffffff [ 850.609104][ T9731] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000008100000 [ 850.620252][ T9731] R13: 0000000020000100 R14: 0000000000c00000 R15: 0000000020000300 14:12:52 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003c10000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 850.647414][ T9736] loop0: detected capacity change from 0 to 24576 [ 850.656289][ T9732] loop3: detected capacity change from 0 to 6 [ 850.677224][ T9732] FAULT_INJECTION: forcing a failure. [ 850.677224][ T9732] name failslab, interval 1, probability 0, space 0, times 0 [ 850.679166][ T9744] loop2: detected capacity change from 0 to 6 [ 850.690179][ T9732] CPU: 0 PID: 9732 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 850.690211][ T9732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.690222][ T9732] Call Trace: [ 850.690230][ T9732] dump_stack+0x137/0x19d [ 850.711266][ T9752] FAULT_INJECTION: forcing a failure. [ 850.711266][ T9752] name failslab, interval 1, probability 0, space 0, times 0 [ 850.717006][ T9732] should_fail+0x23c/0x250 [ 850.717034][ T9732] ? mempool_alloc_slab+0x16/0x20 [ 850.717052][ T9732] __should_failslab+0x81/0x90 [ 850.717071][ T9732] should_failslab+0x5/0x20 [ 850.757080][ T9732] kmem_cache_alloc+0x46/0x300 [ 850.761881][ T9732] ? PageHuge+0x59/0xc0 [ 850.766043][ T9732] mempool_alloc_slab+0x16/0x20 [ 850.774294][ T9732] ? mempool_free+0x130/0x130 [ 850.779002][ T9732] mempool_alloc+0x8c/0x300 [ 850.784478][ T9732] bio_alloc_bioset+0xcc/0x480 [ 850.789438][ T9732] submit_bh_wbc+0x130/0x330 [ 850.794061][ T9732] __bread_gfp+0x110/0x220 [ 850.798486][ T9732] fat_fill_super+0xe77/0x2a80 [ 850.803305][ T9732] ? vfat_fill_super+0x40/0x40 [ 850.808079][ T9732] ? snprintf+0x6f/0x90 [ 850.812243][ T9732] ? register_shrinker_prepared+0xdf/0xf0 [ 850.818135][ T9732] ? set_blocksize+0x197/0x2a0 [ 850.822971][ T9732] vfat_fill_super+0x2c/0x40 [ 850.827565][ T9732] mount_bdev+0x1e8/0x290 [ 850.831897][ T9732] ? vfat_mount+0x40/0x40 [ 850.836758][ T9732] ? tsan.module_ctor+0x10/0x10 [ 850.841806][ T9732] vfat_mount+0x2d/0x40 [ 850.845991][ T9732] legacy_get_tree+0x70/0xc0 [ 850.850588][ T9732] vfs_get_tree+0x4a/0x1a0 [ 850.855104][ T9732] path_mount+0x11d6/0x1ce0 [ 850.859668][ T9732] __se_sys_mount+0x23d/0x2e0 [ 850.864408][ T9732] ? mntput+0x45/0x70 [ 850.868451][ T9732] ? __fpregs_load_activate+0x103/0x1b0 [ 850.874282][ T9732] __x64_sys_mount+0x63/0x70 [ 850.878936][ T9732] do_syscall_64+0x34/0x50 [ 850.883463][ T9732] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 850.889606][ T9732] RIP: 0033:0x46797a [ 850.893523][ T9732] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.913352][ T9732] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 850.921776][ T9732] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 850.929753][ T9732] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 850.939986][ T9732] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 850.947961][ T9732] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 850.955961][ T9732] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 850.963992][ T9752] CPU: 1 PID: 9752 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 850.972208][ T9735] loop4: detected capacity change from 0 to 6 [ 850.974682][ T9752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.990804][ T9752] Call Trace: [ 850.993188][ T9755] loop1: detected capacity change from 0 to 24576 [ 850.994081][ T9752] dump_stack+0x137/0x19d [ 851.004618][ T9755] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 851.004850][ T9752] should_fail+0x23c/0x250 [ 851.015378][ T9755] EXT4-fs (loop1): group descriptors corrupted! [ 851.019779][ T9752] ? security_inode_alloc+0x30/0x180 [ 851.031291][ T9752] __should_failslab+0x81/0x90 [ 851.036070][ T9752] should_failslab+0x5/0x20 [ 851.037223][ T9736] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 851.040613][ T9752] kmem_cache_alloc+0x46/0x300 [ 851.040639][ T9752] security_inode_alloc+0x30/0x180 [ 851.050884][ T9736] EXT4-fs (loop0): group descriptors corrupted! [ 851.055634][ T9752] inode_init_always+0x20b/0x420 [ 851.072602][ T9752] ? shmem_match+0xa0/0xa0 [ 851.077044][ T9752] new_inode_pseudo+0x73/0x1c0 [ 851.082074][ T9752] new_inode+0x21/0x120 [ 851.086237][ T9752] shmem_get_inode+0xa1/0x480 [ 851.090915][ T9752] __shmem_file_setup+0xf1/0x1d0 [ 851.095887][ T9752] shmem_file_setup+0x37/0x40 [ 851.100589][ T9752] __se_sys_memfd_create+0x1eb/0x390 [ 851.106209][ T9752] __x64_sys_memfd_create+0x2d/0x40 [ 851.111492][ T9752] do_syscall_64+0x34/0x50 [ 851.115975][ T9752] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 851.122222][ T9752] RIP: 0033:0x466459 [ 851.126110][ T9752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 851.147277][ T9752] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 851.158304][ T9752] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 851.166282][ T9752] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004beba8 [ 851.174256][ T9752] RBP: 0000000000000006 R08: 0000000000010000 R09: ffffffffffffffff [ 851.182231][ T9752] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000008100000 [ 851.190363][ T9752] R13: 0000000020000100 R14: 0000000000c00000 R15: 0000000020000300 14:12:52 executing program 3 (fault-call:0 fault-nth:60): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:52 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003ce0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 851.199393][ T9744] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 851.219455][ T9735] loop4: detected capacity change from 0 to 6 14:12:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000018e0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 851.278364][ T9776] FAULT_INJECTION: forcing a failure. [ 851.278364][ T9776] name failslab, interval 1, probability 0, space 0, times 0 [ 851.291183][ T9776] CPU: 0 PID: 9776 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 851.301594][ T9776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.311649][ T9776] Call Trace: [ 851.315112][ T9776] dump_stack+0x137/0x19d [ 851.319532][ T9776] should_fail+0x23c/0x250 [ 851.323966][ T9776] ? __d_alloc+0x36/0x370 [ 851.328338][ T9776] __should_failslab+0x81/0x90 [ 851.333088][ T9776] should_failslab+0x5/0x20 [ 851.337795][ T9776] kmem_cache_alloc+0x46/0x300 [ 851.342599][ T9776] ? __init_rwsem+0x59/0x70 [ 851.347194][ T9776] __d_alloc+0x36/0x370 [ 851.351456][ T9776] ? current_time+0xdb/0x190 [ 851.357331][ T9776] d_alloc_pseudo+0x1a/0x50 [ 851.361861][ T9776] alloc_file_pseudo+0x63/0x130 [ 851.366713][ T9776] __shmem_file_setup+0x14c/0x1d0 [ 851.371744][ T9776] shmem_file_setup+0x37/0x40 [ 851.376518][ T9776] __se_sys_memfd_create+0x1eb/0x390 [ 851.382053][ T9776] __x64_sys_memfd_create+0x2d/0x40 [ 851.388466][ T9776] do_syscall_64+0x34/0x50 [ 851.392869][ T9776] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 851.398827][ T9776] RIP: 0033:0x466459 [ 851.402912][ T9776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:12:53 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfe, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 851.422759][ T9776] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 851.431193][ T9776] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 851.439370][ T9776] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004beba8 [ 851.447438][ T9776] RBP: 0000000000000006 R08: 0000000000010000 R09: ffffffffffffffff [ 851.455421][ T9776] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000008100000 [ 851.463403][ T9776] R13: 0000000020000100 R14: 0000000000c00000 R15: 0000000020000300 14:12:53 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xa5260000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 851.507276][ T9775] loop3: detected capacity change from 0 to 6 [ 851.522980][ T9784] loop0: detected capacity change from 0 to 24576 [ 851.537143][ T9775] FAULT_INJECTION: forcing a failure. [ 851.537143][ T9775] name failslab, interval 1, probability 0, space 0, times 0 14:12:53 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 851.553429][ T9775] CPU: 1 PID: 9775 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 851.557764][ T9790] loop2: detected capacity change from 0 to 6 [ 851.563592][ T9775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.563609][ T9775] Call Trace: [ 851.563617][ T9775] dump_stack+0x137/0x19d [ 851.571647][ T9790] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 851.579795][ T9775] should_fail+0x23c/0x250 [ 851.579819][ T9775] __should_failslab+0x81/0x90 [ 851.579839][ T9775] ? fat_fill_super+0x60/0x2a80 [ 851.596318][ T9777] loop1: detected capacity change from 0 to 24576 [ 851.600313][ T9775] should_failslab+0x5/0x20 [ 851.620919][ T9775] kmem_cache_alloc_trace+0x49/0x320 [ 851.626194][ T9775] ? bdev_name+0x1e1/0x240 [ 851.630614][ T9775] ? vfat_fill_super+0x40/0x40 [ 851.635706][ T9775] fat_fill_super+0x60/0x2a80 [ 851.640477][ T9775] ? format_decode+0x60b/0x8a0 [ 851.646018][ T9775] ? vsnprintf+0xe8f/0xed0 [ 851.650448][ T9775] ? snprintf+0x6f/0x90 [ 851.654648][ T9775] ? register_shrinker_prepared+0xdf/0xf0 [ 851.667362][ T9775] ? set_blocksize+0x197/0x2a0 [ 851.672119][ T9775] vfat_fill_super+0x2c/0x40 [ 851.676847][ T9775] mount_bdev+0x1e8/0x290 [ 851.681409][ T9775] ? vfat_mount+0x40/0x40 [ 851.685784][ T9775] ? tsan.module_ctor+0x10/0x10 [ 851.690738][ T9775] vfat_mount+0x2d/0x40 [ 851.695490][ T9775] legacy_get_tree+0x70/0xc0 [ 851.700090][ T9775] vfs_get_tree+0x4a/0x1a0 [ 851.704579][ T9775] path_mount+0x11d6/0x1ce0 [ 851.709334][ T9775] __se_sys_mount+0x23d/0x2e0 [ 851.714127][ T9775] ? mntput+0x45/0x70 [ 851.718304][ T9775] ? __fpregs_load_activate+0x103/0x1b0 [ 851.725039][ T9775] __x64_sys_mount+0x63/0x70 [ 851.729679][ T9775] do_syscall_64+0x34/0x50 [ 851.734189][ T9775] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 851.740187][ T9775] RIP: 0033:0x46797a [ 851.744512][ T9775] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 851.764199][ T9775] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 851.772864][ T9775] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 851.781122][ T9775] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 851.790698][ T9775] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 851.798681][ T9775] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 851.806652][ T9775] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 [ 851.816683][ T9784] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 851.826965][ T9784] EXT4-fs (loop0): group descriptors corrupted! [ 851.847650][ T9777] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 851.857519][ T9800] FAULT_INJECTION: forcing a failure. [ 851.857519][ T9800] name failslab, interval 1, probability 0, space 0, times 0 [ 851.858251][ T9777] EXT4-fs (loop1): group descriptors corrupted! [ 851.870868][ T9800] CPU: 1 PID: 9800 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 851.888661][ T9800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.894299][ T9794] loop4: detected capacity change from 0 to 6 [ 851.898832][ T9800] Call Trace: [ 851.898844][ T9800] dump_stack+0x137/0x19d [ 851.898869][ T9800] should_fail+0x23c/0x250 [ 851.916031][ T9790] loop2: detected capacity change from 0 to 6 [ 851.917394][ T9800] ? __alloc_file+0x2e/0x1a0 [ 851.917425][ T9800] __should_failslab+0x81/0x90 [ 851.932893][ T9800] should_failslab+0x5/0x20 [ 851.937628][ T9800] kmem_cache_alloc+0x46/0x300 [ 851.947300][ T9800] ? inode_doinit_with_dentry+0x36f/0x940 [ 851.954757][ T9800] __alloc_file+0x2e/0x1a0 [ 851.960509][ T9800] alloc_empty_file+0xcd/0x1c0 [ 851.966946][ T9800] alloc_file+0x3a/0x280 [ 851.971299][ T9800] alloc_file_pseudo+0xe2/0x130 [ 851.976971][ T9800] __shmem_file_setup+0x14c/0x1d0 [ 851.981992][ T9800] shmem_file_setup+0x37/0x40 [ 851.986712][ T9800] __se_sys_memfd_create+0x1eb/0x390 [ 851.992007][ T9800] __x64_sys_memfd_create+0x2d/0x40 [ 851.997198][ T9800] do_syscall_64+0x34/0x50 [ 852.001729][ T9800] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 852.007663][ T9800] RIP: 0033:0x466459 [ 852.011666][ T9800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 852.031999][ T9800] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 852.040638][ T9800] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 852.048601][ T9800] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004beba8 [ 852.056570][ T9800] RBP: 0000000000000006 R08: 0000000000010000 R09: ffffffffffffffff [ 852.065062][ T9800] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000008100000 [ 852.073068][ T9800] R13: 0000000020000100 R14: 0000000000c00000 R15: 0000000020000300 14:12:53 executing program 3 (fault-call:0 fault-nth:61): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000018f0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:53 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:53 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xbc260000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 852.102901][ T9794] loop4: detected capacity change from 0 to 6 [ 852.128501][ T9790] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 852.139489][ T9816] loop0: detected capacity change from 0 to 24576 [ 852.167305][ T9820] loop3: detected capacity change from 0 to 6 [ 852.170918][ T9816] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 852.183553][ T9816] EXT4-fs (loop0): group descriptors corrupted! [ 852.184212][ T9820] FAULT_INJECTION: forcing a failure. [ 852.184212][ T9820] name failslab, interval 1, probability 0, space 0, times 0 [ 852.202911][ T9820] CPU: 0 PID: 9820 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 852.212997][ T9820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.218970][ T9829] FAULT_INJECTION: forcing a failure. [ 852.218970][ T9829] name failslab, interval 1, probability 0, space 0, times 0 [ 852.226358][ T9820] Call Trace: [ 852.226373][ T9820] dump_stack+0x137/0x19d [ 852.226400][ T9820] should_fail+0x23c/0x250 [ 852.226416][ T9820] __should_failslab+0x81/0x90 [ 852.226435][ T9820] should_failslab+0x5/0x20 [ 852.260749][ T9820] kmem_cache_alloc_node+0x56/0x2f0 [ 852.265993][ T9820] ? __mod_memcg_lruvec_state+0xfa/0x260 [ 852.271642][ T9820] ? create_task_io_context+0x36/0x210 [ 852.277134][ T9820] create_task_io_context+0x36/0x210 [ 852.282996][ T9820] submit_bio_checks+0x778/0x800 [ 852.288053][ T9820] ? mempool_alloc_slab+0x16/0x20 [ 852.293118][ T9820] ? kmem_cache_alloc+0x1af/0x300 [ 852.298228][ T9820] ? mempool_alloc_slab+0x16/0x20 [ 852.303267][ T9820] submit_bio_noacct+0x33/0x7e0 [ 852.308140][ T9820] ? mempool_alloc_slab+0x16/0x20 [ 852.313213][ T9820] ? mempool_free+0x130/0x130 [ 852.317902][ T9820] ? mempool_alloc+0x99/0x300 [ 852.322611][ T9820] ? __bio_add_page+0x1a3/0x210 [ 852.327471][ T9820] submit_bio+0x16d/0x2b0 [ 852.331933][ T9820] ? bio_add_page+0x1fc/0x260 [ 852.336617][ T9820] ? bio_alloc_bioset+0x402/0x480 [ 852.341667][ T9820] submit_bh_wbc+0x2f3/0x330 [ 852.346290][ T9820] __bread_gfp+0x110/0x220 [ 852.350753][ T9820] fat_fill_super+0xe77/0x2a80 [ 852.355587][ T9820] ? vfat_fill_super+0x40/0x40 [ 852.360385][ T9820] ? snprintf+0x6f/0x90 [ 852.364565][ T9820] ? register_shrinker_prepared+0xdf/0xf0 [ 852.370360][ T9820] ? set_blocksize+0x197/0x2a0 [ 852.375129][ T9820] vfat_fill_super+0x2c/0x40 [ 852.380197][ T9820] mount_bdev+0x1e8/0x290 [ 852.384713][ T9820] ? vfat_mount+0x40/0x40 [ 852.389091][ T9820] ? tsan.module_ctor+0x10/0x10 [ 852.394012][ T9820] vfat_mount+0x2d/0x40 [ 852.398210][ T9820] legacy_get_tree+0x70/0xc0 [ 852.403019][ T9820] vfs_get_tree+0x4a/0x1a0 [ 852.407475][ T9820] path_mount+0x11d6/0x1ce0 [ 852.412024][ T9820] __se_sys_mount+0x23d/0x2e0 [ 852.416838][ T9820] ? mntput+0x45/0x70 [ 852.421058][ T9820] ? __fpregs_load_activate+0x8f/0x1b0 [ 852.426526][ T9820] __x64_sys_mount+0x63/0x70 [ 852.431133][ T9820] do_syscall_64+0x34/0x50 [ 852.435643][ T9820] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 852.442186][ T9820] RIP: 0033:0x46797a [ 852.446080][ T9820] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 852.466059][ T9820] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 852.475177][ T9820] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000046797a [ 852.483190][ T9820] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 00007f236f4c3000 [ 852.491174][ T9820] RBP: 00007f236f4c3040 R08: 00007f236f4c3040 R09: 00000000200000c0 [ 852.499160][ T9820] R10: 0000000000008603 R11: 0000000000000206 R12: 00000000200000c0 [ 852.507279][ T9820] R13: 0000000020000100 R14: 00007f236f4c3000 R15: 0000000020000040 14:12:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000e30000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 852.515269][ T9829] CPU: 1 PID: 9829 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 852.525368][ T9829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.535481][ T9829] Call Trace: [ 852.538764][ T9829] dump_stack+0x137/0x19d [ 852.543098][ T9829] should_fail+0x23c/0x250 [ 852.547953][ T9829] ? security_file_alloc+0x30/0x190 [ 852.548347][ T9828] loop4: detected capacity change from 0 to 6 [ 852.553169][ T9829] __should_failslab+0x81/0x90 14:12:54 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x10e, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 852.559505][ T9830] loop1: detected capacity change from 0 to 24576 [ 852.564066][ T9829] should_failslab+0x5/0x20 [ 852.564096][ T9829] kmem_cache_alloc+0x46/0x300 [ 852.564116][ T9829] ? __alloc_file+0x2e/0x1a0 [ 852.584543][ T9829] security_file_alloc+0x30/0x190 [ 852.589585][ T9829] __alloc_file+0x83/0x1a0 [ 852.594053][ T9829] alloc_empty_file+0xcd/0x1c0 [ 852.598922][ T9829] alloc_file+0x3a/0x280 [ 852.604059][ T9829] alloc_file_pseudo+0xe2/0x130 [ 852.608985][ T9829] __shmem_file_setup+0x14c/0x1d0 [ 852.614032][ T9829] shmem_file_setup+0x37/0x40 [ 852.618894][ T9829] __se_sys_memfd_create+0x1eb/0x390 [ 852.624304][ T9829] __x64_sys_memfd_create+0x2d/0x40 [ 852.629654][ T9829] do_syscall_64+0x34/0x50 [ 852.634085][ T9829] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 852.640031][ T9829] RIP: 0033:0x466459 [ 852.643922][ T9829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:12:54 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 852.665279][ T9829] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 852.673993][ T9829] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 852.682890][ T9829] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004beba8 [ 852.690884][ T9829] RBP: 0000000000000006 R08: 0000000000010000 R09: ffffffffffffffff [ 852.699058][ T9829] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000008100000 [ 852.707034][ T9829] R13: 0000000020000100 R14: 0000000000c00000 R15: 0000000020000300 14:12:54 executing program 3 (fault-call:0 fault-nth:62): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000001960000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 852.738384][ T9830] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 852.748583][ T9830] EXT4-fs (loop1): group descriptors corrupted! [ 852.762504][ T9828] loop4: detected capacity change from 0 to 6 [ 852.774055][ T9840] loop2: detected capacity change from 0 to 6 14:12:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000e60000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 852.798478][ T9840] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 852.808809][ T9854] loop0: detected capacity change from 0 to 24576 [ 852.821027][ T9854] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 852.831202][ T9854] EXT4-fs (loop0): group descriptors corrupted! 