6348fa14d49ed3dc9dcc5b120107dc168485899b1afcb43c5f1b2a263b10dbef8c10e03c1c70be7cf239cde92d311906b18aa125e261ee0f474034f72c8e56724d376de14e25357bb244e81baab1f697a2936ff45857faf218b8046758b9eb84a5ee6ff29934c96ff1641fa4c82de2e385021e7da75112f3addfc21eb761e9f3b8c89c210b3767678d0aa7d6bc489824a56c2a464df1b46035956d2e53e1c635584fdfe9d5c2c7f09ff4512ff4533fd2e8e972ea8ce94e3b420e7fc4080f998c1f5d45157175b46a7f47638f1f58ac21f34566fa973a22d1b5cd54277c88580073720ddf7df6d72472c25f39575d2e6408dc2455558afc9d693911f3112c838f3be1d9b950a72739205e3f927c2dd6ff755ea95ed2fc9a57f7779f3cacc291886f2a227acd1adf7e31ec8d6ebd7d57f0d1054a1396a94c17114b128c438205986aed773c981a60c448a929a07b6405b6476a055b09f1b3464034881a65d1bb801706ae15ee334dfcc6306a594308015755c05e3e13653841c8fc9680b80e6b3a5579f2c0ef5bc88c554d98571681aaee04a38eea5bda5cdeed7e8ac99e277b13f47ba0daac41656e40f233b738131f38400b7a21940163f69928f7194742ecebfc940a29fe87f45533a54aa5a8ed677098259c792a056f976e6b3dc2ea3afe2e05a2ac66cfce7d30f6781c47b6e9fa361ec0fbdb3f090e6a44bbfb680940dcf2aa8a7d5c8237ac2f6621f7098ffef6ffc71000f1555cf110920103274e819e3162304e03350caf156cb6cedc68d71ee00299c9d5f0ccd12b9ca9d6a5e50ad5bebf146521825ce1967f5458e75ebe4d7619e38760aa7c3c33aabbd2e41015b6790f318ed9e9ddde4112ab56891231f8301590a1b912a27f9d07f056957a2ef78d68460c7abed1d22a7b86e5b3c1c1151cc4f6afe522cd6b0fdc8a44c4e56cf3f8156294dd0f91460f23c58a358b94bf1da7646ff932a7337e2655598c6123a7b516affe03566d71655ab8cdcf372a2661fe1b11a18b118b9234f5c4020792e12049244697b0817cfc920631ea0b826f938a3ff8fa68843ea2d653a660298d1f5275febad19e0709ae6ea5dbffcb3913b5dc1d750a35c072ee2de5f5ff09297b165d0c35827719b770680580228feab38176c92ad54d57de64d2b0de4b64b0e78262006947ccd7f153edfbe33df3136eee8ae379cabc7efa5acf91477a03e24d8957f3ace807d1a56c81da4e4f01f7052bd7a89051d67425d5c8a1e7f34ba3ba576a481b7ed3f210b179956f1412d21fc882b259a313fae8f3759e132945c769700a3c23380f9391a3b8f62ab038eb234b622acd9ecec2e79643bbdff0073724c624458a5e3c709409be90beac94627afd8564ee11788eaf4a61e13985dd92648bdbf0dbf10d43add0efdd5cda83b270f5d3d81ea2620d605a6b2cdfc0018696640f3b0aa53bcdf27f950a0ade8348b56f5df0104ee301fd92d765bf2332a8151049d64773923a25a693688b9eec709a033be9855f87d6b115db95c87a5d7e08b934233ffaa3ba98c4ecfef895256ef6f6435deb9850db32460fe963ec7ed0061979084ffbf2589e607cc69ad7690ae204a968f4f234f8e2376d95018cc09038675c15bbc56e7589828c978e40da5a93cce1241e0c4ba51dbd5b503b441ee880deece7e3dbf005816847ce8571e7933d8363919cddb43bc73c6f8bea4ac5ef54327ce104a76cad13fa319a44f221ff773a66d60e9d00bc1d9bfa053628cb9bffe34381ef9cf34ab92ad147a50b56f2bf29728bd60ece68537a6b34a2324787aa966868b51e43a81c941ff5526b64b0a43dc87f244d4c7f4c18c4fe967c022b0ddc1f5c0376bc6477484ba524e64d690a132b6b87d2951ddc5aac576a8321dd90e337828135e0f4d3532c1d8fc3fccd1192e92d1d987ed26d7f28836f222244b16cf4fe3f89af5a89a0ebebd92f158285e236ee1275cc7546cc4662c593f0d4114f10deeb6c1bfc795a4cfdb791778421bf3086faf92d3cea6c335ad"}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001d80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001980)=ANY=[@ANYBLOB="ba01000015e902e73ab82083271a850455e66e48f8ab6340fbf34259671d74010000000000000021964771a5daf364daf34a7bc1bdf18c4ba9d5f8199775863f84c471d71975672ce82f20e1db1d41f552acacdf08752840baf9b3248f853c3a0866b8c8db05c01d17468f1c570200000000010000001c4f47acc100a4918dfce089dd08d527ffcb2f6588d51a8e89ad3e61a114bd7bd354865812a0283fc8eee46cb7fd999c5bed57fa62b96cf1e1ffd3fd462a0354b2269bffb6fd8ffa67563905911ac7934dcf1863f7c6cdb3674521bb7b878c88a057ed339f9310f7db2cad38146cdf9528d455511b70647dd7e8142f71bdfc69552f0883880ff0dccd51b95504d22279135b3d9486fefee05f71250da37fe9e11b238320bb3db6a2cbf6fc70aca58b97e76ed44000000000f3dfbfee8023f99be68e76782d479b9f7d26ddef0e6adae305b9aac8055180ccf555d429e58a7aba6df0291b88237fe41e711942095e8802e26a22675bcc54300094a1af5c7d574b4f04db9f71eddad711c00c24e90f8f90866300f81ca06d66f4b17915fef24a7a6b8e7c1e80d3b8dffff2c96c77a578875c793445ffb3ec7ca8696d288552e6008000008e4ceb77f51b14127fcc001cc3248744d462b43d48cba20ccc3d40be923594a7b65b737fb9983a45164b8f701996c7d1d0886f604d179149c2deb908000000e3006173372860f0c57226fba67d795b32fc319e249decc96657262da45daf55a12498f89cfc28b046840aa258d959a42ee6a36ca09b6f0ef02956062cd8c26ca528b6ad3c47b0115544563560be31189351c2dbb153b503b95d9a1c14d6b47c56c8f73ecb7a2fb30987e875ee8d3db8313c2d5d44c52572d1d26bef33e90bb9a4f37f52f4d6f329da7df5f4c9b3b56b40e7d91a84b639d42437fcd2f200dc2df0fdfe4c8354dce9d1d5565d70468ec03590129fd8e085124af8d0d77231b001d69c3ee47dc7473d35feb63a550254554ed34f8a9d1193cdd29151dbb497073d32dce253d3471845686f554727eaaa49c3c08e565beb8121056a6425bd11ec981056296f86f0b362cfaff3f6d1380d3b8781f4055dd2d2296ca388968eb1e1857ca2f9d21503e2afbe135ff6f1007335e654aab737fa30b53d5c1dfde1ff807812ae87330c2ddc7d87e693c0fee2f45d61b8ce1f79b1033ef81a5515a0edef3c4b46c0476714c6bafc2d2165022889715c84c87fe1244e944675c2edc8df00080000a2d1b0927bea43230000000000000000bfb78b363b73c3b98fdd90944f50f975fa0b97259177a3d9bdca2785271e", @ANYRES16, @