14:12:54 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xc0ed0000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 852.845093][ T9857] FAULT_INJECTION: forcing a failure. [ 852.845093][ T9857] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 852.853597][ T9858] loop3: detected capacity change from 0 to 6 [ 852.859888][ T9857] CPU: 1 PID: 9857 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 852.876192][ T9857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.883776][ T9865] loop1: detected capacity change from 0 to 24576 [ 852.886368][ T9857] Call Trace: [ 852.886380][ T9857] dump_stack+0x137/0x19d [ 852.900487][ T9857] should_fail+0x23c/0x250 [ 852.905074][ T9857] __alloc_pages_nodemask+0xe7/0x310 [ 852.910930][ T9857] alloc_pages_vma+0x3c3/0x5e0 [ 852.915902][ T9857] shmem_getpage_gfp+0x980/0x1410 [ 852.922231][ T9857] ? mls_context_isvalid+0x76/0x1e0 [ 852.927731][ T9857] shmem_write_begin+0x7e/0x100 [ 852.932603][ T9857] generic_perform_write+0x196/0x3a0 [ 852.937985][ T9857] ? file_update_time+0x1bd/0x3e0 [ 852.943127][ T9857] __generic_file_write_iter+0x161/0x300 [ 852.949245][ T9857] ? generic_write_checks+0x250/0x290 [ 852.954700][ T9857] generic_file_write_iter+0x75/0x130 [ 852.960286][ T9857] vfs_write+0x69d/0x770 [ 852.964592][ T9857] __x64_sys_pwrite64+0xf5/0x150 [ 852.969548][ T9857] do_syscall_64+0x34/0x50 [ 852.974339][ T9857] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 852.980280][ T9857] RIP: 0033:0x4195f7 [ 852.984312][ T9857] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 853.006213][ T9857] RSP: 002b:00007f84cd585f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 853.015219][ T9857] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 853.023295][ T9857] RDX: 0000000000000066 RSI: 0000000020000040 RDI: 0000000000000004 [ 853.031551][ T9857] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 853.039760][ T9857] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 853.047984][ T9857] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 853.084608][ T9858] FAULT_INJECTION: forcing a failure. [ 853.084608][ T9858] name failslab, interval 1, probability 0, space 0, times 0 [ 853.097376][ T9858] CPU: 0 PID: 9858 Comm: syz-executor.3 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 853.107590][ T9858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.117650][ T9858] Call Trace: [ 853.120915][ T9858] dump_stack+0x137/0x19d [ 853.125230][ T9858] should_fail+0x23c/0x250 [ 853.129627][ T9858] __should_failslab+0x81/0x90 [ 853.136055][ T9858] ? kzalloc+0x1d/0x30 [ 853.140252][ T9858] should_failslab+0x5/0x20 [ 853.144770][ T9858] __kmalloc+0x66/0x360 [ 853.148952][ T9858] kzalloc+0x1d/0x30 [ 853.154555][ T9858] kobject_get_path+0x7c/0x110 [ 853.159460][ T9858] kobject_uevent_env+0x1be/0xc40 [ 853.164556][ T9858] ? kernfs_put+0x2e2/0x300 [ 853.169117][ T9858] kobject_uevent+0x18/0x20 [ 853.173736][ T9858] __loop_clr_fd+0x439/0x650 [ 853.178526][ T9858] lo_ioctl+0x9eb/0x11f0 [ 853.182905][ T9858] ? ___cache_free+0x3c/0x300 [ 853.187629][ T9858] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 853.193083][ T9858] ? call_rcu+0x250/0x660 [ 853.198014][ T9858] ? kfree+0xf0/0x1d0 [ 853.202606][ T9858] ? avc_has_extended_perms+0x5d8/0x7b0 [ 853.208277][ T9858] ? vfat_mount+0x40/0x40 [ 853.212640][ T9858] ? kfree+0xf0/0x1d0 [ 853.217060][ T9858] ? blkdev_common_ioctl+0x9c3/0x1010 [ 853.223478][ T9858] ? selinux_file_ioctl+0x8e0/0x970 [ 853.229002][ T9858] ? lo_release+0x120/0x120 [ 853.233800][ T9858] blkdev_ioctl+0x1d0/0x3c0 [ 853.238582][ T9858] block_ioctl+0x6d/0x80 [ 853.242844][ T9858] ? blkdev_iopoll+0x70/0x70 [ 853.247425][ T9858] __se_sys_ioctl+0xcb/0x140 [ 853.252372][ T9858] __x64_sys_ioctl+0x3f/0x50 [ 853.256954][ T9858] do_syscall_64+0x34/0x50 [ 853.261485][ T9858] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 853.268032][ T9858] RIP: 0033:0x466217 [ 853.271955][ T9858] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 853.291991][ T9858] RSP: 002b:00007f236f4c2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 853.300588][ T9858] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 0000000000466217 [ 853.310727][ T9858] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 853.319282][ T9858] RBP: 00007f236f4c36bc R08: 00007f236f4c3040 R09: 00000000200000c0 [ 853.327352][ T9858] R10: 0000000000008603 R11: 0000000000000246 R12: ffffffffffffffff [ 853.335415][ T9858] R13: 0000000000000016 R14: 00007f236f4c3000 R15: 0000000020000040 [ 853.351882][ T9857] loop5: detected capacity change from 0 to 24576 [ 853.353442][ T9865] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 853.368510][ T9865] EXT4-fs (loop1): group descriptors corrupted! [ 853.368832][ T9857] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 853.386909][ T9840] loop2: detected capacity change from 0 to 6 [ 853.394106][ T9868] loop4: detected capacity change from 0 to 6 [ 853.401705][ T9840] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:55 executing program 3 (fault-call:0 fault-nth:63): syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:55 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:55 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xe5ffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000fffffff970000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 853.442607][ T9868] FAT-fs (loop4): Directory bread(block 6) failed 14:12:55 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x204, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 853.518357][ T9889] loop0: detected capacity change from 0 to 24576 [ 853.526998][ T9893] FAULT_INJECTION: forcing a failure. [ 853.526998][ T9893] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 853.540279][ T9893] CPU: 0 PID: 9893 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 853.550605][ T9893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.553440][ T9889] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 853.561433][ T9893] Call Trace: [ 853.561452][ T9893] dump_stack+0x137/0x19d [ 853.561506][ T9893] should_fail+0x23c/0x250 [ 853.572510][ T9889] EXT4-fs (loop0): group descriptors corrupted! [ 853.575970][ T9893] should_fail_usercopy+0x16/0x20 [ 853.590914][ T9894] loop2: detected capacity change from 0 to 6 [ 853.592512][ T9893] iov_iter_copy_from_user_atomic+0x2aa/0x790 [ 853.614312][ T9892] loop3: detected capacity change from 0 to 6 [ 853.618262][ T9893] ? shmem_write_begin+0x7e/0x100 [ 853.629497][ T9894] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 853.630516][ T9893] generic_perform_write+0x1e4/0x3a0 [ 853.630543][ T9893] ? file_update_time+0x1bd/0x3e0 [ 853.656170][ T9893] __generic_file_write_iter+0x161/0x300 [ 853.662705][ T9893] ? generic_write_checks+0x250/0x290 [ 853.668068][ T9893] generic_file_write_iter+0x75/0x130 [ 853.673489][ T9893] vfs_write+0x69d/0x770 [ 853.677816][ T9893] __x64_sys_pwrite64+0xf5/0x150 [ 853.683317][ T9893] do_syscall_64+0x34/0x50 [ 853.687723][ T9893] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 853.693612][ T9893] RIP: 0033:0x4195f7 [ 853.698023][ T9893] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 14:12:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000026b10000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 853.717965][ T9893] RSP: 002b:00007f84cd585f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 853.726390][ T9893] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 853.734352][ T9893] RDX: 0000000000000066 RSI: 0000000020000040 RDI: 0000000000000004 [ 853.743378][ T9893] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 853.751728][ T9893] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 853.759701][ T9893] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 14:12:55 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 853.818298][ T9894] loop2: detected capacity change from 0 to 6 [ 853.831538][ T9893] loop5: detected capacity change from 0 to 24576 [ 853.842311][ T9894] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 853.859926][ T9917] loop0: detected capacity change from 0 to 24576 14:12:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000e70000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 853.863889][ T9918] loop4: detected capacity change from 0 to 6 [ 853.880420][ T9922] loop3: detected capacity change from 0 to 6 [ 853.882432][ T9893] EXT4-fs (loop5): failed to initialize system zone (-117) [ 853.895913][ T9893] EXT4-fs (loop5): mount failed [ 853.905678][ T9917] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 14:12:55 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 853.916365][ T9917] EXT4-fs (loop0): group descriptors corrupted! [ 853.928963][ T9918] loop4: detected capacity change from 0 to 6 14:12:55 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:55 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf0030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:55 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 853.995801][ T9932] loop1: detected capacity change from 0 to 24576 [ 854.009111][ T9932] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 854.019615][ T9932] EXT4-fs (loop1): group descriptors corrupted! [ 854.026866][ T9952] loop3: detected capacity change from 0 to 6 [ 854.036514][ T9948] loop4: detected capacity change from 0 to 6 14:12:55 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf0ffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:55 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 854.041711][ T9956] FAULT_INJECTION: forcing a failure. [ 854.041711][ T9956] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 854.056576][ T9956] CPU: 1 PID: 9956 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 854.066694][ T9956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.077001][ T9956] Call Trace: [ 854.080763][ T9956] dump_stack+0x137/0x19d [ 854.085340][ T9956] should_fail+0x23c/0x250 [ 854.089817][ T9956] should_fail_usercopy+0x16/0x20 14:12:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000edc00000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 854.094857][ T9956] iov_iter_copy_from_user_atomic+0x2aa/0x790 [ 854.101132][ T9956] ? shmem_write_begin+0x7e/0x100 [ 854.106171][ T9956] generic_perform_write+0x1e4/0x3a0 [ 854.111470][ T9956] ? file_update_time+0x1bd/0x3e0 [ 854.116533][ T9956] __generic_file_write_iter+0x161/0x300 [ 854.122209][ T9956] ? generic_write_checks+0x250/0x290 [ 854.127651][ T9956] generic_file_write_iter+0x75/0x130 [ 854.133039][ T9956] vfs_write+0x69d/0x770 [ 854.135772][ T9951] loop2: detected capacity change from 0 to 6 [ 854.137431][ T9956] __x64_sys_pwrite64+0xf5/0x150 [ 854.148595][ T9956] do_syscall_64+0x34/0x50 [ 854.153043][ T9956] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 854.159040][ T9956] RIP: 0033:0x4195f7 [ 854.163090][ T9956] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 854.183123][ T9956] RSP: 002b:00007f84cd585f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 854.191547][ T9956] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 854.199736][ T9956] RDX: 000000000000001f RSI: 00000000200000c0 RDI: 0000000000000004 [ 854.207702][ T9956] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 854.215717][ T9956] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000004 [ 854.223855][ T9956] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 14:12:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000e80000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 854.271525][ T9951] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 854.273686][ T9968] loop3: detected capacity change from 0 to 6 [ 854.281441][ T9970] loop0: detected capacity change from 0 to 24576 [ 854.300631][ T9970] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 854.302691][ T9969] loop4: detected capacity change from 0 to 6 [ 854.310982][ T9970] EXT4-fs (loop0): group descriptors corrupted! [ 854.330108][ T9956] loop5: detected capacity change from 0 to 24576 [ 854.357023][ T9968] loop3: detected capacity change from 0 to 6 [ 854.361542][ T9951] loop2: detected capacity change from 0 to 6 14:12:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003c10000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:56 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf1030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 854.363303][ T9969] loop4: detected capacity change from 0 to 6 [ 854.378828][ T9984] loop1: detected capacity change from 0 to 24576 [ 854.379077][ T9956] EXT4-fs (loop5): failed to initialize system zone (-117) [ 854.394396][ T9984] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 854.405716][ T9984] EXT4-fs (loop1): group descriptors corrupted! [ 854.407726][ T9951] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:56 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x35a, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:56 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 854.460965][T10006] loop0: detected capacity change from 0 to 24576 [ 854.470165][T10006] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 854.480343][T10006] EXT4-fs (loop0): group descriptors corrupted! [ 854.493805][T10008] loop4: detected capacity change from 0 to 6 [ 854.494393][ T9956] EXT4-fs (loop5): mount failed 14:12:56 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000c0ed0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 854.572967][T10015] loop2: detected capacity change from 0 to 6 [ 854.580994][T10016] loop3: detected capacity change from 0 to 6 [ 854.587360][T10008] loop4: detected capacity change from 0 to 6 [ 854.602315][T10015] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 854.653904][T10015] loop2: detected capacity change from 0 to 6 [ 854.661817][T10015] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 854.678036][T10032] FAULT_INJECTION: forcing a failure. [ 854.678036][T10032] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 854.692001][T10032] CPU: 0 PID: 10032 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 14:12:56 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf2030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:56 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x360, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003c40000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 854.702192][T10032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.712710][T10032] Call Trace: [ 854.713368][T10016] loop3: detected capacity change from 0 to 6 [ 854.716000][T10032] dump_stack+0x137/0x19d [ 854.716028][T10032] should_fail+0x23c/0x250 [ 854.716045][T10032] should_fail_usercopy+0x16/0x20 [ 854.716062][T10032] iov_iter_copy_from_user_atomic+0x2aa/0x790 [ 854.739003][T10043] loop1: detected capacity change from 0 to 24576 [ 854.742140][T10032] ? shmem_write_begin+0x7e/0x100 [ 854.742188][T10032] generic_perform_write+0x1e4/0x3a0 [ 854.742208][T10032] ? file_update_time+0x1bd/0x3e0 [ 854.742224][T10032] __generic_file_write_iter+0x161/0x300 [ 854.742263][T10032] ? generic_write_checks+0x250/0x290 [ 854.742286][T10032] generic_file_write_iter+0x75/0x130 [ 854.742304][T10032] vfs_write+0x69d/0x770 [ 854.753108][T10046] loop0: detected capacity change from 0 to 24576 [ 854.753837][T10032] __x64_sys_pwrite64+0xf5/0x150 [ 854.759772][T10047] loop4: detected capacity change from 0 to 6 [ 854.764295][T10032] do_syscall_64+0x34/0x50 [ 854.764326][T10032] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 854.813734][T10032] RIP: 0033:0x4195f7 [ 854.817630][T10032] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 854.837230][T10032] RSP: 002b:00007f84cd585f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 854.845650][T10032] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 14:12:56 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf3030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 854.853622][T10032] RDX: 0000000000000009 RSI: 0000000020010200 RDI: 0000000000000004 [ 854.861716][T10032] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 854.869677][T10032] R10: 0000000000000560 R11: 0000000000000293 R12: 0000000000000004 [ 854.877694][T10032] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 14:12:56 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000049ee0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 854.919750][T10043] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 854.930151][T10043] EXT4-fs (loop1): group descriptors corrupted! [ 854.936776][T10032] loop5: detected capacity change from 0 to 24576 [ 854.940953][T10046] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 854.944831][T10061] loop2: detected capacity change from 0 to 6 [ 854.953331][T10046] EXT4-fs (loop0): group descriptors corrupted! 14:12:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003c50000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 854.981841][T10032] EXT4-fs (loop5): failed to initialize system zone (-117) [ 854.989444][T10072] loop4: detected capacity change from 0 to 6 [ 855.006037][T10061] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 855.007988][T10032] EXT4-fs (loop5): mount failed 14:12:56 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf4030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 855.037752][T10074] loop3: detected capacity change from 0 to 6 [ 855.071471][T10086] loop1: detected capacity change from 0 to 24576 [ 855.076115][T10088] loop0: detected capacity change from 0 to 24576 14:12:56 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:56 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 855.087331][T10061] loop2: detected capacity change from 0 to 6 [ 855.097077][T10086] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! [ 855.107393][T10086] EXT4-fs (loop1): group descriptors corrupted! [ 855.126159][T10061] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 855.156225][T10088] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 855.166887][T10108] FAULT_INJECTION: forcing a failure. [ 855.166887][T10108] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 855.171447][T10088] EXT4-fs (loop0): group descriptors corrupted! [ 855.184676][T10108] CPU: 0 PID: 10108 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 14:12:56 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x387, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 855.191030][T10094] loop4: detected capacity change from 0 to 6 [ 855.201346][T10108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.201363][T10108] Call Trace: [ 855.201371][T10108] dump_stack+0x137/0x19d [ 855.218645][T10107] loop3: detected capacity change from 0 to 6 [ 855.221794][T10108] should_fail+0x23c/0x250 [ 855.240741][T10108] should_fail_usercopy+0x16/0x20 [ 855.245856][T10108] iov_iter_copy_from_user_atomic+0x2aa/0x790 [ 855.252844][T10108] ? shmem_write_begin+0x7e/0x100 [ 855.258178][T10108] generic_perform_write+0x1e4/0x3a0 [ 855.263607][T10108] ? file_update_time+0x1bd/0x3e0 [ 855.268621][T10108] __generic_file_write_iter+0x161/0x300 [ 855.274283][T10108] ? generic_write_checks+0x250/0x290 [ 855.279740][T10108] generic_file_write_iter+0x75/0x130 [ 855.285110][T10108] vfs_write+0x69d/0x770 [ 855.289337][T10108] __x64_sys_pwrite64+0xf5/0x150 [ 855.294349][T10108] do_syscall_64+0x34/0x50 [ 855.298841][T10108] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 855.304735][T10108] RIP: 0033:0x4195f7 [ 855.308626][T10108] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 855.328450][T10108] RSP: 002b:00007f84cd585f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 855.337048][T10108] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 855.345035][T10108] RDX: 0000000000000009 RSI: 0000000020010300 RDI: 0000000000000004 [ 855.353272][T10108] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 855.361273][T10108] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 855.369232][T10108] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 14:12:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003c60000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000fff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 855.422042][T10094] loop4: detected capacity change from 0 to 6 [ 855.439603][T10108] loop5: detected capacity change from 0 to 24576 [ 855.443872][T10124] loop2: detected capacity change from 0 to 6 14:12:57 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf5030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 855.481857][T10124] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 855.490886][T10107] loop3: detected capacity change from 0 to 6 [ 855.495973][T10108] EXT4-fs (loop5): failed to initialize system zone (-117) [ 855.498256][T10126] loop0: detected capacity change from 0 to 24576 [ 855.504441][T10108] EXT4-fs (loop5): mount failed 14:12:57 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 855.523787][T10126] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 855.534039][T10126] EXT4-fs (loop0): group descriptors corrupted! [ 855.534168][T10138] loop1: detected capacity change from 0 to 24576 [ 855.552745][T10124] loop2: detected capacity change from 0 to 6 [ 855.559551][T10124] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 855.560475][T10138] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3)! 14:12:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003c70000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:57 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:57 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x399, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 855.578558][T10138] EXT4-fs (loop1): group descriptors corrupted! [ 855.598772][T10145] loop4: detected capacity change from 0 to 6 [ 855.628830][T10162] FAULT_INJECTION: forcing a failure. [ 855.628830][T10162] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 855.642634][T10162] CPU: 0 PID: 10162 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 855.652035][T10166] loop2: detected capacity change from 0 to 6 [ 855.652886][T10162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.660269][T10167] loop0: detected capacity change from 0 to 24576 [ 855.669102][T10162] Call Trace: [ 855.669121][T10162] dump_stack+0x137/0x19d [ 855.669144][T10162] should_fail+0x23c/0x250 [ 855.669160][T10162] __alloc_pages_nodemask+0xe7/0x310 [ 855.693187][T10162] alloc_pages_vma+0x3c3/0x5e0 [ 855.697975][T10162] shmem_getpage_gfp+0x980/0x1410 [ 855.703004][T10162] shmem_write_begin+0x7e/0x100 [ 855.707858][T10162] generic_perform_write+0x196/0x3a0 [ 855.713145][T10162] ? file_update_time+0x1bd/0x3e0 [ 855.718175][T10162] __generic_file_write_iter+0x161/0x300 [ 855.723827][T10162] ? generic_write_checks+0x250/0x290 [ 855.731150][T10162] generic_file_write_iter+0x75/0x130 [ 855.736544][T10162] vfs_write+0x69d/0x770 [ 855.740915][T10162] __x64_sys_pwrite64+0xf5/0x150 [ 855.745864][T10162] do_syscall_64+0x34/0x50 [ 855.750321][T10162] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 855.756227][T10162] RIP: 0033:0x4195f7 [ 855.760126][T10162] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 855.779743][T10162] RSP: 002b:00007f84cd585f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 855.788198][T10162] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 855.796280][T10162] RDX: 000000000000001d RSI: 0000000020010d00 RDI: 0000000000000004 [ 855.804320][T10162] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 855.812394][T10162] R10: 0000000000001480 R11: 0000000000000293 R12: 0000000000000004 [ 855.821105][T10162] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 14:12:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000200000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 855.829811][T10164] loop3: detected capacity change from 0 to 6 [ 855.844607][T10145] loop4: detected capacity change from 0 to 6 [ 855.853220][T10166] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:57 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf6030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003c80000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 855.906807][T10167] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 855.917018][T10167] EXT4-fs (loop0): group descriptors corrupted! [ 855.919217][T10162] loop5: detected capacity change from 0 to 24576 [ 855.959082][T10164] loop3: detected capacity change from 0 to 6 [ 855.961305][T10196] loop4: detected capacity change from 0 to 6 [ 855.965577][T10186] loop1: detected capacity change from 0 to 24576 14:12:57 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x39a, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:57 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 856.003990][T10162] EXT4-fs error (device loop5): ext4_fill_super:4943: inode #2: comm syz-executor.5: iget: root inode unallocated [ 856.016576][T10162] EXT4-fs (loop5): get root inode failed [ 856.022490][T10162] EXT4-fs (loop5): mount failed [ 856.031273][T10196] loop4: detected capacity change from 0 to 6 [ 856.046727][T10186] EXT4-fs (loop1): bad geometry: first data block 512 is beyond end of filesystem (512) [ 856.055589][T10211] loop2: detected capacity change from 0 to 6 [ 856.093711][T10215] loop3: detected capacity change from 0 to 6 14:12:57 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf6ffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:57 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 856.101343][T10216] loop0: detected capacity change from 0 to 24576 [ 856.109751][T10211] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:12:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000ffff0300000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:57 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 856.169889][T10211] loop2: detected capacity change from 0 to 6 [ 856.173835][T10216] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 856.186418][T10216] EXT4-fs (loop0): group descriptors corrupted! [ 856.198984][T10211] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 856.199570][T10234] FAULT_INJECTION: forcing a failure. [ 856.199570][T10234] name failslab, interval 1, probability 0, space 0, times 0 [ 856.210363][T10232] loop4: detected capacity change from 0 to 6 [ 856.220153][T10234] CPU: 1 PID: 10234 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 856.220179][T10234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.247880][T10234] Call Trace: [ 856.251155][T10234] dump_stack+0x137/0x19d [ 856.255600][T10234] should_fail+0x23c/0x250 [ 856.260797][T10234] ? xas_create+0x3fb/0xb30 [ 856.265765][T10234] __should_failslab+0x81/0x90 [ 856.270521][T10234] should_failslab+0x5/0x20 [ 856.275032][T10234] kmem_cache_alloc+0x46/0x300 [ 856.279803][T10234] xas_create+0x3fb/0xb30 [ 856.284207][T10234] xas_create_range+0x146/0x360 [ 856.289066][T10234] shmem_add_to_page_cache+0x3ad/0x650 [ 856.294671][T10234] shmem_getpage_gfp+0xbdc/0x1410 [ 856.299792][T10234] shmem_write_begin+0x7e/0x100 [ 856.304766][T10234] generic_perform_write+0x196/0x3a0 [ 856.310036][T10234] ? file_update_time+0x1bd/0x3e0 [ 856.315064][T10234] __generic_file_write_iter+0x161/0x300 [ 856.320694][T10234] ? generic_write_checks+0x250/0x290 [ 856.326146][T10234] generic_file_write_iter+0x75/0x130 [ 856.331812][T10234] vfs_write+0x69d/0x770 [ 856.336065][T10234] __x64_sys_pwrite64+0xf5/0x150 [ 856.340988][T10234] do_syscall_64+0x34/0x50 [ 856.345441][T10234] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 856.351340][T10234] RIP: 0033:0x4195f7 [ 856.355247][T10234] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 856.374834][T10234] RSP: 002b:00007f84cd585f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 856.383272][T10234] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 856.391419][T10234] RDX: 000000000000001d RSI: 0000000020010d00 RDI: 0000000000000004 [ 856.399391][T10234] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 856.407375][T10234] R10: 0000000000001480 R11: 0000000000000293 R12: 0000000000000004 [ 856.415743][T10234] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 14:12:58 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x39b, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 856.444677][T10234] loop5: detected capacity change from 0 to 24576 [ 856.469668][T10232] loop4: detected capacity change from 0 to 6 [ 856.469666][T10238] loop1: detected capacity change from 0 to 24576 [ 856.484713][T10234] EXT4-fs (loop5): failed to initialize system zone (-117) 14:12:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003c90000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:58 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 856.492159][T10238] EXT4-fs (loop1): bad geometry: first data block 1023 is beyond end of filesystem (512) [ 856.495921][T10234] EXT4-fs (loop5): mount failed [ 856.509122][T10256] loop3: detected capacity change from 0 to 6 [ 856.558089][T10263] loop0: detected capacity change from 0 to 24576 [ 856.585883][T10263] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 856.587984][T10259] loop2: detected capacity change from 0 to 6 14:12:58 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf7030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:58 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000400000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 856.596053][T10263] EXT4-fs (loop0): group descriptors corrupted! [ 856.629508][T10274] loop3: detected capacity change from 0 to 6 [ 856.635808][T10259] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 856.643003][T10282] FAULT_INJECTION: forcing a failure. [ 856.643003][T10282] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 856.659950][T10282] CPU: 1 PID: 10282 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 14:12:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003ca0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 856.670687][T10282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.680815][T10282] Call Trace: [ 856.684099][T10282] dump_stack+0x137/0x19d [ 856.688442][T10282] should_fail+0x23c/0x250 [ 856.692875][T10282] should_fail_usercopy+0x16/0x20 [ 856.697913][T10282] iov_iter_copy_from_user_atomic+0x2aa/0x790 [ 856.704490][T10282] ? shmem_write_begin+0x7e/0x100 [ 856.709706][T10282] generic_perform_write+0x1e4/0x3a0 [ 856.716068][T10282] ? file_update_time+0x1bd/0x3e0 [ 856.721547][T10282] __generic_file_write_iter+0x161/0x300 [ 856.727454][T10282] ? generic_write_checks+0x250/0x290 [ 856.733231][T10282] generic_file_write_iter+0x75/0x130 [ 856.738617][T10282] vfs_write+0x69d/0x770 [ 856.742891][T10282] __x64_sys_pwrite64+0xf5/0x150 [ 856.747861][T10282] do_syscall_64+0x34/0x50 [ 856.754455][T10282] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 856.762553][T10282] RIP: 0033:0x4195f7 [ 856.766463][T10282] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 856.786721][T10282] RSP: 002b:00007f84cd585f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 856.795288][T10282] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 856.803262][T10282] RDX: 000000000000001d RSI: 0000000020010d00 RDI: 0000000000000004 [ 856.811237][T10282] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 856.819221][T10282] R10: 0000000000001480 R11: 0000000000000293 R12: 0000000000000004 [ 856.827316][T10282] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 856.836408][T10291] loop0: detected capacity change from 0 to 24576 [ 856.850830][T10281] loop4: detected capacity change from 0 to 6 [ 856.862048][T10285] loop1: detected capacity change from 0 to 24576 14:12:58 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x39c, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003cb0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 856.870673][T10291] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 856.881384][T10291] EXT4-fs (loop0): group descriptors corrupted! [ 856.888702][T10282] loop5: detected capacity change from 0 to 24576 [ 856.889771][T10285] EXT4-fs (loop1): bad geometry: first data block 1024 is beyond end of filesystem (512) 14:12:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000ffff1f00000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:58 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 856.922147][T10274] loop3: detected capacity change from 0 to 6 [ 856.936525][T10281] loop4: detected capacity change from 0 to 6 14:12:58 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf8030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 856.990192][T10315] loop0: detected capacity change from 0 to 24576 [ 856.998509][T10315] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 856.998755][T10318] loop2: detected capacity change from 0 to 6 [ 857.008992][T10315] EXT4-fs (loop0): group descriptors corrupted! [ 857.022195][T10316] loop1: detected capacity change from 0 to 24576 [ 857.026444][T10282] EXT4-fs (loop5): failed to initialize system zone (-117) 14:12:58 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 857.036186][T10282] EXT4-fs (loop5): mount failed [ 857.048373][T10316] EXT4-fs (loop1): bad geometry: first data block 8191 is beyond end of filesystem (512) [ 857.058718][T10318] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 857.067510][T10324] loop4: detected capacity change from 0 to 6 14:12:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003cc0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000003000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:58 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf9030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 857.118059][T10336] loop3: detected capacity change from 0 to 6 [ 857.137630][T10318] loop2: detected capacity change from 0 to 6 [ 857.161178][T10318] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 857.174259][T10336] loop3: detected capacity change from 0 to 6 [ 857.176795][T10357] FAULT_INJECTION: forcing a failure. [ 857.176795][T10357] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 857.194161][T10357] CPU: 1 PID: 10357 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 857.201122][T10356] loop4: detected capacity change from 0 to 6 [ 857.204417][T10357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 857.204431][T10357] Call Trace: [ 857.204439][T10357] dump_stack+0x137/0x19d [ 857.204461][T10357] should_fail+0x23c/0x250 [ 857.210738][T10354] loop1: detected capacity change from 0 to 24576 [ 857.220614][T10357] __alloc_pages_nodemask+0xe7/0x310 [ 857.220650][T10357] alloc_pages_vma+0x3c3/0x5e0 [ 857.226128][T10355] loop0: detected capacity change from 0 to 24576 [ 857.228369][T10357] shmem_getpage_gfp+0x980/0x1410 [ 857.228442][T10357] shmem_write_begin+0x7e/0x100 [ 857.266694][T10357] generic_perform_write+0x196/0x3a0 [ 857.272013][T10357] ? file_update_time+0x1bd/0x3e0 [ 857.277167][T10357] __generic_file_write_iter+0x161/0x300 [ 857.283330][T10357] ? generic_write_checks+0x250/0x290 [ 857.289020][T10357] generic_file_write_iter+0x75/0x130 [ 857.295441][T10357] vfs_write+0x69d/0x770 [ 857.300602][T10357] __x64_sys_pwrite64+0xf5/0x150 [ 857.305643][T10357] do_syscall_64+0x34/0x50 [ 857.310807][T10357] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 857.316907][T10357] RIP: 0033:0x4195f7 [ 857.323921][T10357] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 857.344473][T10357] RSP: 002b:00007f84cd585f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 857.352959][T10357] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 857.360983][T10357] RDX: 0000000000000008 RSI: 0000000020012000 RDI: 0000000000000004 [ 857.369086][T10357] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 857.377052][T10357] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 857.385132][T10357] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 14:12:59 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 857.427424][T10354] EXT4-fs (loop1): bad geometry: first data block 12288 is beyond end of filesystem (512) [ 857.430956][T10356] loop4: detected capacity change from 0 to 6 [ 857.438184][T10355] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 857.454601][T10355] EXT4-fs (loop0): group descriptors corrupted! 14:12:59 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x39d, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 857.474416][T10357] loop5: detected capacity change from 0 to 24576 14:12:59 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xf9fdffff, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:12:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000001000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003cd0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 857.501012][T10374] loop3: detected capacity change from 0 to 6 [ 857.586787][T10357] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 64 [ 857.599828][T10374] loop3: detected capacity change from 0 to 6 [ 857.611717][T10393] loop1: detected capacity change from 0 to 24576 [ 857.611717][T10392] loop4: detected capacity change from 0 to 6 [ 857.624650][T10388] loop2: detected capacity change from 0 to 6 14:12:59 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:59 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 857.645427][T10392] loop4: detected capacity change from 0 to 6 [ 857.658295][T10393] EXT4-fs (loop1): bad geometry: first data block 65536 is beyond end of filesystem (512) [ 857.675521][T10388] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 857.689613][T10401] loop0: detected capacity change from 0 to 24576 14:12:59 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xfa030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 857.707875][T10401] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 857.716628][T10419] FAULT_INJECTION: forcing a failure. [ 857.716628][T10419] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 857.718033][T10401] EXT4-fs (loop0): group descriptors corrupted! [ 857.731454][T10418] loop3: detected capacity change from 0 to 6 [ 857.737576][T10419] CPU: 0 PID: 10419 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 857.754264][T10419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 857.764632][T10419] Call Trace: [ 857.768015][T10419] dump_stack+0x137/0x19d [ 857.772486][T10419] should_fail+0x23c/0x250 [ 857.776889][T10419] should_fail_usercopy+0x16/0x20 [ 857.781904][T10419] iov_iter_copy_from_user_atomic+0x2aa/0x790 [ 857.788006][T10419] ? shmem_write_begin+0x7e/0x100 [ 857.793203][T10419] generic_perform_write+0x1e4/0x3a0 [ 857.798502][T10419] ? file_update_time+0x1bd/0x3e0 [ 857.803616][T10419] __generic_file_write_iter+0x161/0x300 [ 857.809263][T10419] ? generic_write_checks+0x250/0x290 [ 857.814773][T10419] generic_file_write_iter+0x75/0x130 [ 857.820821][T10419] vfs_write+0x69d/0x770 [ 857.825116][T10419] __x64_sys_pwrite64+0xf5/0x150 [ 857.830578][T10419] do_syscall_64+0x34/0x50 [ 857.835146][T10419] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 857.841312][T10419] RIP: 0033:0x4195f7 [ 857.845552][T10419] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 857.865598][T10419] RSP: 002b:00007f84cd585f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 857.873999][T10419] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 857.882274][T10419] RDX: 0000000000000008 RSI: 0000000020012000 RDI: 0000000000000004 [ 857.890928][T10419] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 857.899320][T10419] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 14:12:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f65c948cd0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000002000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 857.907294][T10419] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 857.938646][T10423] loop4: detected capacity change from 0 to 6 [ 857.950116][T10419] loop5: detected capacity change from 0 to 24576 [ 857.968787][T10432] loop0: detected capacity change from 0 to 24576 [ 857.990772][T10423] loop4: detected capacity change from 0 to 6 [ 857.994889][T10388] loop2: detected capacity change from 0 to 6 [ 857.997073][T10418] loop3: detected capacity change from 0 to 6 14:12:59 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xfb030000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 858.011600][T10388] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 858.020926][T10419] EXT4-fs (loop5): failed to initialize system zone (-117) [ 858.021307][T10432] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 858.031675][T10419] EXT4-fs (loop5): mount failed [ 858.039213][T10432] EXT4-fs (loop0): group descriptors corrupted! [ 858.045408][T10449] loop1: detected capacity change from 0 to 24576 14:12:59 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:12:59 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x39e, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:12:59 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 858.092760][T10449] EXT4-fs (loop1): bad geometry: first data block 131072 is beyond end of filesystem (512) [ 858.126859][T10460] loop4: detected capacity change from 0 to 6 [ 858.133387][T10468] loop3: detected capacity change from 0 to 6 14:12:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000003ce0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:12:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000402000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 858.180492][T10479] FAULT_INJECTION: forcing a failure. [ 858.180492][T10479] name failslab, interval 1, probability 0, space 0, times 0 [ 858.181562][T10474] loop2: detected capacity change from 0 to 6 [ 858.193633][T10479] CPU: 0 PID: 10479 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 858.209938][T10479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.220203][T10479] Call Trace: [ 858.223558][T10479] dump_stack+0x137/0x19d [ 858.230654][T10479] should_fail+0x23c/0x250 [ 858.235167][T10479] ? getname_flags+0x84/0x3d0 [ 858.239912][T10479] __should_failslab+0x81/0x90 [ 858.244668][T10479] should_failslab+0x5/0x20 [ 858.249199][T10479] kmem_cache_alloc+0x46/0x300 [ 858.254674][T10479] getname_flags+0x84/0x3d0 [ 858.259347][T10479] ? vfs_write+0x50c/0x770 [ 858.264013][T10479] getname+0x15/0x20 [ 858.267900][T10479] do_sys_openat2+0x5b/0x250 [ 858.272660][T10479] __x64_sys_openat+0xef/0x110 [ 858.277696][T10479] do_syscall_64+0x34/0x50 [ 858.284529][T10479] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 858.291770][T10479] RIP: 0033:0x419544 [ 858.295909][T10479] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 858.317776][T10479] RSP: 002b:00007f84cd585ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 14:13:00 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 858.326350][T10479] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 858.334327][T10479] RDX: 0000000000000002 RSI: 00007f84cd586000 RDI: 00000000ffffff9c [ 858.342760][T10479] RBP: 00007f84cd586000 R08: 0000000000000000 R09: ffffffffffffffff [ 858.351598][T10479] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 858.359735][T10479] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 858.397060][T10474] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 858.410942][T10460] loop4: detected capacity change from 0 to 6 [ 858.414572][T10489] FAULT_INJECTION: forcing a failure. [ 858.414572][T10489] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 858.430611][T10489] CPU: 1 PID: 10489 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 14:13:00 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 858.440776][T10489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.451190][T10489] Call Trace: [ 858.454557][T10489] dump_stack+0x137/0x19d [ 858.459059][T10489] should_fail+0x23c/0x250 [ 858.463514][T10489] should_fail_usercopy+0x16/0x20 [ 858.466918][T10488] loop0: detected capacity change from 0 to 24576 [ 858.468813][T10489] strncpy_from_user+0x21/0x250 [ 858.479087][T10488] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 858.480207][T10489] getname_flags+0xb8/0x3d0 [ 858.490541][T10488] EXT4-fs (loop0): group descriptors corrupted! [ 858.495551][T10489] ? vfs_write+0x50c/0x770 [ 858.504552][T10490] loop1: detected capacity change from 0 to 24576 [ 858.507121][T10489] getname+0x15/0x20 [ 858.507149][T10489] do_sys_openat2+0x5b/0x250 [ 858.517026][T10490] EXT4-fs (loop1): bad geometry: first data block 132096 is beyond end of filesystem (512) [ 858.517528][T10489] __x64_sys_openat+0xef/0x110 [ 858.536996][T10489] do_syscall_64+0x34/0x50 [ 858.541411][T10489] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 858.548216][T10489] RIP: 0033:0x419544 [ 858.553062][T10489] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 858.577657][T10489] RSP: 002b:00007f84cd585ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 858.586631][T10489] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 14:13:00 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:00 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x39f, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:00 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xfdfdffff, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 858.594923][T10489] RDX: 0000000000000002 RSI: 00007f84cd586000 RDI: 00000000ffffff9c [ 858.603002][T10489] RBP: 00007f84cd586000 R08: 0000000000000000 R09: ffffffffffffffff [ 858.611590][T10489] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 858.620576][T10489] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 14:13:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000003000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 858.686606][T10505] FAULT_INJECTION: forcing a failure. [ 858.686606][T10505] name failslab, interval 1, probability 0, space 0, times 0 [ 858.695884][T10504] loop3: detected capacity change from 0 to 6 [ 858.700804][T10505] CPU: 0 PID: 10505 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 858.717289][T10505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.727765][T10505] Call Trace: [ 858.731081][T10505] dump_stack+0x137/0x19d 14:13:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000ffffffff60000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 858.735519][T10505] should_fail+0x23c/0x250 [ 858.739968][T10505] ? __alloc_file+0x2e/0x1a0 [ 858.744689][T10505] __should_failslab+0x81/0x90 [ 858.749474][T10505] should_failslab+0x5/0x20 [ 858.753995][T10505] kmem_cache_alloc+0x46/0x300 [ 858.758851][T10505] __alloc_file+0x2e/0x1a0 [ 858.760416][T10515] loop2: detected capacity change from 0 to 6 [ 858.763291][T10505] alloc_empty_file+0xcd/0x1c0 [ 858.763319][T10505] path_openat+0x6a/0x20b0 [ 858.763343][T10505] ? write_one_page+0x210/0x210 [ 858.773569][T10512] loop4: detected capacity change from 0 to 6 [ 858.775764][T10505] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 858.796299][T10521] loop0: detected capacity change from 0 to 24576 [ 858.797702][T10505] ? generic_perform_write+0x332/0x3a0 [ 858.809612][T10505] do_filp_open+0xd9/0x1f0 [ 858.811973][T10515] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 858.814043][T10505] ? __virt_addr_valid+0x15a/0x1a0 [ 858.814067][T10505] ? __check_object_size+0x253/0x310 [ 858.824584][T10521] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 858.827698][T10505] ? alloc_fd+0x36d/0x3c0 [ 858.827723][T10505] do_sys_openat2+0xa3/0x250 [ 858.827744][T10505] __x64_sys_openat+0xef/0x110 [ 858.833037][T10521] EXT4-fs (loop0): group descriptors corrupted! [ 858.863163][T10505] do_syscall_64+0x34/0x50 [ 858.867585][T10505] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 858.873532][T10505] RIP: 0033:0x419544 [ 858.877464][T10505] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 858.898045][T10505] RSP: 002b:00007f84cd585ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 858.906546][T10505] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 858.914513][T10505] RDX: 0000000000000002 RSI: 00007f84cd586000 RDI: 00000000ffffff9c [ 858.922667][T10505] RBP: 00007f84cd586000 R08: 0000000000000000 R09: ffffffffffffffff 14:13:00 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 858.930904][T10505] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 858.938953][T10505] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 858.974708][T10512] loop4: detected capacity change from 0 to 6 [ 858.982107][T10525] loop1: detected capacity change from 0 to 24576 14:13:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000ffffffdf90000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 859.008663][T10504] loop3: detected capacity change from 0 to 6 [ 859.028393][T10525] EXT4-fs (loop1): bad geometry: first data block 196608 is beyond end of filesystem (512) [ 859.033404][T10541] FAULT_INJECTION: forcing a failure. 14:13:00 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xfeffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 859.033404][T10541] name failslab, interval 1, probability 0, space 0, times 0 [ 859.038562][T10515] loop2: detected capacity change from 0 to 6 [ 859.063568][T10541] CPU: 0 PID: 10541 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 859.080883][T10541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.091363][T10541] Call Trace: [ 859.094658][T10541] dump_stack+0x137/0x19d [ 859.099091][T10541] should_fail+0x23c/0x250 [ 859.103551][T10541] ? security_file_alloc+0x30/0x190 [ 859.109837][T10541] __should_failslab+0x81/0x90 [ 859.114696][T10541] should_failslab+0x5/0x20 [ 859.119258][T10541] kmem_cache_alloc+0x46/0x300 [ 859.124517][T10541] ? __alloc_file+0x2e/0x1a0 [ 859.346676][T10541] security_file_alloc+0x30/0x190 [ 859.351979][T10541] __alloc_file+0x83/0x1a0 [ 859.356735][T10541] alloc_empty_file+0xcd/0x1c0 [ 859.361670][T10541] path_openat+0x6a/0x20b0 [ 859.366495][T10541] ? write_one_page+0x210/0x210 [ 859.371491][T10541] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 859.380013][T10541] ? generic_perform_write+0x332/0x3a0 [ 859.385604][T10541] do_filp_open+0xd9/0x1f0 [ 859.390398][T10541] ? __virt_addr_valid+0x15a/0x1a0 [ 859.395699][T10541] ? __check_object_size+0x253/0x310 [ 859.400983][T10541] ? alloc_fd+0x36d/0x3c0 [ 859.405311][T10541] do_sys_openat2+0xa3/0x250 [ 859.410001][T10541] __x64_sys_openat+0xef/0x110 [ 859.415413][T10541] do_syscall_64+0x34/0x50 [ 859.419846][T10541] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 859.425861][T10541] RIP: 0033:0x419544 [ 859.429921][T10541] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 859.449625][T10541] RSP: 002b:00007f84cd585ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 859.458620][T10541] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 859.466588][T10541] RDX: 0000000000000002 RSI: 00007f84cd586000 RDI: 00000000ffffff9c [ 859.474641][T10541] RBP: 00007f84cd586000 R08: 0000000000000000 R09: ffffffffffffffff [ 859.482657][T10541] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 14:13:01 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 859.490655][T10541] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 14:13:01 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x22, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:13:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000004000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:01 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x3a0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 859.576532][T10515] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 859.612333][T10553] loop4: detected capacity change from 0 to 6 [ 859.618193][T10551] loop0: detected capacity change from 0 to 24576 [ 859.648886][T10559] FAULT_INJECTION: forcing a failure. [ 859.648886][T10559] name failslab, interval 1, probability 0, space 0, times 0 [ 859.662280][T10559] CPU: 0 PID: 10559 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 859.663120][T10551] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 859.674703][T10559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.687256][T10551] EXT4-fs (loop0): group descriptors corrupted! [ 859.697921][T10559] Call Trace: [ 859.697935][T10559] dump_stack+0x137/0x19d [ 859.697957][T10559] should_fail+0x23c/0x250 [ 859.697972][T10559] ? loop_set_status_from_info+0x3a0/0x3a0 [ 859.714582][T10563] loop1: detected capacity change from 0 to 24576 [ 859.717584][T10559] __should_failslab+0x81/0x90 [ 859.717614][T10559] ? __kthread_create_on_node+0x7a/0x290 [ 859.717633][T10559] should_failslab+0x5/0x20 [ 859.725683][T10553] loop4: detected capacity change from 0 to 6 [ 859.730284][T10559] kmem_cache_alloc_trace+0x49/0x320 [ 859.756777][T10559] ? wake_up_q+0x46/0x80 [ 859.761006][T10559] ? loop_set_status_from_info+0x3a0/0x3a0 [ 859.767091][T10559] __kthread_create_on_node+0x7a/0x290 [ 859.772781][T10559] ? loop_set_status_from_info+0x3a0/0x3a0 [ 859.779164][T10559] kthread_create_on_node+0x72/0xa0 [ 859.784364][T10559] loop_configure+0x597/0xcb0 [ 859.789344][T10559] ? mntput+0x45/0x70 [ 859.793635][T10559] lo_ioctl+0x555/0x11f0 [ 859.797992][T10559] ? path_openat+0x19ab/0x20b0 [ 859.804649][T10559] ? putname+0xa5/0xc0 [ 859.809283][T10559] ? ___cache_free+0x3c/0x300 [ 859.813992][T10559] ? blkdev_common_ioctl+0x9c3/0x1010 [ 859.819369][T10559] ? selinux_file_ioctl+0x8e0/0x970 [ 859.824569][T10559] ? lo_release+0x120/0x120 [ 859.829306][T10559] blkdev_ioctl+0x1d0/0x3c0 [ 859.833968][T10559] block_ioctl+0x6d/0x80 [ 859.838345][T10559] ? blkdev_iopoll+0x70/0x70 [ 859.843018][T10559] __se_sys_ioctl+0xcb/0x140 [ 859.847795][T10559] __x64_sys_ioctl+0x3f/0x50 [ 859.852527][T10559] do_syscall_64+0x34/0x50 [ 859.857212][T10559] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 859.863256][T10559] RIP: 0033:0x466217 [ 859.867169][T10559] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 859.894939][T10559] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 859.904478][T10559] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 859.912438][T10559] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 859.921422][T10559] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 859.930559][T10559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 859.942191][T10559] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 14:13:01 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xff0f0000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:13:01 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 859.978130][T10563] EXT4-fs (loop1): bad geometry: first data block 262144 is beyond end of filesystem (512) 14:13:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000ffffffdfd0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 860.023051][T10573] loop2: detected capacity change from 0 to 6 [ 860.034594][T10573] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 860.055910][T10583] loop4: detected capacity change from 0 to 6 [ 860.064850][T10584] loop3: detected capacity change from 0 to 6 14:13:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000005000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 860.088291][T10573] loop2: detected capacity change from 0 to 6 [ 860.101058][T10586] FAULT_INJECTION: forcing a failure. [ 860.101058][T10586] name failslab, interval 1, probability 0, space 0, times 0 [ 860.113730][T10586] CPU: 0 PID: 10586 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 860.123986][T10586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.134163][T10586] Call Trace: [ 860.137452][T10586] dump_stack+0x137/0x19d [ 860.141994][T10586] should_fail+0x23c/0x250 [ 860.146444][T10586] ? __kernfs_new_node+0x6a/0x330 [ 860.152442][T10586] __should_failslab+0x81/0x90 [ 860.157788][T10586] should_failslab+0x5/0x20 [ 860.162600][T10586] kmem_cache_alloc+0x46/0x300 [ 860.167387][T10586] __kernfs_new_node+0x6a/0x330 [ 860.172493][T10586] ? select_task_rq_fair+0x179/0xbd0 [ 860.177971][T10586] ? rb_insert_color+0x2cb/0x310 [ 860.183800][T10586] kernfs_create_dir_ns+0x5e/0x140 [ 860.189035][T10586] internal_create_group+0x138/0x850 [ 860.194357][T10586] ? check_preempt_wakeup+0x22f/0x350 [ 860.199747][T10586] sysfs_create_group+0x1b/0x20 [ 860.204609][T10586] loop_configure+0xa21/0xcb0 [ 860.209376][T10586] lo_ioctl+0x555/0x11f0 [ 860.213660][T10586] ? path_openat+0x19ab/0x20b0 [ 860.218434][T10586] ? putname+0xa5/0xc0 [ 860.222508][T10586] ? ___cache_free+0x3c/0x300 [ 860.227185][T10586] ? blkdev_common_ioctl+0x9c3/0x1010 [ 860.232596][T10586] ? selinux_file_ioctl+0x8e0/0x970 [ 860.237912][T10586] ? lo_release+0x120/0x120 [ 860.242517][T10586] blkdev_ioctl+0x1d0/0x3c0 [ 860.247040][T10586] block_ioctl+0x6d/0x80 [ 860.251297][T10586] ? blkdev_iopoll+0x70/0x70 [ 860.256589][T10586] __se_sys_ioctl+0xcb/0x140 [ 860.261319][T10586] __x64_sys_ioctl+0x3f/0x50 [ 860.266076][T10586] do_syscall_64+0x34/0x50 [ 860.270735][T10586] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 860.276759][T10586] RIP: 0033:0x466217 [ 860.280773][T10586] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 860.301124][T10586] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 860.309729][T10586] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 860.318321][T10586] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 860.326387][T10586] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 860.334497][T10586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 860.343148][T10586] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 860.351326][T10586] loop5: detected capacity change from 0 to 24576 [ 860.367060][T10573] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:13:02 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xfffdffff, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 860.383987][T10605] loop1: detected capacity change from 0 to 24576 [ 860.390774][T10599] loop0: detected capacity change from 0 to 24576 [ 860.397803][T10586] EXT4-fs (loop5): failed to initialize system zone (-117) [ 860.405542][T10586] EXT4-fs (loop5): mount failed [ 860.428257][T10605] EXT4-fs (loop1): bad geometry: first data block 327680 is beyond end of filesystem (512) 14:13:02 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x3a1, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:02 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x10e, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 860.431452][T10599] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 860.448849][T10599] EXT4-fs (loop0): group descriptors corrupted! [ 860.468316][T10584] loop3: detected capacity change from 0 to 6 14:13:02 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000ffffffffd0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 860.504628][T10617] loop4: detected capacity change from 0 to 6 [ 860.569376][T10617] loop4: detected capacity change from 0 to 6 [ 860.575719][T10626] FAULT_INJECTION: forcing a failure. [ 860.575719][T10626] name failslab, interval 1, probability 0, space 0, times 0 [ 860.588515][T10626] CPU: 0 PID: 10626 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 860.598706][T10626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.608767][T10626] Call Trace: [ 860.612248][T10626] dump_stack+0x137/0x19d [ 860.617441][T10626] should_fail+0x23c/0x250 [ 860.621929][T10626] ? __kernfs_new_node+0x6a/0x330 [ 860.626959][T10626] __should_failslab+0x81/0x90 [ 860.631769][T10626] should_failslab+0x5/0x20 [ 860.636305][T10626] kmem_cache_alloc+0x46/0x300 [ 860.641088][T10626] ? __cond_resched+0x11/0x40 [ 860.645773][T10626] __kernfs_new_node+0x6a/0x330 [ 860.650695][T10626] ? idr_alloc_cyclic+0x249/0x2d0 [ 860.656260][T10626] ? rb_insert_color+0x7e/0x310 [ 860.661129][T10626] kernfs_new_node+0x5b/0xd0 [ 860.665737][T10626] __kernfs_create_file+0x45/0x1a0 [ 860.670960][T10626] sysfs_add_file_mode_ns+0x1c1/0x250 [ 860.676373][T10626] internal_create_group+0x2e4/0x850 [ 860.681694][T10626] sysfs_create_group+0x1b/0x20 [ 860.686580][T10626] loop_configure+0xa21/0xcb0 [ 860.691276][T10626] lo_ioctl+0x555/0x11f0 [ 860.695532][T10626] ? path_openat+0x19ab/0x20b0 [ 860.700333][T10626] ? putname+0xa5/0xc0 [ 860.704467][T10626] ? ___cache_free+0x3c/0x300 [ 860.709164][T10626] ? blkdev_common_ioctl+0x9c3/0x1010 [ 860.714928][T10626] ? selinux_file_ioctl+0x8e0/0x970 [ 860.721334][T10626] ? lo_release+0x120/0x120 [ 860.726022][T10626] blkdev_ioctl+0x1d0/0x3c0 [ 860.730573][T10626] block_ioctl+0x6d/0x80 [ 860.734834][T10626] ? blkdev_iopoll+0x70/0x70 [ 860.739474][T10626] __se_sys_ioctl+0xcb/0x140 [ 860.744096][T10626] __x64_sys_ioctl+0x3f/0x50 [ 860.749330][T10626] do_syscall_64+0x34/0x50 [ 860.753858][T10626] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 860.759883][T10626] RIP: 0033:0x466217 [ 860.763796][T10626] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 860.785175][T10626] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 860.793719][T10626] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 860.802147][T10626] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 860.810405][T10626] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 14:13:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000006000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 860.818574][T10626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 860.826928][T10626] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 860.847303][T10640] loop0: detected capacity change from 0 to 24576 [ 860.849353][T10626] loop5: detected capacity change from 0 to 24576 [ 860.855541][T10639] loop2: detected capacity change from 0 to 6 [ 860.868948][T10640] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 860.880471][T10640] EXT4-fs (loop0): group descriptors corrupted! [ 860.882731][T10639] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 860.907478][T10642] loop3: detected capacity change from 0 to 6 14:13:02 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xffff1f00, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 860.923862][T10626] EXT4-fs (loop5): failed to initialize system zone (-117) [ 860.924221][T10647] loop1: detected capacity change from 0 to 24576 [ 860.945519][T10647] EXT4-fs (loop1): bad geometry: first data block 393216 is beyond end of filesystem (512) [ 860.951669][T10626] EXT4-fs (loop5): mount failed 14:13:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000406000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:02 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x1ee, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:13:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00005ffe0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 860.969961][T10642] loop3: detected capacity change from 0 to 6 [ 860.983070][T10663] loop4: detected capacity change from 0 to 6 14:13:02 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 861.015871][T10671] loop0: detected capacity change from 0 to 24576 [ 861.051869][T10663] loop4: detected capacity change from 0 to 6 14:13:02 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xfffffdf9, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 861.068334][T10671] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 861.078981][T10671] EXT4-fs (loop0): group descriptors corrupted! [ 861.079082][T10639] loop2: detected capacity change from 0 to 6 [ 861.098172][T10683] loop1: detected capacity change from 0 to 24576 [ 861.102791][T10684] loop3: detected capacity change from 0 to 6 [ 861.107384][T10689] FAULT_INJECTION: forcing a failure. [ 861.107384][T10689] name failslab, interval 1, probability 0, space 0, times 0 [ 861.124630][T10689] CPU: 1 PID: 10689 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 861.135956][T10689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 861.146097][T10689] Call Trace: [ 861.151637][T10689] dump_stack+0x137/0x19d [ 861.156087][T10689] should_fail+0x23c/0x250 [ 861.160772][T10689] ? __kernfs_new_node+0x6a/0x330 [ 861.165964][T10689] __should_failslab+0x81/0x90 [ 861.171263][T10689] should_failslab+0x5/0x20 [ 861.175808][T10689] kmem_cache_alloc+0x46/0x300 [ 861.180574][T10689] __kernfs_new_node+0x6a/0x330 [ 861.185424][T10689] ? __cond_resched+0x11/0x40 [ 861.190437][T10689] ? mutex_lock+0x9/0x30 [ 861.194911][T10689] kernfs_new_node+0x5b/0xd0 [ 861.199872][T10689] __kernfs_create_file+0x45/0x1a0 [ 861.204991][T10689] sysfs_add_file_mode_ns+0x1c1/0x250 [ 861.210615][T10689] internal_create_group+0x2e4/0x850 [ 861.215905][T10689] sysfs_create_group+0x1b/0x20 [ 861.221126][T10689] loop_configure+0xa21/0xcb0 [ 861.226045][T10689] lo_ioctl+0x555/0x11f0 [ 861.230350][T10689] ? path_openat+0x19ab/0x20b0 [ 861.236278][T10689] ? putname+0xa5/0xc0 [ 861.240498][T10689] ? ___cache_free+0x3c/0x300 [ 861.245412][T10689] ? blkdev_common_ioctl+0x9c3/0x1010 [ 861.250912][T10689] ? selinux_file_ioctl+0x8e0/0x970 [ 861.256133][T10689] ? lo_release+0x120/0x120 [ 861.261026][T10689] blkdev_ioctl+0x1d0/0x3c0 [ 861.265908][T10689] block_ioctl+0x6d/0x80 [ 861.271028][T10689] ? blkdev_iopoll+0x70/0x70 [ 861.276094][T10689] __se_sys_ioctl+0xcb/0x140 [ 861.280704][T10689] __x64_sys_ioctl+0x3f/0x50 [ 861.285305][T10689] do_syscall_64+0x34/0x50 [ 861.290034][T10689] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 861.295959][T10689] RIP: 0033:0x466217 [ 861.299847][T10689] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 861.325326][T10689] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 861.333927][T10689] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 861.342106][T10689] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 861.350076][T10689] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 861.358150][T10689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 861.366741][T10689] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 861.378760][T10689] loop5: detected capacity change from 0 to 24576 [ 861.392686][T10683] EXT4-fs (loop1): bad geometry: first data block 394240 is beyond end of filesystem (512) [ 861.407248][T10639] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 861.418922][T10702] loop4: detected capacity change from 0 to 6 14:13:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000ffffffffe0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:03 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x3a2, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000007000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 861.435697][T10689] EXT4-fs (loop5): failed to initialize system zone (-117) [ 861.517689][T10689] EXT4-fs (loop5): mount failed [ 861.547811][T10702] loop4: detected capacity change from 0 to 6 [ 861.550524][T10684] loop3: detected capacity change from 0 to 6 14:13:03 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xfffffdfd, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 861.560276][T10711] loop0: detected capacity change from 0 to 24576 [ 861.577020][T10723] loop1: detected capacity change from 0 to 24576 [ 861.584951][T10711] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 861.595550][T10711] EXT4-fs (loop0): group descriptors corrupted! 14:13:03 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x204, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:13:03 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 861.626434][T10729] loop2: detected capacity change from 0 to 6 [ 861.646537][T10723] EXT4-fs (loop1): bad geometry: first data block 458752 is beyond end of filesystem (512) [ 861.661132][T10729] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:13:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000001ff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 861.678576][T10738] loop4: detected capacity change from 0 to 6 [ 861.688420][T10742] loop3: detected capacity change from 0 to 6 [ 861.702191][T10752] FAULT_INJECTION: forcing a failure. [ 861.702191][T10752] name failslab, interval 1, probability 0, space 0, times 0 [ 861.717218][T10752] CPU: 0 PID: 10752 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 861.727497][T10752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 861.737636][T10752] Call Trace: [ 861.741029][T10752] dump_stack+0x137/0x19d [ 861.745456][T10752] should_fail+0x23c/0x250 [ 861.749897][T10752] ? __kernfs_new_node+0x6a/0x330 [ 861.754926][T10752] __should_failslab+0x81/0x90 [ 861.759788][T10752] should_failslab+0x5/0x20 [ 861.764291][T10752] kmem_cache_alloc+0x46/0x300 [ 861.769090][T10752] __kernfs_new_node+0x6a/0x330 [ 861.774591][T10752] ? __cond_resched+0x11/0x40 [ 861.779552][T10752] ? mutex_lock+0x9/0x30 [ 861.783786][T10752] kernfs_new_node+0x5b/0xd0 [ 861.788463][T10752] __kernfs_create_file+0x45/0x1a0 [ 861.793857][T10752] sysfs_add_file_mode_ns+0x1c1/0x250 [ 861.799335][T10752] internal_create_group+0x2e4/0x850 [ 861.804801][T10752] sysfs_create_group+0x1b/0x20 [ 861.810218][T10752] loop_configure+0xa21/0xcb0 [ 861.815655][T10752] lo_ioctl+0x555/0x11f0 [ 861.819950][T10752] ? path_openat+0x19ab/0x20b0 [ 861.824839][T10752] ? putname+0xa5/0xc0 [ 861.829176][T10752] ? ___cache_free+0x3c/0x300 [ 861.834187][T10752] ? blkdev_common_ioctl+0x9c3/0x1010 [ 861.839964][T10752] ? selinux_file_ioctl+0x8e0/0x970 [ 861.845537][T10752] ? lo_release+0x120/0x120 [ 861.850179][T10752] blkdev_ioctl+0x1d0/0x3c0 [ 861.854709][T10752] block_ioctl+0x6d/0x80 [ 861.859058][T10752] ? blkdev_iopoll+0x70/0x70 [ 861.863779][T10752] __se_sys_ioctl+0xcb/0x140 [ 861.868537][T10752] __x64_sys_ioctl+0x3f/0x50 [ 861.873232][T10752] do_syscall_64+0x34/0x50 [ 861.877789][T10752] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 861.883846][T10752] RIP: 0033:0x466217 [ 861.887735][T10752] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 861.907527][T10752] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 861.916083][T10752] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 14:13:03 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xfffffdff, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 861.924941][T10752] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 861.933749][T10752] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 861.941840][T10752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 861.952685][T10752] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 14:13:03 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x211, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 861.975242][T10752] loop5: detected capacity change from 0 to 24576 [ 861.994469][T10742] loop3: detected capacity change from 0 to 6 [ 862.011835][T10729] loop2: detected capacity change from 0 to 6 14:13:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000107000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:03 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x3a3, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 862.033568][T10752] EXT4-fs (loop5): failed to initialize system zone (-117) [ 862.043801][T10729] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 862.050175][T10752] EXT4-fs (loop5): mount failed [ 862.067155][T10769] loop4: detected capacity change from 0 to 6 [ 862.072533][T10771] loop0: detected capacity change from 0 to 24576 [ 862.123721][T10771] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 862.134354][T10771] EXT4-fs (loop0): group descriptors corrupted! [ 862.137909][T10777] loop1: detected capacity change from 0 to 24576 [ 862.141981][T10769] loop4: detected capacity change from 0 to 6 [ 862.150380][T10776] loop3: detected capacity change from 0 to 6 14:13:03 executing program 5 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 862.164206][T10777] EXT4-fs (loop1): bad geometry: first data block 459008 is beyond end of filesystem (512) 14:13:03 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xffffff7f, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:13:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000fff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 862.225444][T10797] loop2: detected capacity change from 0 to 6 [ 862.232116][T10804] FAULT_INJECTION: forcing a failure. [ 862.232116][T10804] name failslab, interval 1, probability 0, space 0, times 0 [ 862.245464][T10804] CPU: 1 PID: 10804 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 862.264357][T10804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.275600][T10804] Call Trace: [ 862.276679][T10810] loop4: detected capacity change from 0 to 6 [ 862.278895][T10804] dump_stack+0x137/0x19d [ 862.291039][T10804] should_fail+0x23c/0x250 [ 862.295458][T10804] ? __kernfs_new_node+0x6a/0x330 [ 862.296695][T10813] loop0: detected capacity change from 0 to 24576 [ 862.300510][T10804] __should_failslab+0x81/0x90 [ 862.300539][T10804] should_failslab+0x5/0x20 14:13:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000008000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:04 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 862.309519][T10813] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 862.311950][T10804] kmem_cache_alloc+0x46/0x300 [ 862.311979][T10804] __kernfs_new_node+0x6a/0x330 [ 862.312000][T10804] ? __cond_resched+0x11/0x40 [ 862.316672][T10813] EXT4-fs (loop0): group descriptors corrupted! [ 862.327357][T10804] ? mutex_lock+0x9/0x30 [ 862.327388][T10804] kernfs_new_node+0x5b/0xd0 [ 862.327407][T10804] __kernfs_create_file+0x45/0x1a0 [ 862.363559][T10804] sysfs_add_file_mode_ns+0x1c1/0x250 [ 862.369064][T10804] internal_create_group+0x2e4/0x850 [ 862.374482][T10804] sysfs_create_group+0x1b/0x20 [ 862.379572][T10804] loop_configure+0xa21/0xcb0 [ 862.384854][T10804] lo_ioctl+0x555/0x11f0 [ 862.389167][T10804] ? path_openat+0x19ab/0x20b0 [ 862.394217][T10804] ? putname+0xa5/0xc0 [ 862.398324][T10804] ? ___cache_free+0x3c/0x300 [ 862.403015][T10804] ? blkdev_common_ioctl+0x9c3/0x1010 [ 862.408391][T10804] ? selinux_file_ioctl+0x8e0/0x970 [ 862.413594][T10804] ? lo_release+0x120/0x120 [ 862.418208][T10804] blkdev_ioctl+0x1d0/0x3c0 [ 862.422731][T10804] block_ioctl+0x6d/0x80 [ 862.426976][T10804] ? blkdev_iopoll+0x70/0x70 [ 862.431711][T10804] __se_sys_ioctl+0xcb/0x140 [ 862.436367][T10804] __x64_sys_ioctl+0x3f/0x50 [ 862.441038][T10804] do_syscall_64+0x34/0x50 [ 862.445467][T10804] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 862.451446][T10804] RIP: 0033:0x466217 [ 862.455434][T10804] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 862.476942][T10804] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 862.485367][T10804] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 862.493436][T10804] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 862.501970][T10804] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 862.509944][T10804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 862.518093][T10804] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 862.531152][T10797] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 862.544568][T10804] loop5: detected capacity change from 0 to 24576 14:13:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000ffffffbff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 862.588128][T10821] loop3: detected capacity change from 0 to 6 [ 862.600331][T10810] loop4: detected capacity change from 0 to 6 [ 862.600331][T10820] loop1: detected capacity change from 0 to 24576 [ 862.621128][T10820] EXT4-fs (loop1): bad geometry: first data block 524288 is beyond end of filesystem (512) [ 862.631839][T10804] EXT4-fs (loop5): failed to initialize system zone (-117) [ 862.642974][T10804] EXT4-fs (loop5): mount failed [ 862.679548][T10821] loop3: detected capacity change from 0 to 6 14:13:04 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xffffff8c, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:13:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000009000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:04 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 862.685933][T10797] loop2: detected capacity change from 0 to 6 [ 862.687586][T10843] loop0: detected capacity change from 0 to 24576 [ 862.720461][T10850] loop4: detected capacity change from 0 to 6 14:13:04 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x384, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 862.734792][T10797] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 862.749406][T10843] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 862.761261][T10843] EXT4-fs (loop0): group descriptors corrupted! 14:13:04 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x3a4, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 862.798405][T10860] loop1: detected capacity change from 0 to 24576 [ 862.817678][T10862] FAULT_INJECTION: forcing a failure. [ 862.817678][T10862] name failslab, interval 1, probability 0, space 0, times 0 [ 862.831526][T10850] loop4: detected capacity change from 0 to 6 [ 862.831869][T10862] CPU: 1 PID: 10862 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 14:13:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f017cffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 862.848335][T10862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.858498][T10862] Call Trace: [ 862.861878][T10862] dump_stack+0x137/0x19d [ 862.866215][T10862] should_fail+0x23c/0x250 [ 862.869057][T10860] EXT4-fs (loop1): bad geometry: first data block 589824 is beyond end of filesystem (512) [ 862.870652][T10862] ? __kernfs_new_node+0x6a/0x330 [ 862.870677][T10862] __should_failslab+0x81/0x90 [ 862.891077][T10862] should_failslab+0x5/0x20 14:13:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000000000a000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 862.893940][T10873] loop3: detected capacity change from 0 to 6 [ 862.895592][T10862] kmem_cache_alloc+0x46/0x300 [ 862.895618][T10862] __kernfs_new_node+0x6a/0x330 [ 862.911263][T10862] ? __cond_resched+0x11/0x40 [ 862.915972][T10862] ? mutex_lock+0x9/0x30 [ 862.920456][T10862] kernfs_new_node+0x5b/0xd0 [ 862.925338][T10862] __kernfs_create_file+0x45/0x1a0 [ 862.930522][T10862] sysfs_add_file_mode_ns+0x1c1/0x250 [ 862.935901][T10862] internal_create_group+0x2e4/0x850 [ 862.941235][T10862] sysfs_create_group+0x1b/0x20 [ 862.946185][T10862] loop_configure+0xa21/0xcb0 [ 862.951342][T10862] lo_ioctl+0x555/0x11f0 [ 862.956213][T10862] ? path_openat+0x19ab/0x20b0 [ 862.961018][T10862] ? putname+0xa5/0xc0 [ 862.965123][T10862] ? ___cache_free+0x3c/0x300 [ 862.970100][T10862] ? blkdev_common_ioctl+0x9c3/0x1010 [ 862.975662][T10862] ? selinux_file_ioctl+0x8e0/0x970 [ 862.980864][T10862] ? lo_release+0x120/0x120 [ 862.985389][T10862] blkdev_ioctl+0x1d0/0x3c0 [ 862.989882][T10862] block_ioctl+0x6d/0x80 [ 862.994397][T10862] ? blkdev_iopoll+0x70/0x70 [ 862.999342][T10862] __se_sys_ioctl+0xcb/0x140 [ 863.004156][T10862] __x64_sys_ioctl+0x3f/0x50 [ 863.009113][T10862] do_syscall_64+0x34/0x50 [ 863.013565][T10862] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 863.019671][T10862] RIP: 0033:0x466217 [ 863.023554][T10862] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 863.043882][T10862] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 863.053417][T10862] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 863.061404][T10862] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 863.069371][T10862] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 863.077472][T10862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 863.085451][T10862] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 863.098080][T10862] loop5: detected capacity change from 0 to 24576 14:13:04 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xffffffe5, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 863.121050][T10880] loop2: detected capacity change from 0 to 6 [ 863.134012][T10880] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 863.144332][T10887] loop0: detected capacity change from 0 to 24576 [ 863.145998][T10862] EXT4-fs (loop5): failed to initialize system zone (-117) [ 863.160960][T10862] EXT4-fs (loop5): mount failed 14:13:04 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 863.181782][T10873] loop3: detected capacity change from 0 to 6 [ 863.183498][T10895] loop1: detected capacity change from 0 to 24576 [ 863.196839][T10887] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 863.206994][T10887] EXT4-fs (loop0): group descriptors corrupted! 14:13:04 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x402, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 863.248652][T10895] EXT4-fs (loop1): bad geometry: first data block 655360 is beyond end of filesystem (512) [ 863.252589][T10880] loop2: detected capacity change from 0 to 6 [ 863.280985][T10903] loop4: detected capacity change from 0 to 6 14:13:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f027cffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:05 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xfffffff0, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 863.302754][T10880] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 863.339984][T10917] FAULT_INJECTION: forcing a failure. [ 863.339984][T10917] name failslab, interval 1, probability 0, space 0, times 0 14:13:05 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x3a5, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000000000b000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 863.352669][T10917] CPU: 1 PID: 10917 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 863.362926][T10917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.373067][T10917] Call Trace: [ 863.376350][T10917] dump_stack+0x137/0x19d [ 863.382423][T10917] should_fail+0x23c/0x250 [ 863.386954][T10917] ? __kernfs_new_node+0x6a/0x330 [ 863.388859][T10924] loop0: detected capacity change from 0 to 24576 [ 863.392885][T10917] __should_failslab+0x81/0x90 [ 863.392918][T10917] should_failslab+0x5/0x20 [ 863.408899][T10917] kmem_cache_alloc+0x46/0x300 [ 863.413839][T10917] __kernfs_new_node+0x6a/0x330 [ 863.418853][T10917] ? __cond_resched+0x11/0x40 [ 863.423935][T10917] ? mutex_lock+0x9/0x30 [ 863.428296][T10917] kernfs_new_node+0x5b/0xd0 [ 863.432905][T10917] __kernfs_create_file+0x45/0x1a0 [ 863.438046][T10917] sysfs_add_file_mode_ns+0x1c1/0x250 [ 863.443462][T10917] internal_create_group+0x2e4/0x850 [ 863.448961][T10917] sysfs_create_group+0x1b/0x20 [ 863.454024][T10917] loop_configure+0xa21/0xcb0 [ 863.458972][T10917] lo_ioctl+0x555/0x11f0 [ 863.463362][T10917] ? path_openat+0x19ab/0x20b0 [ 863.468236][T10917] ? putname+0xa5/0xc0 [ 863.472343][T10917] ? ___cache_free+0x3c/0x300 [ 863.477181][T10917] ? blkdev_common_ioctl+0x9c3/0x1010 [ 863.482568][T10917] ? selinux_file_ioctl+0x8e0/0x970 [ 863.487783][T10917] ? lo_release+0x120/0x120 [ 863.492333][T10917] blkdev_ioctl+0x1d0/0x3c0 [ 863.498154][T10917] block_ioctl+0x6d/0x80 [ 863.502509][T10917] ? blkdev_iopoll+0x70/0x70 [ 863.507112][T10917] __se_sys_ioctl+0xcb/0x140 [ 863.511935][T10917] __x64_sys_ioctl+0x3f/0x50 [ 863.517081][T10917] do_syscall_64+0x34/0x50 [ 863.521588][T10917] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 863.527514][T10917] RIP: 0033:0x466217 [ 863.531417][T10917] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 863.551036][T10917] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 863.559462][T10917] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 863.568404][T10917] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 863.576601][T10917] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 863.584580][T10917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 863.592841][T10917] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 863.601475][T10924] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 863.612142][T10924] EXT4-fs (loop0): group descriptors corrupted! [ 863.618090][T10917] loop5: detected capacity change from 0 to 24576 [ 863.620141][T10926] loop3: detected capacity change from 0 to 6 [ 863.633807][T10933] loop1: detected capacity change from 0 to 24576 [ 863.644929][T10917] EXT4-fs (loop5): failed to initialize system zone (-117) 14:13:05 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x406, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:13:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000ffffbffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 863.652342][T10917] EXT4-fs (loop5): mount failed [ 863.669756][T10925] loop4: detected capacity change from 0 to 6 [ 863.684886][T10933] EXT4-fs (loop1): bad geometry: first data block 720896 is beyond end of filesystem (512) 14:13:05 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 863.722494][T10948] loop2: detected capacity change from 0 to 6 [ 863.736101][T10925] loop4: detected capacity change from 0 to 6 [ 863.754861][T10948] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:13:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000000000c000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:05 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xfffffff6, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 863.779770][T10952] loop3: detected capacity change from 0 to 6 [ 863.818994][T10965] loop0: detected capacity change from 0 to 24576 14:13:05 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 863.838356][T10948] loop2: detected capacity change from 0 to 6 [ 863.849626][T10965] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 863.860098][T10965] EXT4-fs (loop0): group descriptors corrupted! [ 863.867200][T10948] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 863.881394][T10978] loop5: detected capacity change from 0 to 24576 [ 863.890169][T10981] loop1: detected capacity change from 0 to 24576 [ 863.897284][T10980] loop4: detected capacity change from 0 to 6 [ 863.899189][T10978] FAULT_INJECTION: forcing a failure. [ 863.899189][T10978] name failslab, interval 1, probability 0, space 0, times 0 [ 863.918655][T10978] CPU: 1 PID: 10978 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 863.928825][T10978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.938977][T10978] Call Trace: [ 863.942280][T10978] dump_stack+0x137/0x19d [ 863.946609][T10978] should_fail+0x23c/0x250 [ 863.951011][T10978] __should_failslab+0x81/0x90 [ 863.955868][T10978] ? kobject_uevent_env+0x1a7/0xc40 [ 863.961134][T10978] should_failslab+0x5/0x20 [ 863.965620][T10978] kmem_cache_alloc_trace+0x49/0x320 [ 863.970988][T10978] ? vprintk_func+0x137/0x140 [ 863.976148][T10978] ? dev_uevent_filter+0x70/0x70 [ 863.981086][T10978] kobject_uevent_env+0x1a7/0xc40 [ 863.986095][T10978] kobject_uevent+0x18/0x20 [ 863.990581][T10978] loop_configure+0xb3c/0xcb0 [ 863.995256][T10978] lo_ioctl+0x555/0x11f0 [ 863.999506][T10978] ? path_openat+0x19ab/0x20b0 [ 864.004379][T10978] ? putname+0xa5/0xc0 [ 864.010892][T10978] ? ___cache_free+0x3c/0x300 [ 864.015661][T10978] ? blkdev_common_ioctl+0x9c3/0x1010 [ 864.021033][T10978] ? selinux_file_ioctl+0x8e0/0x970 [ 864.026281][T10978] ? lo_release+0x120/0x120 [ 864.030897][T10978] blkdev_ioctl+0x1d0/0x3c0 [ 864.035411][T10978] block_ioctl+0x6d/0x80 [ 864.039993][T10978] ? blkdev_iopoll+0x70/0x70 [ 864.044570][T10978] __se_sys_ioctl+0xcb/0x140 [ 864.049173][T10978] __x64_sys_ioctl+0x3f/0x50 [ 864.053766][T10978] do_syscall_64+0x34/0x50 [ 864.058174][T10978] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 864.064126][T10978] RIP: 0033:0x466217 [ 864.068089][T10978] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 864.087716][T10978] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 864.096557][T10978] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 864.104525][T10978] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 864.112608][T10978] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 864.120605][T10978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 864.128575][T10978] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 864.146700][T10981] EXT4-fs (loop1): bad geometry: first data block 786432 is beyond end of filesystem (512) [ 864.163367][T10978] EXT4-fs (loop5): failed to initialize system zone (-117) [ 864.171326][T10978] EXT4-fs (loop5): mount failed 14:13:05 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x402, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000000000d000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000ff9fdffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:05 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 864.191076][T10994] loop3: detected capacity change from 0 to 6 [ 864.197492][T10980] loop4: detected capacity change from 0 to 6 14:13:05 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xfffffffe, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 864.271086][T11010] loop2: detected capacity change from 0 to 6 [ 864.275957][T11009] loop1: detected capacity change from 0 to 24576 [ 864.297805][T10994] loop3: detected capacity change from 0 to 6 [ 864.304153][T11017] loop5: detected capacity change from 0 to 24576 [ 864.310804][T11010] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 864.312942][T11017] FAULT_INJECTION: forcing a failure. [ 864.312942][T11017] name failslab, interval 1, probability 0, space 0, times 0 [ 864.322837][T11011] loop0: detected capacity change from 0 to 24576 [ 864.332576][T11017] CPU: 1 PID: 11017 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 864.349159][T11017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 864.359491][T11017] Call Trace: [ 864.362863][T11017] dump_stack+0x137/0x19d [ 864.367280][T11017] should_fail+0x23c/0x250 [ 864.371711][T11017] __should_failslab+0x81/0x90 [ 864.376486][T11017] ? kzalloc+0x1d/0x30 [ 864.380577][T11017] should_failslab+0x5/0x20 [ 864.385145][T11017] __kmalloc+0x66/0x360 [ 864.389431][T11017] kzalloc+0x1d/0x30 [ 864.394097][T11017] kobject_get_path+0x7c/0x110 [ 864.399014][T11017] kobject_uevent_env+0x1be/0xc40 [ 864.404187][T11017] kobject_uevent+0x18/0x20 [ 864.409242][T11017] loop_configure+0xb3c/0xcb0 [ 864.414056][T11017] lo_ioctl+0x555/0x11f0 [ 864.418441][T11017] ? path_openat+0x19ab/0x20b0 [ 864.424162][T11017] ? putname+0xa5/0xc0 [ 864.429780][T11017] ? ___cache_free+0x3c/0x300 [ 864.435578][T11017] ? blkdev_common_ioctl+0x9c3/0x1010 [ 864.441305][T11017] ? selinux_file_ioctl+0x8e0/0x970 [ 864.446601][T11017] ? lo_release+0x120/0x120 [ 864.451118][T11017] blkdev_ioctl+0x1d0/0x3c0 [ 864.456061][T11017] block_ioctl+0x6d/0x80 [ 864.460334][T11017] ? blkdev_iopoll+0x70/0x70 [ 864.465016][T11017] __se_sys_ioctl+0xcb/0x140 [ 864.469633][T11017] __x64_sys_ioctl+0x3f/0x50 [ 864.474491][T11017] do_syscall_64+0x34/0x50 [ 864.479185][T11017] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 864.485189][T11017] RIP: 0033:0x466217 [ 864.489256][T11017] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 864.522239][T11017] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 864.530688][T11017] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 864.539193][T11017] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 864.548127][T11017] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 864.556105][T11017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 864.564536][T11017] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 864.573998][T11009] EXT4-fs (loop1): bad geometry: first data block 851968 is beyond end of filesystem (512) [ 864.586807][T11024] loop4: detected capacity change from 0 to 6 [ 864.598478][T11011] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 864.609565][T11011] EXT4-fs (loop0): group descriptors corrupted! [ 864.617703][T11010] loop2: detected capacity change from 0 to 6 14:13:06 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x406, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:06 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:13:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000000000e000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 864.627265][T11017] EXT4-fs (loop5): failed to initialize system zone (-117) [ 864.627365][T11010] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 864.645923][T11017] EXT4-fs (loop5): mount failed 14:13:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000ffdfdffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:06 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 864.684752][T11024] loop4: detected capacity change from 0 to 6 14:13:06 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x8000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 864.734027][T11036] loop2: detected capacity change from 0 to 6 [ 864.771854][T11052] loop5: detected capacity change from 0 to 24576 [ 864.778620][T11045] loop1: detected capacity change from 0 to 24576 [ 864.786616][T11052] FAULT_INJECTION: forcing a failure. [ 864.786616][T11052] name failslab, interval 1, probability 0, space 0, times 0 [ 864.799523][T11052] CPU: 0 PID: 11052 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 864.809901][T11052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 864.821129][T11052] Call Trace: [ 864.824610][T11052] dump_stack+0x137/0x19d [ 864.829074][T11052] should_fail+0x23c/0x250 [ 864.833492][T11052] __should_failslab+0x81/0x90 [ 864.838377][T11052] should_failslab+0x5/0x20 [ 864.843075][T11052] kmem_cache_alloc_node+0x56/0x2f0 [ 864.848276][T11052] ? __alloc_skb+0xed/0x420 [ 864.853198][T11052] __alloc_skb+0xed/0x420 [ 864.857595][T11052] alloc_uevent_skb+0x5b/0x120 [ 864.862973][T11052] kobject_uevent_env+0x863/0xc40 [ 864.868115][T11052] kobject_uevent+0x18/0x20 [ 864.872763][T11052] loop_configure+0xb3c/0xcb0 [ 864.877464][T11052] lo_ioctl+0x555/0x11f0 [ 864.881725][T11052] ? path_openat+0x19ab/0x20b0 [ 864.886578][T11052] ? putname+0xa5/0xc0 [ 864.890794][T11052] ? ___cache_free+0x3c/0x300 [ 864.895515][T11052] ? blkdev_common_ioctl+0x9c3/0x1010 [ 864.901409][T11052] ? selinux_file_ioctl+0x8e0/0x970 [ 864.906611][T11052] ? lo_release+0x120/0x120 [ 864.911143][T11052] blkdev_ioctl+0x1d0/0x3c0 [ 864.915634][T11052] block_ioctl+0x6d/0x80 [ 864.919864][T11052] ? blkdev_iopoll+0x70/0x70 [ 864.924540][T11052] __se_sys_ioctl+0xcb/0x140 [ 864.929217][T11052] __x64_sys_ioctl+0x3f/0x50 [ 864.933825][T11052] do_syscall_64+0x34/0x50 [ 864.938326][T11052] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 864.944241][T11052] RIP: 0033:0x466217 [ 864.948305][T11052] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 864.968180][T11052] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 864.976645][T11052] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 864.985263][T11052] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 864.993750][T11052] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 865.002977][T11052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 865.011052][T11052] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 865.028384][T11036] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 865.043446][T11045] EXT4-fs (loop1): bad geometry: first data block 917504 is beyond end of filesystem (512) [ 865.044334][T11055] loop0: detected capacity change from 0 to 24576 [ 865.063697][T11061] loop4: detected capacity change from 0 to 6 [ 865.073998][T11063] loop3: detected capacity change from 0 to 6 14:13:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000000000f000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 865.086415][T11055] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 865.097549][T11055] EXT4-fs (loop0): group descriptors corrupted! [ 865.110689][T11052] EXT4-fs (loop5): failed to initialize system zone (-117) [ 865.118381][T11052] EXT4-fs (loop5): mount failed [ 865.127842][T11063] loop3: detected capacity change from 0 to 6 14:13:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f7fffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:06 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xedc000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:13:06 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:06 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 865.145639][T11061] loop4: detected capacity change from 0 to 6 [ 865.153113][T11036] loop2: detected capacity change from 0 to 6 [ 865.163790][T11036] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:13:06 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x604, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 865.228288][T11090] loop1: detected capacity change from 0 to 24576 [ 865.238314][T11101] loop5: detected capacity change from 0 to 24576 [ 865.244961][T11101] FAULT_INJECTION: forcing a failure. [ 865.244961][T11101] name failslab, interval 1, probability 0, space 0, times 0 [ 865.258477][T11101] CPU: 0 PID: 11101 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 865.265594][T11090] EXT4-fs (loop1): bad geometry: first data block 983040 is beyond end of filesystem (512) [ 865.268651][T11101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.268669][T11101] Call Trace: [ 865.268677][T11101] dump_stack+0x137/0x19d [ 865.281127][T11095] loop0: detected capacity change from 0 to 24576 [ 865.290234][T11101] should_fail+0x23c/0x250 [ 865.290262][T11101] __should_failslab+0x81/0x90 [ 865.293695][T11102] loop4: detected capacity change from 0 to 6 [ 865.298506][T11101] should_failslab+0x5/0x20 [ 865.312492][T11108] loop2: detected capacity change from 0 to 6 [ 865.315091][T11101] kmem_cache_alloc_node_trace+0x59/0x300 [ 865.366121][T11101] ? __kmalloc_node_track_caller+0x30/0x40 [ 865.373155][T11101] __kmalloc_node_track_caller+0x30/0x40 [ 865.378916][T11101] ? alloc_uevent_skb+0x5b/0x120 [ 865.383844][T11101] __alloc_skb+0x187/0x420 [ 865.388279][T11101] alloc_uevent_skb+0x5b/0x120 [ 865.393202][T11101] kobject_uevent_env+0x863/0xc40 [ 865.398404][T11101] kobject_uevent+0x18/0x20 [ 865.402985][T11101] loop_configure+0xb3c/0xcb0 [ 865.408102][T11101] lo_ioctl+0x555/0x11f0 [ 865.412936][T11101] ? path_openat+0x19ab/0x20b0 [ 865.418521][T11101] ? putname+0xa5/0xc0 [ 865.422583][T11101] ? ___cache_free+0x3c/0x300 [ 865.427252][T11101] ? blkdev_common_ioctl+0x9c3/0x1010 [ 865.432617][T11101] ? selinux_file_ioctl+0x8e0/0x970 [ 865.437949][T11101] ? lo_release+0x120/0x120 [ 865.442467][T11101] blkdev_ioctl+0x1d0/0x3c0 [ 865.446986][T11101] block_ioctl+0x6d/0x80 [ 865.451281][T11101] ? blkdev_iopoll+0x70/0x70 [ 865.455882][T11101] __se_sys_ioctl+0xcb/0x140 [ 865.460489][T11101] __x64_sys_ioctl+0x3f/0x50 [ 865.465079][T11101] do_syscall_64+0x34/0x50 [ 865.469504][T11101] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 865.475418][T11101] RIP: 0033:0x466217 [ 865.479337][T11101] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.499871][T11101] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 865.508364][T11101] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 865.519407][T11101] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 865.527626][T11101] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 865.537640][T11101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 865.546762][T11101] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 865.559476][T11095] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 865.571666][T11095] EXT4-fs (loop0): group descriptors corrupted! 14:13:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f0000ffffff0f000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 865.581855][T11113] loop3: detected capacity change from 0 to 6 [ 865.588541][T11108] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 865.599035][T11101] EXT4-fs (loop5): failed to initialize system zone (-117) [ 865.607323][T11101] EXT4-fs (loop5): mount failed 14:13:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f8cffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:07 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:07 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 865.652182][T11108] loop2: detected capacity change from 0 to 6 [ 865.666239][T11108] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 865.683289][T11102] loop4: detected capacity change from 0 to 6 14:13:07 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x1000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:13:07 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 865.708306][T11139] loop1: detected capacity change from 0 to 24576 [ 865.719663][T11145] loop3: detected capacity change from 0 to 6 [ 865.732275][T11140] loop0: detected capacity change from 0 to 24576 14:13:07 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 865.773573][T11145] loop3: detected capacity change from 0 to 6 [ 865.782887][T11140] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 865.793763][T11140] EXT4-fs (loop0): group descriptors corrupted! [ 865.800721][T11139] EXT4-fs (loop1): bad geometry: first data block 1048575 is beyond end of filesystem (512) [ 865.811051][T11150] loop5: detected capacity change from 0 to 24576 14:13:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f97ffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 865.819578][T11150] FAULT_INJECTION: forcing a failure. [ 865.819578][T11150] name failslab, interval 1, probability 0, space 0, times 0 [ 865.834335][T11150] CPU: 1 PID: 11150 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 865.843081][T11155] loop4: detected capacity change from 0 to 6 [ 865.845652][T11150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.845670][T11150] Call Trace: [ 865.845678][T11150] dump_stack+0x137/0x19d [ 865.870472][T11150] should_fail+0x23c/0x250 [ 865.875102][T11150] ? skb_clone+0x12c/0x1f0 [ 865.879967][T11150] __should_failslab+0x81/0x90 [ 865.885133][T11150] should_failslab+0x5/0x20 [ 865.889664][T11150] kmem_cache_alloc+0x46/0x300 [ 865.895018][T11150] skb_clone+0x12c/0x1f0 [ 865.900392][T11150] netlink_broadcast_filtered+0x50d/0xb90 [ 865.906537][T11150] ? skb_put+0xb9/0xf0 [ 865.910644][T11150] netlink_broadcast+0x35/0x50 [ 865.915514][T11150] kobject_uevent_env+0x8c9/0xc40 [ 865.920549][T11150] kobject_uevent+0x18/0x20 [ 865.925539][T11150] loop_configure+0xb3c/0xcb0 [ 865.930228][T11150] lo_ioctl+0x555/0x11f0 [ 865.934494][T11150] ? path_openat+0x19ab/0x20b0 [ 865.939286][T11150] ? putname+0xa5/0xc0 [ 865.943348][T11150] ? ___cache_free+0x3c/0x300 [ 865.948022][T11150] ? blkdev_common_ioctl+0x9c3/0x1010 [ 865.953483][T11150] ? selinux_file_ioctl+0x8e0/0x970 [ 865.958772][T11150] ? lo_release+0x120/0x120 [ 865.963307][T11150] blkdev_ioctl+0x1d0/0x3c0 [ 865.967796][T11150] block_ioctl+0x6d/0x80 [ 865.972039][T11150] ? blkdev_iopoll+0x70/0x70 [ 865.976616][T11150] __se_sys_ioctl+0xcb/0x140 [ 865.981243][T11150] __x64_sys_ioctl+0x3f/0x50 [ 865.986310][T11150] do_syscall_64+0x34/0x50 [ 865.991108][T11150] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 865.997614][T11150] RIP: 0033:0x466217 [ 866.001511][T11150] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.023212][T11150] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 866.031922][T11150] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 866.040230][T11150] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 866.048218][T11150] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 866.056312][T11150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 866.064271][T11150] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 14:13:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000010000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 866.085376][T11150] EXT4-fs (loop5): failed to initialize system zone (-117) [ 866.093180][T11150] EXT4-fs (loop5): mount failed [ 866.110757][T11163] loop2: detected capacity change from 0 to 6 14:13:07 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:07 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x4000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 866.135415][T11177] loop3: detected capacity change from 0 to 6 [ 866.139432][T11155] loop4: detected capacity change from 0 to 6 [ 866.150035][T11163] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 866.162462][T11181] loop0: detected capacity change from 0 to 24576 [ 866.220719][T11181] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 866.222283][T11163] loop2: detected capacity change from 0 to 6 [ 866.232922][T11181] EXT4-fs (loop0): group descriptors corrupted! [ 866.239338][T11192] loop1: detected capacity change from 0 to 24576 [ 866.253475][T11194] loop5: detected capacity change from 0 to 24576 [ 866.258551][T11177] loop3: detected capacity change from 0 to 6 [ 866.269815][T11194] FAULT_INJECTION: forcing a failure. [ 866.269815][T11194] name failslab, interval 1, probability 0, space 0, times 0 [ 866.282735][T11194] CPU: 0 PID: 11194 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 866.293740][T11194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 866.305942][T11194] Call Trace: [ 866.311530][T11194] dump_stack+0x137/0x19d [ 866.317609][T11194] should_fail+0x23c/0x250 [ 866.322221][T11194] __should_failslab+0x81/0x90 [ 866.322557][T11192] EXT4-fs (loop1): bad geometry: first data block 1048576 is beyond end of filesystem (512) [ 866.327119][T11194] ? call_usermodehelper_setup+0x81/0x160 [ 866.327149][T11194] should_failslab+0x5/0x20 [ 866.327172][T11194] kmem_cache_alloc_trace+0x49/0x320 [ 866.327192][T11194] ? add_uevent_var+0x16e/0x1c0 [ 866.363199][T11194] ? __kfree_skb+0xfe/0x150 [ 866.367740][T11194] call_usermodehelper_setup+0x81/0x160 [ 866.373713][T11194] ? add_uevent_var+0x1c0/0x1c0 [ 866.378570][T11194] kobject_uevent_env+0xb31/0xc40 [ 866.383894][T11194] kobject_uevent+0x18/0x20 [ 866.389063][T11194] loop_configure+0xb3c/0xcb0 [ 866.395530][T11194] lo_ioctl+0x555/0x11f0 [ 866.400477][T11194] ? path_openat+0x19ab/0x20b0 [ 866.405642][T11194] ? putname+0xa5/0xc0 [ 866.410015][T11194] ? ___cache_free+0x3c/0x300 [ 866.415163][T11194] ? blkdev_common_ioctl+0x9c3/0x1010 [ 866.421023][T11194] ? selinux_file_ioctl+0x8e0/0x970 [ 866.426901][T11194] ? lo_release+0x120/0x120 [ 866.431585][T11194] blkdev_ioctl+0x1d0/0x3c0 [ 866.436335][T11194] block_ioctl+0x6d/0x80 [ 866.441000][T11194] ? blkdev_iopoll+0x70/0x70 [ 866.445615][T11194] __se_sys_ioctl+0xcb/0x140 [ 866.450209][T11194] __x64_sys_ioctl+0x3f/0x50 [ 866.454812][T11194] do_syscall_64+0x34/0x50 [ 866.461367][T11194] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 866.467358][T11194] RIP: 0033:0x466217 [ 866.471657][T11194] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.495018][T11194] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 866.503811][T11194] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 866.515421][T11194] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 866.524964][T11194] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 866.533492][T11194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 866.541562][T11194] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 866.554097][T11163] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:13:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000ff6ffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 866.568301][T11205] loop4: detected capacity change from 0 to 6 14:13:08 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x604, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:08 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:13:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000410000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 866.607168][T11194] EXT4-fs (loop5): failed to initialize system zone (-117) [ 866.614087][T11217] loop0: detected capacity change from 0 to 24576 [ 866.627233][T11194] EXT4-fs (loop5): mount failed [ 866.632824][T11205] loop4: detected capacity change from 0 to 6 14:13:08 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 866.657778][T11217] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 866.668577][T11217] EXT4-fs (loop0): group descriptors corrupted! [ 866.674997][T11224] loop1: detected capacity change from 0 to 24576 [ 866.689201][T11224] EXT4-fs (loop1): bad geometry: first data block 1049600 is beyond end of filesystem (512) 14:13:08 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xe000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:13:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000ffdffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 866.715803][T11233] loop3: detected capacity change from 0 to 6 [ 866.722501][T11229] loop2: detected capacity change from 0 to 6 [ 866.745679][T11229] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 866.752635][T11243] loop5: detected capacity change from 0 to 24576 [ 866.757698][T11250] loop0: detected capacity change from 0 to 24576 [ 866.761203][T11243] FAULT_INJECTION: forcing a failure. [ 866.761203][T11243] name failslab, interval 1, probability 0, space 0, times 0 [ 866.767740][T11247] loop4: detected capacity change from 0 to 6 [ 866.780596][T11243] CPU: 1 PID: 11243 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 866.799463][T11243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 866.810869][T11243] Call Trace: [ 866.814158][T11243] dump_stack+0x137/0x19d [ 866.818498][T11243] should_fail+0x23c/0x250 [ 866.823116][T11243] __should_failslab+0x81/0x90 [ 866.828094][T11243] ? call_usermodehelper_setup+0x81/0x160 [ 866.833820][T11243] should_failslab+0x5/0x20 [ 866.838360][T11243] kmem_cache_alloc_trace+0x49/0x320 [ 866.844184][T11243] ? add_uevent_var+0x16e/0x1c0 [ 866.849222][T11243] ? __kfree_skb+0xfe/0x150 [ 866.856063][T11243] call_usermodehelper_setup+0x81/0x160 [ 866.861746][T11243] ? add_uevent_var+0x1c0/0x1c0 [ 866.866624][T11243] kobject_uevent_env+0xb31/0xc40 [ 866.871661][T11243] kobject_uevent+0x18/0x20 [ 866.876193][T11243] loop_configure+0xb3c/0xcb0 [ 866.880882][T11243] lo_ioctl+0x555/0x11f0 [ 866.885229][T11243] ? path_openat+0x19ab/0x20b0 [ 866.890089][T11243] ? putname+0xa5/0xc0 [ 866.894862][T11243] ? ___cache_free+0x3c/0x300 [ 866.900036][T11243] ? blkdev_common_ioctl+0x9c3/0x1010 [ 866.906519][T11243] ? selinux_file_ioctl+0x8e0/0x970 [ 866.912607][T11243] ? lo_release+0x120/0x120 [ 866.917423][T11243] blkdev_ioctl+0x1d0/0x3c0 [ 866.922205][T11243] block_ioctl+0x6d/0x80 [ 866.926540][T11243] ? blkdev_iopoll+0x70/0x70 [ 866.931231][T11243] __se_sys_ioctl+0xcb/0x140 [ 866.935824][T11243] __x64_sys_ioctl+0x3f/0x50 [ 866.940418][T11243] do_syscall_64+0x34/0x50 [ 866.944898][T11243] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 866.950829][T11243] RIP: 0033:0x466217 [ 866.954715][T11243] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.974439][T11243] RSP: 002b:00007f84cd585f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 866.982950][T11243] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 866.990932][T11243] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 866.998918][T11243] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 867.007941][T11243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 867.016045][T11243] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 867.025412][T11250] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 867.035744][T11250] EXT4-fs (loop0): group descriptors corrupted! [ 867.043218][T11233] loop3: detected capacity change from 0 to 6 [ 867.059988][T11229] loop2: detected capacity change from 0 to 6 14:13:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000ffeffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000011000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 867.066827][T11247] loop4: detected capacity change from 0 to 6 [ 867.094891][T11229] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 867.105580][T11276] loop0: detected capacity change from 0 to 24576 14:13:08 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:13:08 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x100000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:13:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000008000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 867.111012][T11243] EXT4-fs (loop5): failed to initialize system zone (-117) [ 867.123138][T11276] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 867.133551][T11276] EXT4-fs (loop0): group descriptors corrupted! [ 867.139527][T11243] EXT4-fs (loop5): mount failed 14:13:08 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:08 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 867.189866][T11290] loop3: detected capacity change from 0 to 6 [ 867.191016][T11292] loop4: detected capacity change from 0 to 6 [ 867.196053][T11287] loop1: detected capacity change from 0 to 24576 [ 867.285016][T11287] EXT4-fs (loop1): bad geometry: first data block 1114112 is beyond end of filesystem (512) [ 867.293595][T11292] loop4: detected capacity change from 0 to 6 [ 867.308960][T11306] loop0: detected capacity change from 0 to 24576 [ 867.310172][T11308] loop5: detected capacity change from 0 to 24576 [ 867.318483][T11306] EXT4-fs (loop0): bad geometry: first data block 32768 is beyond end of filesystem (512) [ 867.335540][T11308] FAULT_INJECTION: forcing a failure. [ 867.335540][T11308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 867.348924][T11308] CPU: 0 PID: 11308 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 867.359413][T11308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.370087][T11308] Call Trace: [ 867.373381][T11308] dump_stack+0x137/0x19d [ 867.378186][T11308] should_fail+0x23c/0x250 [ 867.382651][T11308] should_fail_usercopy+0x16/0x20 [ 867.387699][T11308] strncpy_from_user+0x21/0x250 [ 867.392657][T11308] getname_flags+0xb8/0x3d0 [ 867.397190][T11308] do_mkdirat+0x3b/0x200 [ 867.401865][T11308] __x64_sys_mkdir+0x32/0x40 [ 867.407245][T11308] do_syscall_64+0x34/0x50 [ 867.412997][T11308] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 867.420019][T11308] RIP: 0033:0x465567 [ 867.424340][T11308] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 867.445189][T11308] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 867.454379][T11308] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 867.463930][T11308] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 867.472644][T11308] RBP: 00007f84cd586040 R08: 0000000000000000 R09: ffffffffffffffff [ 867.482356][T11308] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 14:13:09 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 867.490427][T11308] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 14:13:09 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x10e000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:13:09 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 867.582453][T11317] loop2: detected capacity change from 0 to 6 14:13:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000008000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000012000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 867.636996][T11317] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 867.658965][T11327] loop3: detected capacity change from 0 to 6 [ 867.666069][T11330] loop4: detected capacity change from 0 to 6 [ 867.691413][T11342] loop5: detected capacity change from 0 to 24576 [ 867.698565][T11342] FAULT_INJECTION: forcing a failure. [ 867.698565][T11342] name failslab, interval 1, probability 0, space 0, times 0 [ 867.714900][T11342] CPU: 0 PID: 11342 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 867.725697][T11342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.736013][T11342] Call Trace: [ 867.739316][T11342] dump_stack+0x137/0x19d [ 867.743755][T11342] should_fail+0x23c/0x250 [ 867.748157][T11342] ? __d_alloc+0x36/0x370 [ 867.752494][T11342] __should_failslab+0x81/0x90 [ 867.757296][T11342] should_failslab+0x5/0x20 [ 867.761857][T11342] kmem_cache_alloc+0x46/0x300 [ 867.767085][T11342] __d_alloc+0x36/0x370 [ 867.771473][T11342] ? putname+0xa5/0xc0 [ 867.775971][T11342] d_alloc+0x2a/0x130 [ 867.779964][T11342] __lookup_hash+0x8f/0x180 [ 867.784598][T11342] filename_create+0xdb/0x3c0 [ 867.789551][T11342] do_mkdirat+0x59/0x200 [ 867.794188][T11342] __x64_sys_mkdir+0x32/0x40 [ 867.798915][T11342] do_syscall_64+0x34/0x50 [ 867.803441][T11342] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 867.809531][T11342] RIP: 0033:0x465567 [ 867.813636][T11342] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 867.833275][T11342] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 14:13:09 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:09 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x200000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 867.841886][T11342] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 867.849961][T11342] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 867.858819][T11342] RBP: 00007f84cd586040 R08: 0000000000000000 R09: ffffffffffffffff [ 867.867212][T11342] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 867.875319][T11342] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 14:13:09 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 867.920706][T11327] loop3: detected capacity change from 0 to 6 [ 867.927038][T11349] loop1: detected capacity change from 0 to 24576 [ 867.927038][T11360] loop4: detected capacity change from 0 to 6 [ 867.927612][ C1] ================================================================== [ 867.927621][ C1] BUG: KCSAN: data-race in data_push_tail / number [ 867.927627][ C1] [ 867.927632][ C1] write to 0xffffffff84515d7c of 1 bytes by task 11349 on cpu 0: [ 867.927639][ C1] number+0x836/0xb50 [ 867.927644][ C1] vsnprintf+0xb6d/0xed0 [ 867.927648][ C1] vscnprintf+0x29/0x80 [ 867.927653][ C1] vprintk_store+0x4c1/0x9c0 [ 867.927658][ C1] vprintk_emit+0xca/0x3d0 [ 867.927663][ C1] vprintk_default+0x22/0x30 [ 867.927668][ C1] vprintk_func+0x137/0x140 [ 867.927672][ C1] printk+0x62/0x82 [ 867.927677][ C1] set_capacity_and_notify+0x15a/0x1c0 [ 867.927683][ C1] loop_configure+0xafc/0xcb0 [ 867.927688][ C1] lo_ioctl+0x555/0x11f0 [ 867.927692][ C1] blkdev_ioctl+0x1d0/0x3c0 [ 867.927697][ C1] block_ioctl+0x6d/0x80 [ 867.927702][ C1] __se_sys_ioctl+0xcb/0x140 [ 867.927707][ C1] __x64_sys_ioctl+0x3f/0x50 [ 867.927714][ C1] do_syscall_64+0x34/0x50 [ 867.927719][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 867.927724][ C1] [ 867.927728][ C1] read to 0xffffffff84515d78 of 8 bytes by task 11360 on cpu 1: [ 867.927735][ C1] data_push_tail+0x125/0x460 [ 867.927740][ C1] data_alloc+0xbc/0x2b0 14:13:09 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 867.927744][ C1] prb_reserve+0x8f0/0xbc0 [ 867.927748][ C1] vprintk_store+0x3e9/0x9c0 [ 867.927753][ C1] vprintk_emit+0xca/0x3d0 [ 867.927758][ C1] vprintk_default+0x22/0x30 [ 867.927762][ C1] vprintk_func+0x137/0x140 [ 867.927767][ C1] printk+0x62/0x82 [ 867.927772][ C1] set_capacity_and_notify+0x15a/0x1c0 [ 867.927777][ C1] loop_configure+0xafc/0xcb0 [ 867.927782][ C1] lo_ioctl+0x555/0x11f0 [ 867.927795][ C1] blkdev_ioctl+0x1d0/0x3c0 [ 867.927800][ C1] block_ioctl+0x6d/0x80 [ 867.927804][ C1] __se_sys_ioctl+0xcb/0x140 [ 867.927809][ C1] __x64_sys_ioctl+0x3f/0x50 [ 867.927814][ C1] do_syscall_64+0x34/0x50 [ 867.927819][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 867.927824][ C1] [ 867.927828][ C1] Reported by Kernel Concurrency Sanitizer on: [ 867.927835][ C1] CPU: 1 PID: 11360 Comm: syz-executor.4 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 867.927844][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.927853][ C1] ================================================================== [ 867.940394][T11341] loop0: detected capacity change from 0 to 24576 [ 867.994646][T11366] loop2: detected capacity change from 0 to 6 [ 868.005440][T11369] loop5: detected capacity change from 0 to 24576 [ 868.013712][T11349] EXT4-fs (loop1): bad geometry: first data block 1179648 is beyond end of filesystem (512) [ 868.014389][T11369] FAULT_INJECTION: forcing a failure. [ 868.014389][T11369] name failslab, interval 1, probability 0, space 0, times 0 [ 868.045330][T11341] EXT4-fs (loop0): bad geometry: first data block 524288 is beyond end of filesystem (512) [ 868.048894][T11369] CPU: 0 PID: 11369 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 868.065864][T11360] loop4: detected capacity change from 0 to 6 [ 868.067831][T11369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.067845][T11369] Call Trace: [ 868.067854][T11369] dump_stack+0x137/0x19d [ 868.094712][T11366] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 868.095805][T11369] should_fail+0x23c/0x250 [ 868.095828][T11369] ? ext4_alloc_inode+0x27/0x300 [ 868.095852][T11369] __should_failslab+0x81/0x90 [ 868.300055][T11369] ? set_qf_name+0x230/0x230 [ 868.304979][T11369] should_failslab+0x5/0x20 [ 868.309833][T11369] kmem_cache_alloc+0x46/0x300 [ 868.315510][T11369] ? ebitmap_destroy+0x91/0xa0 [ 868.326341][T11369] ? set_qf_name+0x230/0x230 [ 868.333071][T11369] ext4_alloc_inode+0x27/0x300 [ 868.339394][T11369] ? set_qf_name+0x230/0x230 [ 868.344351][T11369] new_inode_pseudo+0x38/0x1c0 [ 868.349333][T11369] new_inode+0x21/0x120 [ 868.353503][T11369] __ext4_new_inode+0x126/0x2f10 [ 868.358505][T11369] ? __dquot_initialize+0x131/0x7e0 [ 868.363803][T11369] ext4_mkdir+0x28a/0x760 [ 868.368213][T11369] vfs_mkdir+0x135/0x1f0 [ 868.372623][T11369] do_mkdirat+0x11d/0x200 [ 868.377071][T11369] __x64_sys_mkdir+0x32/0x40 [ 868.381672][T11369] do_syscall_64+0x34/0x50 [ 868.386102][T11369] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 868.392517][T11369] RIP: 0033:0x465567 [ 868.396515][T11369] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:13:10 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 868.416205][T11369] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 868.425279][T11369] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 868.433277][T11369] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 868.442812][T11369] RBP: 00007f84cd586040 R08: 0000000000000000 R09: ffffffffffffffff [ 868.450995][T11369] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 868.459447][T11369] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 14:13:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000013000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 868.512359][T11366] loop2: detected capacity change from 0 to 6 [ 868.519697][T11366] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 868.541084][T11397] loop5: detected capacity change from 0 to 24576 [ 868.551301][T11383] loop3: detected capacity change from 0 to 6 14:13:10 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x204000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:13:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000000c0ed000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 868.551816][T11397] FAULT_INJECTION: forcing a failure. [ 868.551816][T11397] name failslab, interval 1, probability 0, space 0, times 0 [ 868.571782][T11397] CPU: 0 PID: 11397 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 868.582407][T11397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.592880][T11397] Call Trace: [ 868.596167][T11397] dump_stack+0x137/0x19d [ 868.600625][T11397] should_fail+0x23c/0x250 [ 868.605050][T11397] ? security_inode_alloc+0x30/0x180 [ 868.610473][T11397] __should_failslab+0x81/0x90 [ 868.615662][T11397] should_failslab+0x5/0x20 [ 868.620379][T11397] kmem_cache_alloc+0x46/0x300 [ 868.625614][T11397] security_inode_alloc+0x30/0x180 [ 868.630765][T11397] inode_init_always+0x20b/0x420 [ 868.635833][T11397] ? set_qf_name+0x230/0x230 [ 868.640905][T11397] new_inode_pseudo+0x73/0x1c0 [ 868.646869][T11397] new_inode+0x21/0x120 [ 868.651102][T11397] __ext4_new_inode+0x126/0x2f10 [ 868.656048][T11397] ? __dquot_initialize+0x131/0x7e0 [ 868.661780][T11397] ext4_mkdir+0x28a/0x760 [ 868.666701][T11397] vfs_mkdir+0x135/0x1f0 [ 868.671222][T11397] do_mkdirat+0x11d/0x200 [ 868.675598][T11397] __x64_sys_mkdir+0x32/0x40 [ 868.680516][T11397] do_syscall_64+0x34/0x50 [ 868.684950][T11397] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 868.691096][T11397] RIP: 0033:0x465567 [ 868.695302][T11397] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 868.718114][T11397] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 868.729996][T11397] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 868.738554][T11397] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 868.746882][T11397] RBP: 00007f84cd586040 R08: 0000000000000000 R09: ffffffffffffffff [ 868.755517][T11397] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 14:13:10 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 868.763586][T11397] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 14:13:10 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 868.816124][T11407] loop1: detected capacity change from 0 to 24576 [ 868.824500][T11407] EXT4-fs (loop1): bad geometry: first data block 1245184 is beyond end of filesystem (512) [ 868.836390][T11383] loop3: detected capacity change from 0 to 6 [ 868.844975][T11409] loop0: detected capacity change from 0 to 24576 [ 868.854568][T11410] loop4: detected capacity change from 0 to 6 14:13:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000018000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 868.857870][T11409] EXT4-fs (loop0): bad geometry: first data block 15581184 is beyond end of filesystem (512) 14:13:10 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe01, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 868.920465][T11427] loop5: detected capacity change from 0 to 24576 [ 868.921632][T11423] loop2: detected capacity change from 0 to 6 [ 868.927645][T11427] FAULT_INJECTION: forcing a failure. [ 868.927645][T11427] name failslab, interval 1, probability 0, space 0, times 0 [ 868.946012][T11427] CPU: 0 PID: 11427 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 868.956261][T11427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.966323][T11427] Call Trace: 14:13:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000000010000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 868.969658][T11427] dump_stack+0x137/0x19d [ 868.974270][T11427] should_fail+0x23c/0x250 [ 868.978606][T11410] loop4: detected capacity change from 0 to 6 [ 868.978695][T11427] ? security_inode_alloc+0x30/0x180 [ 868.990167][T11427] __should_failslab+0x81/0x90 [ 868.995062][T11427] should_failslab+0x5/0x20 [ 868.999633][T11427] kmem_cache_alloc+0x46/0x300 [ 869.004420][T11427] security_inode_alloc+0x30/0x180 [ 869.009761][T11427] inode_init_always+0x20b/0x420 [ 869.014772][T11427] ? set_qf_name+0x230/0x230 [ 869.019888][T11427] new_inode_pseudo+0x73/0x1c0 [ 869.024798][T11427] new_inode+0x21/0x120 [ 869.029053][T11427] __ext4_new_inode+0x126/0x2f10 [ 869.033998][T11427] ? __dquot_initialize+0x131/0x7e0 [ 869.039221][T11427] ext4_mkdir+0x28a/0x760 [ 869.043560][T11427] vfs_mkdir+0x135/0x1f0 [ 869.047811][T11427] do_mkdirat+0x11d/0x200 [ 869.052142][T11427] __x64_sys_mkdir+0x32/0x40 [ 869.056738][T11427] do_syscall_64+0x34/0x50 [ 869.061647][T11427] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 869.067572][T11427] RIP: 0033:0x465567 [ 869.071584][T11427] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 869.091230][T11427] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 869.099654][T11427] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 869.107641][T11427] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 14:13:10 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x300000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 869.115625][T11427] RBP: 00007f84cd586040 R08: 0000000000000000 R09: ffffffffffffffff [ 869.123625][T11427] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 869.131667][T11427] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 [ 869.149512][T11442] loop1: detected capacity change from 0 to 24576 [ 869.158270][T11423] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:13:10 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 869.193558][T11443] loop3: detected capacity change from 0 to 7 [ 869.196981][T11442] EXT4-fs (loop1): bad geometry: first data block 1572864 is beyond end of filesystem (512) [ 869.226008][T11423] loop2: detected capacity change from 0 to 6 [ 869.227697][T11448] loop0: detected capacity change from 0 to 24576 [ 869.232530][T11443] loop3: detected capacity change from 0 to 7 [ 869.247564][T11462] loop5: detected capacity change from 0 to 24576 [ 869.248103][T11448] EXT4-fs (loop0): bad geometry: first data block 16777216 is beyond end of filesystem (512) [ 869.267331][T11462] FAULT_INJECTION: forcing a failure. [ 869.267331][T11462] name failslab, interval 1, probability 0, space 0, times 0 [ 869.280182][T11423] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:13:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000019000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 869.280179][T11462] CPU: 1 PID: 11462 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 869.280246][T11462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.280257][T11462] Call Trace: [ 869.280266][T11462] dump_stack+0x137/0x19d [ 869.317300][T11462] should_fail+0x23c/0x250 [ 869.321724][T11462] __should_failslab+0x81/0x90 [ 869.326549][T11462] ? kcalloc+0x32/0x50 [ 869.330892][T11462] should_failslab+0x5/0x20 [ 869.335408][T11462] __kmalloc+0x66/0x360 [ 869.339657][T11462] kcalloc+0x32/0x50 [ 869.343570][T11462] ext4_find_extent+0x21c/0x7f0 [ 869.348494][T11462] ? __cond_resched+0x11/0x40 [ 869.353188][T11462] ext4_ext_map_blocks+0xd9/0x1f00 [ 869.358302][T11462] ? mark_buffer_dirty+0x151/0x200 [ 869.363425][T11462] ? __ext4_handle_dirty_metadata+0x20c/0x590 [ 869.369843][T11462] ? __down_read_common+0x16b/0x5a0 [ 869.375071][T11462] ? percpu_counter_add_batch+0x69/0xd0 [ 869.380629][T11462] ? ext4_es_lookup_extent+0x206/0x490 [ 869.386874][T11462] ext4_map_blocks+0x1be/0xef0 [ 869.391807][T11462] ext4_getblk+0xb1/0x3d0 [ 869.396148][T11462] ext4_bread+0x28/0x130 [ 869.400490][T11462] ext4_append+0xd1/0x1c0 [ 869.404809][T11462] ext4_init_new_dir+0x177/0x500 [ 869.409840][T11462] ext4_mkdir+0x329/0x760 [ 869.414340][T11462] vfs_mkdir+0x135/0x1f0 [ 869.418584][T11462] do_mkdirat+0x11d/0x200 [ 869.422926][T11462] __x64_sys_mkdir+0x32/0x40 [ 869.427536][T11462] do_syscall_64+0x34/0x50 [ 869.432001][T11462] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 869.437906][T11462] RIP: 0033:0x465567 [ 869.441878][T11462] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 869.461602][T11462] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 869.472962][T11462] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 869.480939][T11462] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 14:13:11 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xf00, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 869.489010][T11462] RBP: 00007f84cd586040 R08: 0000000000000000 R09: ffffffffffffffff [ 869.496998][T11462] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 869.504985][T11462] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 [ 869.534667][T11473] loop4: detected capacity change from 0 to 6 14:13:11 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000000020000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:11 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 869.562159][T11480] loop1: detected capacity change from 0 to 24576 [ 869.566793][T11462] EXT4-fs (loop5): failed to initialize system zone (-117) [ 869.580852][T11462] EXT4-fs (loop5): mount failed 14:13:11 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x400000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 869.622516][T11480] EXT4-fs (loop1): bad geometry: first data block 1638400 is beyond end of filesystem (512) [ 869.642741][T11490] loop3: detected capacity change from 0 to 7 [ 869.649463][T11487] loop0: detected capacity change from 0 to 24576 [ 869.651531][T11473] loop4: detected capacity change from 0 to 6 [ 869.689820][T11487] EXT4-fs (loop0): bad geometry: first data block 33554432 is beyond end of filesystem (512) [ 869.703526][T11498] loop2: detected capacity change from 0 to 6 [ 869.703905][T11499] loop5: detected capacity change from 0 to 24576 [ 869.726574][T11498] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:13:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000000001b000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 869.729093][T11490] loop3: detected capacity change from 0 to 7 [ 869.737418][T11499] FAULT_INJECTION: forcing a failure. [ 869.737418][T11499] name failslab, interval 1, probability 0, space 0, times 0 [ 869.755354][T11499] CPU: 1 PID: 11499 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 869.765541][T11499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.776469][T11499] Call Trace: [ 869.779854][T11499] dump_stack+0x137/0x19d [ 869.784222][T11499] should_fail+0x23c/0x250 [ 869.786712][T11515] loop4: detected capacity change from 0 to 6 [ 869.788652][T11499] __should_failslab+0x81/0x90 [ 869.788679][T11499] ? kcalloc+0x32/0x50 [ 869.788697][T11499] should_failslab+0x5/0x20 [ 869.788731][T11499] __kmalloc+0x66/0x360 [ 869.788748][T11499] kcalloc+0x32/0x50 [ 869.788764][T11499] ext4_find_extent+0x21c/0x7f0 [ 869.788782][T11499] ? __cond_resched+0x11/0x40 [ 869.788802][T11499] ext4_ext_map_blocks+0xd9/0x1f00 [ 869.832272][T11499] ? mark_buffer_dirty+0x151/0x200 [ 869.837644][T11499] ? __ext4_handle_dirty_metadata+0x20c/0x590 [ 869.843729][T11499] ? __down_read_common+0x16b/0x5a0 [ 869.848978][T11499] ? percpu_counter_add_batch+0x69/0xd0 [ 869.854725][T11499] ? ext4_es_lookup_extent+0x206/0x490 [ 869.860691][T11499] ext4_map_blocks+0x1be/0xef0 [ 869.865778][T11499] ext4_getblk+0xb1/0x3d0 [ 869.870762][T11499] ext4_bread+0x28/0x130 [ 869.875199][T11499] ext4_append+0xd1/0x1c0 [ 869.879539][T11499] ext4_init_new_dir+0x177/0x500 [ 869.884707][T11499] ext4_mkdir+0x329/0x760 [ 869.889201][T11499] vfs_mkdir+0x135/0x1f0 [ 869.893690][T11499] do_mkdirat+0x11d/0x200 [ 869.898058][T11499] __x64_sys_mkdir+0x32/0x40 [ 869.902896][T11499] do_syscall_64+0x34/0x50 [ 869.907342][T11499] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 869.913302][T11499] RIP: 0033:0x465567 [ 869.917212][T11499] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:13:11 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 869.937061][T11499] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 869.946708][T11499] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 869.954688][T11499] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 869.962759][T11499] RBP: 00007f84cd586040 R08: 0000000000000000 R09: ffffffffffffffff [ 869.970774][T11499] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 869.979052][T11499] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 14:13:11 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x500000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:13:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000000040000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:11 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 870.051271][T11531] loop4: detected capacity change from 0 to 6 [ 870.057816][T11499] EXT4-fs (loop5): failed to initialize system zone (-117) [ 870.065323][T11499] EXT4-fs (loop5): mount failed [ 870.068725][T11524] loop2: detected capacity change from 0 to 6 [ 870.070356][T11526] loop1: detected capacity change from 0 to 24576 [ 870.089602][T11524] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 870.094010][T11526] EXT4-fs (loop1): bad geometry: first data block 1769472 is beyond end of filesystem (512) 14:13:11 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x600000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:13:11 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000020000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 870.155016][T11540] loop0: detected capacity change from 0 to 24576 [ 870.155101][T11531] loop4: detected capacity change from 0 to 6 [ 870.169511][T11524] loop2: detected capacity change from 0 to 6 [ 870.215238][T11524] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 870.215340][T11540] EXT4-fs (loop0): bad geometry: first data block 67108864 is beyond end of filesystem (512) [ 870.233384][T11558] loop5: detected capacity change from 0 to 24576 [ 870.252734][T11564] loop1: detected capacity change from 0 to 24576 [ 870.254885][T11558] FAULT_INJECTION: forcing a failure. [ 870.254885][T11558] name failslab, interval 1, probability 0, space 0, times 0 [ 870.260228][T11567] loop4: detected capacity change from 0 to 6 [ 870.276287][T11558] CPU: 0 PID: 11558 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 870.276315][T11558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.276326][T11558] Call Trace: [ 870.276334][T11558] dump_stack+0x137/0x19d [ 870.286151][T11565] loop3: detected capacity change from 0 to 8 [ 870.294458][T11558] should_fail+0x23c/0x250 [ 870.294490][T11558] ? __es_insert_extent+0x51f/0xe80 [ 870.328149][T11558] __should_failslab+0x81/0x90 [ 870.333163][T11558] should_failslab+0x5/0x20 [ 870.337805][T11558] kmem_cache_alloc+0x46/0x300 [ 870.342569][T11558] __es_insert_extent+0x51f/0xe80 [ 870.347599][T11558] ? __kmalloc+0x1e0/0x360 [ 870.352097][T11558] ? kcalloc+0x32/0x50 [ 870.356251][T11558] ext4_es_insert_extent+0x1bb/0x19d0 [ 870.361624][T11558] ? ext4_ext_convert_to_initialized+0xf50/0xf50 [ 870.367967][T11558] ext4_ext_map_blocks+0xf79/0x1f00 [ 870.373238][T11558] ? __ext4_handle_dirty_metadata+0x20c/0x590 [ 870.379320][T11558] ? __down_read_common+0x16b/0x5a0 [ 870.384532][T11558] ? percpu_counter_add_batch+0x69/0xd0 [ 870.390143][T11558] ? ext4_es_lookup_extent+0x206/0x490 [ 870.395634][T11558] ext4_map_blocks+0x1be/0xef0 [ 870.401096][T11558] ext4_getblk+0xb1/0x3d0 [ 870.405440][T11558] ext4_bread+0x28/0x130 [ 870.409694][T11558] ext4_append+0xd1/0x1c0 [ 870.414044][T11558] ext4_init_new_dir+0x177/0x500 [ 870.419036][T11558] ext4_mkdir+0x329/0x760 [ 870.423376][T11558] vfs_mkdir+0x135/0x1f0 [ 870.427629][T11558] do_mkdirat+0x11d/0x200 [ 870.431973][T11558] __x64_sys_mkdir+0x32/0x40 [ 870.436652][T11558] do_syscall_64+0x34/0x50 [ 870.441076][T11558] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 870.446982][T11558] RIP: 0033:0x465567 [ 870.450885][T11558] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 870.471483][T11558] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 870.479956][T11558] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 870.488003][T11558] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 870.496093][T11558] RBP: 00007f84cd586040 R08: 0000000000000000 R09: ffffffffffffffff [ 870.504112][T11558] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 870.513102][T11558] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 14:13:12 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000fffffffffffff070000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 870.548623][T11567] loop4: detected capacity change from 0 to 6 [ 870.564508][T11564] EXT4-fs (loop1): bad geometry: first data block 2097152 is beyond end of filesystem (512) [ 870.590935][T11565] loop3: detected capacity change from 0 to 8 14:13:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000001020000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:12 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x604000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 870.616876][T11558] EXT4-fs (loop5): failed to initialize system zone (-117) [ 870.646035][T11558] EXT4-fs (loop5): mount failed 14:13:12 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x1100, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 870.674025][T11596] loop2: detected capacity change from 0 to 6 [ 870.674485][T11597] loop0: detected capacity change from 0 to 24576 [ 870.687440][T11596] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 870.714172][T11602] loop1: detected capacity change from 0 to 24576 14:13:12 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000000300000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 870.722159][T11604] loop4: detected capacity change from 0 to 6 [ 870.737220][T11597] EXT4-fs (loop0): bad geometry: first data block 134217727 is beyond end of filesystem (512) [ 870.782484][T11602] EXT4-fs (loop1): bad geometry: first data block 2101248 is beyond end of filesystem (512) [ 870.799731][T11620] loop5: detected capacity change from 0 to 24576 [ 870.807257][T11620] FAULT_INJECTION: forcing a failure. [ 870.807257][T11620] name failslab, interval 1, probability 0, space 0, times 0 [ 870.816307][T11613] loop3: detected capacity change from 0 to 8 [ 870.820080][T11620] CPU: 0 PID: 11620 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 870.836262][T11620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.846379][T11620] Call Trace: [ 870.849676][T11620] dump_stack+0x137/0x19d [ 870.854017][T11620] should_fail+0x23c/0x250 [ 870.858445][T11620] __should_failslab+0x81/0x90 [ 870.863219][T11620] ? kcalloc+0x32/0x50 [ 870.867294][T11620] should_failslab+0x5/0x20 [ 870.871848][T11620] __kmalloc+0x66/0x360 [ 870.876104][T11620] ? kcalloc+0x32/0x50 [ 870.880217][T11620] kcalloc+0x32/0x50 [ 870.884118][T11620] ext4_find_extent+0x21c/0x7f0 [ 870.889100][T11620] ? kfree+0xf0/0x1d0 [ 870.893108][T11620] ext4_ext_map_blocks+0xd9/0x1f00 [ 870.898260][T11620] ? __ext4_handle_dirty_metadata+0x20c/0x590 [ 870.904346][T11620] ? __down_write_common+0x45/0x890 [ 870.909698][T11620] ? __down_read_common+0x16b/0x5a0 [ 870.914997][T11620] ? percpu_counter_add_batch+0x69/0xd0 [ 870.920641][T11620] ? ext4_es_lookup_extent+0x206/0x490 [ 870.926117][T11620] ext4_map_blocks+0x70d/0xef0 [ 870.931047][T11620] ext4_getblk+0xb1/0x3d0 [ 870.935432][T11620] ext4_bread+0x28/0x130 [ 870.939809][T11620] ext4_append+0xd1/0x1c0 [ 870.944154][T11620] ext4_init_new_dir+0x177/0x500 [ 870.949119][T11620] ext4_mkdir+0x329/0x760 [ 870.953461][T11620] vfs_mkdir+0x135/0x1f0 [ 870.959306][T11620] do_mkdirat+0x11d/0x200 [ 870.963696][T11620] __x64_sys_mkdir+0x32/0x40 [ 870.968320][T11620] do_syscall_64+0x34/0x50 [ 870.972913][T11620] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 870.978880][T11620] RIP: 0033:0x465567 [ 870.983220][T11620] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 871.003774][T11620] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 871.012789][T11620] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 871.022065][T11620] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 14:13:12 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x700000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:13:12 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe00, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 871.030720][T11620] RBP: 00007f84cd586040 R08: 0000000000000000 R09: ffffffffffffffff [ 871.042994][T11620] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 871.051237][T11620] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 14:13:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000022000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:12 executing program 5 (fault-call:0 fault-nth:45): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 871.119199][T11639] loop2: detected capacity change from 0 to 7 [ 871.127669][T11639] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 871.137742][T11640] loop4: detected capacity change from 0 to 6 [ 871.144297][T11632] loop0: detected capacity change from 0 to 24576 [ 871.148379][T11647] loop1: detected capacity change from 0 to 24576 [ 871.158756][T11613] loop3: detected capacity change from 0 to 8 [ 871.188167][T11632] EXT4-fs (loop0): bad geometry: first data block 805306368 is beyond end of filesystem (512) [ 871.195930][T11647] EXT4-fs (loop1): bad geometry: first data block 2228224 is beyond end of filesystem (512) [ 871.215469][T11639] loop2: detected capacity change from 0 to 7 [ 871.220309][T11660] loop5: detected capacity change from 0 to 24576 14:13:12 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x1102, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:13:12 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x800000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 871.229906][T11639] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 871.230757][T11660] FAULT_INJECTION: forcing a failure. [ 871.230757][T11660] name failslab, interval 1, probability 0, space 0, times 0 [ 871.253698][T11660] CPU: 1 PID: 11660 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 871.264024][T11660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.274704][T11660] Call Trace: [ 871.278434][T11660] dump_stack+0x137/0x19d [ 871.282837][T11660] should_fail+0x23c/0x250 [ 871.287269][T11660] ? ext4_mb_new_blocks+0x2e7/0x1f60 [ 871.291690][T11666] loop4: detected capacity change from 0 to 6 [ 871.292801][T11660] __should_failslab+0x81/0x90 [ 871.292828][T11660] should_failslab+0x5/0x20 [ 871.308774][T11660] kmem_cache_alloc+0x46/0x300 [ 871.313653][T11660] ext4_mb_new_blocks+0x2e7/0x1f60 [ 871.319019][T11660] ? ext4_find_extent+0x6cf/0x7f0 [ 871.324036][T11660] ? ext4_ext_search_right+0x300/0x540 [ 871.329909][T11660] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 871.336092][T11660] ext4_ext_map_blocks+0x1569/0x1f00 [ 871.341558][T11660] ? __down_read_common+0x16b/0x5a0 [ 871.347259][T11660] ? percpu_counter_add_batch+0x69/0xd0 [ 871.355090][T11660] ? ext4_es_lookup_extent+0x206/0x490 [ 871.361393][T11660] ext4_map_blocks+0x70d/0xef0 [ 871.366278][T11660] ext4_getblk+0xb1/0x3d0 [ 871.370719][T11660] ext4_bread+0x28/0x130 [ 871.375235][T11660] ext4_append+0xd1/0x1c0 [ 871.379664][T11660] ext4_init_new_dir+0x177/0x500 [ 871.384609][T11660] ext4_mkdir+0x329/0x760 [ 871.388929][T11660] vfs_mkdir+0x135/0x1f0 [ 871.393185][T11660] do_mkdirat+0x11d/0x200 [ 871.397598][T11660] __x64_sys_mkdir+0x32/0x40 [ 871.402182][T11660] do_syscall_64+0x34/0x50 [ 871.406613][T11660] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 871.413125][T11660] RIP: 0033:0x465567 [ 871.417103][T11660] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:13:13 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe01, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000000600000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 871.436714][T11660] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 871.445155][T11660] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 871.453519][T11660] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 871.461721][T11660] RBP: 00007f84cd586040 R08: 0000000000000000 R09: ffffffffffffffff [ 871.471470][T11660] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 871.479449][T11660] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 14:13:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000025000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:13 executing program 5 (fault-call:0 fault-nth:46): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 871.526845][T11666] loop4: detected capacity change from 0 to 6 14:13:13 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x900000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 871.572351][T11681] loop0: detected capacity change from 0 to 24576 [ 871.580558][T11680] loop2: detected capacity change from 0 to 7 [ 871.589698][T11681] EXT4-fs (loop0): bad geometry: first data block 1610612736 is beyond end of filesystem (512) [ 871.595653][T11692] loop1: detected capacity change from 0 to 24576 [ 871.607196][T11686] loop3: detected capacity change from 0 to 8 [ 871.607250][T11680] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 871.629864][T11692] EXT4-fs (loop1): bad geometry: first data block 2424832 is beyond end of filesystem (512) [ 871.638467][T11700] loop5: detected capacity change from 0 to 24576 [ 871.648903][T11707] loop4: detected capacity change from 0 to 6 [ 871.658232][T11700] FAULT_INJECTION: forcing a failure. [ 871.658232][T11700] name failslab, interval 1, probability 0, space 0, times 0 [ 871.671160][T11700] CPU: 1 PID: 11700 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 871.681304][T11700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.691464][T11700] Call Trace: [ 871.694741][T11700] dump_stack+0x137/0x19d [ 871.699097][T11700] should_fail+0x23c/0x250 [ 871.703615][T11700] ? __es_insert_extent+0x51f/0xe80 [ 871.708807][T11700] __should_failslab+0x81/0x90 [ 871.713854][T11700] should_failslab+0x5/0x20 [ 871.718479][T11700] kmem_cache_alloc+0x46/0x300 [ 871.723267][T11700] __es_insert_extent+0x51f/0xe80 [ 871.730276][T11700] ext4_es_insert_extent+0x1bb/0x19d0 [ 871.735640][T11700] ? percpu_counter_add_batch+0x69/0xd0 [ 871.741380][T11700] ? ext4_es_lookup_extent+0x206/0x490 [ 871.746841][T11700] ext4_map_blocks+0xa4c/0xef0 [ 871.751960][T11700] ext4_getblk+0xb1/0x3d0 [ 871.756636][T11700] ext4_bread+0x28/0x130 [ 871.761486][T11700] ext4_append+0xd1/0x1c0 [ 871.765970][T11700] ext4_init_new_dir+0x177/0x500 [ 871.770947][T11700] ext4_mkdir+0x329/0x760 [ 871.775561][T11700] vfs_mkdir+0x135/0x1f0 [ 871.779804][T11700] do_mkdirat+0x11d/0x200 [ 871.784301][T11700] __x64_sys_mkdir+0x32/0x40 [ 871.789539][T11700] do_syscall_64+0x34/0x50 [ 871.794531][T11700] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 871.800557][T11700] RIP: 0033:0x465567 [ 871.805307][T11700] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 871.828316][T11700] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 871.838148][T11700] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 871.846325][T11700] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 871.856081][T11700] RBP: 00007f84cd586040 R08: 0000000000000000 R09: ffffffffffffffff [ 871.864708][T11700] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 871.874497][T11700] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 14:13:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000000000100000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000000002e000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 871.909846][T11686] loop3: detected capacity change from 0 to 8 [ 871.925807][T11680] loop2: detected capacity change from 0 to 7 [ 871.930721][T11700] EXT4-fs (loop5): failed to initialize system zone (-117) 14:13:13 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xa00000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 871.957076][T11700] EXT4-fs (loop5): mount failed [ 871.958207][T11707] loop4: detected capacity change from 0 to 6 [ 871.963375][T11680] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:13:13 executing program 5 (fault-call:0 fault-nth:47): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:13 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 14:13:13 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xf00, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) [ 872.022402][T11731] loop0: detected capacity change from 0 to 24576 [ 872.043522][T11733] loop1: detected capacity change from 0 to 24576 [ 872.046566][T11744] loop5: detected capacity change from 0 to 24576 [ 872.057399][T11745] loop4: detected capacity change from 0 to 6 [ 872.064230][T11731] EXT4-fs (loop0): blocks per group (131072) and clusters per group (8192) inconsistent [ 872.079418][T11744] FAULT_INJECTION: forcing a failure. [ 872.079418][T11744] name failslab, interval 1, probability 0, space 0, times 0 [ 872.093496][T11744] CPU: 1 PID: 11744 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 872.103744][T11744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.107865][T11752] loop3: detected capacity change from 0 to 16 [ 872.115598][T11744] Call Trace: [ 872.115612][T11744] dump_stack+0x137/0x19d [ 872.115638][T11744] should_fail+0x23c/0x250 [ 872.135696][T11744] __should_failslab+0x81/0x90 [ 872.140511][T11744] ? __se_sys_mount+0x4e/0x2e0 [ 872.145389][T11744] should_failslab+0x5/0x20 [ 872.150007][T11744] __kmalloc_track_caller+0x64/0x360 [ 872.156915][T11744] ? strnlen_user+0x137/0x1c0 [ 872.162000][T11744] strndup_user+0x73/0x120 [ 872.166531][T11744] __se_sys_mount+0x4e/0x2e0 [ 872.171149][T11744] ? mntput+0x45/0x70 [ 872.175153][T11744] ? __fpregs_load_activate+0x103/0x1b0 [ 872.181246][T11744] __x64_sys_mount+0x63/0x70 [ 872.185992][T11744] do_syscall_64+0x34/0x50 [ 872.190528][T11744] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 872.196527][T11744] RIP: 0033:0x46797a [ 872.200472][T11744] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 872.223531][T11744] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 872.232101][T11744] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 872.240082][T11744] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f84cd586000 [ 872.248134][T11744] RBP: 00007f84cd586040 R08: 00007f84cd586040 R09: 0000000020000000 [ 872.256257][T11744] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 872.264242][T11744] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 14:13:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000000ffff7c0100000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 872.273584][T11733] EXT4-fs (loop1): bad geometry: first data block 3014656 is beyond end of filesystem (512) [ 872.312581][T11753] loop2: detected capacity change from 0 to 7 14:13:14 executing program 5 (fault-call:0 fault-nth:48): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000032000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:14 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 872.319632][T11752] loop3: detected capacity change from 0 to 16 [ 872.324985][T11745] loop4: detected capacity change from 0 to 6 [ 872.345447][T11753] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) 14:13:14 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xb00000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 872.389018][T11770] loop0: detected capacity change from 0 to 24576 [ 872.403001][T11786] loop3: detected capacity change from 0 to 16 [ 872.409963][T11753] loop2: detected capacity change from 0 to 7 [ 872.411096][T11770] EXT4-fs (loop0): blocks per group (131072) and clusters per group (8192) inconsistent [ 872.416345][T11784] loop1: detected capacity change from 0 to 24576 14:13:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000000000200000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) [ 872.437348][T11784] EXT4-fs (loop1): bad geometry: first data block 3276800 is beyond end of filesystem (512) [ 872.448856][T11792] loop5: detected capacity change from 0 to 24576 [ 872.456013][T11753] FAT-fs (loop2): unable to read boot sector (logical sector size = 4096) [ 872.458124][T11792] FAULT_INJECTION: forcing a failure. [ 872.458124][T11792] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 872.477745][T11792] CPU: 1 PID: 11792 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 872.478198][T11793] loop4: detected capacity change from 0 to 6 [ 872.489028][T11792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.489045][T11792] Call Trace: [ 872.489053][T11792] dump_stack+0x137/0x19d [ 872.489077][T11792] should_fail+0x23c/0x250 [ 872.489091][T11792] should_fail_usercopy+0x16/0x20 [ 872.489110][T11792] _copy_from_user+0x1c/0xd0 [ 872.526900][T11792] strndup_user+0xb0/0x120 [ 872.531963][T11792] __se_sys_mount+0x4e/0x2e0 [ 872.536566][T11792] ? mntput+0x45/0x70 [ 872.540572][T11792] ? __fpregs_load_activate+0x103/0x1b0 [ 872.546176][T11792] __x64_sys_mount+0x63/0x70 [ 872.550892][T11792] do_syscall_64+0x34/0x50 [ 872.555413][T11792] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 872.561375][T11792] RIP: 0033:0x46797a [ 872.565287][T11792] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:13:14 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 872.585810][T11792] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 872.594252][T11792] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 872.602241][T11792] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f84cd586000 [ 872.610348][T11792] RBP: 00007f84cd586040 R08: 00007f84cd586040 R09: 0000000020000000 [ 872.618511][T11792] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 872.626529][T11792] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 14:13:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000132000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:14 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:14 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xc00000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 14:13:14 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x2200, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 872.680521][T11786] loop3: detected capacity change from 0 to 16 [ 872.691808][T11793] loop4: detected capacity change from 0 to 6 [ 872.717514][T11816] loop1: detected capacity change from 0 to 24576 [ 872.724099][T11817] loop0: detected capacity change from 0 to 24576 [ 872.733216][T11816] EXT4-fs (loop1): bad geometry: first data block 3277056 is beyond end of filesystem (512) [ 872.745069][T11817] EXT4-fs (loop0): blocks per group (131072) and clusters per group (8192) inconsistent [ 872.754913][T11823] loop5: detected capacity change from 0 to 24576 [ 872.763571][T11823] FAULT_INJECTION: forcing a failure. [ 872.763571][T11823] name failslab, interval 1, probability 0, space 0, times 0 [ 872.776919][T11823] CPU: 0 PID: 11823 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 872.787345][T11823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.797424][T11823] Call Trace: [ 872.800821][T11823] dump_stack+0x137/0x19d [ 872.805196][T11823] should_fail+0x23c/0x250 [ 872.809631][T11823] __should_failslab+0x81/0x90 [ 872.814418][T11823] ? __se_sys_mount+0x91/0x2e0 [ 872.819482][T11823] should_failslab+0x5/0x20 [ 872.824037][T11823] __kmalloc_track_caller+0x64/0x360 [ 872.829453][T11823] ? strnlen_user+0x137/0x1c0 [ 872.834147][T11823] strndup_user+0x73/0x120 [ 872.838586][T11823] __se_sys_mount+0x91/0x2e0 [ 872.843518][T11823] ? mntput+0x45/0x70 [ 872.847516][T11823] ? do_mkdirat+0x1c7/0x200 [ 872.852035][T11823] __x64_sys_mount+0x63/0x70 [ 872.856727][T11823] do_syscall_64+0x34/0x50 [ 872.861197][T11823] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 872.867108][T11823] RIP: 0033:0x46797a 14:13:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000133000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000900000000000000000000000000000000000000000000000000000000000000000000000000000007cd46898000000000000000000000000000000000000000000000000ed1dee498b107b36ca9f8681e226019df239b98d50", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 872.870997][T11823] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 872.891178][T11823] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 872.900058][T11823] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 872.909979][T11823] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f84cd586000 [ 872.918142][T11823] RBP: 00007f84cd586040 R08: 00007f84cd586040 R09: 0000000020000000 14:13:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000000040200000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:14 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xd00000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 872.927547][T11823] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 872.935590][T11823] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 [ 872.944581][T11833] loop4: detected capacity change from 0 to 6 [ 872.950937][T11832] loop3: detected capacity change from 0 to 17 [ 872.961436][T11834] loop2: detected capacity change from 0 to 8 14:13:14 executing program 5 (fault-call:0 fault-nth:50): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:14 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb", 0x1}, {0x0, 0x0, 0x600}], 0x8603, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 872.978840][T11834] FAT-fs (loop2): bogus number of directory entries (64) [ 872.985980][T11834] FAT-fs (loop2): Can't find a valid FAT filesystem [ 873.001539][T11854] loop0: detected capacity change from 0 to 24576 [ 873.024412][T11854] EXT4-fs (loop0): blocks per group (131072) and clusters per group (8192) inconsistent [ 873.036207][T11850] loop1: detected capacity change from 0 to 24576 [ 873.042763][T11834] loop2: detected capacity change from 0 to 8 [ 873.059538][T11850] EXT4-fs (loop1): bad geometry: first data block 3342592 is beyond end of filesystem (512) [ 873.070298][T11869] loop5: detected capacity change from 0 to 24576 [ 873.078316][T11834] FAT-fs (loop2): bogus number of directory entries (64) 14:13:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000000ffff7c0200000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000", 0x41}], 0x0, &(0x7f0000000300)=ANY=[]) 14:13:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f00000000003f000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x295, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 873.084133][T11867] loop4: detected capacity change from 0 to 6 [ 873.085428][T11834] FAT-fs (loop2): Can't find a valid FAT filesystem [ 873.094358][T11868] loop3: detected capacity change from 0 to 31 [ 873.108002][T11869] FAULT_INJECTION: forcing a failure. [ 873.108002][T11869] name failslab, interval 1, probability 0, space 0, times 0 [ 873.120670][T11869] CPU: 0 PID: 11869 Comm: syz-executor.5 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 873.130914][T11869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 873.141119][T11869] Call Trace: [ 873.144572][T11869] dump_stack+0x137/0x19d [ 873.149019][T11869] should_fail+0x23c/0x250 [ 873.153607][T11869] __should_failslab+0x81/0x90 [ 873.159103][T11869] ? __se_sys_mount+0x91/0x2e0 [ 873.163867][T11869] should_failslab+0x5/0x20 [ 873.168390][T11869] __kmalloc_track_caller+0x64/0x360 [ 873.173691][T11869] ? strnlen_user+0x137/0x1c0 [ 873.178476][T11869] strndup_user+0x73/0x120 14:13:14 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0xe00000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) [ 873.183055][T11869] __se_sys_mount+0x91/0x2e0 [ 873.187665][T11869] ? mntput+0x45/0x70 [ 873.191637][T11869] ? __fpregs_load_activate+0x103/0x1b0 [ 873.197295][T11869] __x64_sys_mount+0x63/0x70 [ 873.201882][T11869] do_syscall_64+0x34/0x50 [ 873.206378][T11869] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 873.212382][T11869] RIP: 0033:0x46797a [ 873.216939][T11869] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.236881][T11869] RSP: 002b:00007f84cd585fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 873.245574][T11869] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 873.254003][T11869] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f84cd586000 [ 873.262205][T11869] RBP: 00007f84cd586040 R08: 00007f84cd586040 R09: 0000000020000000 [ 873.270352][T11869] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 873.279270][T11869] R13: 0000000020000100 R14: 00007f84cd586000 R15: 0000000020000300 14:13:14 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x1100, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400108001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)) 14:13:14 executing program 5 (fault-call:0 fault-nth:51): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 873.318456][T11868] loop3: detected capacity change from 0 to 31 [ 873.352349][T11895] loop1: detected capacity change fr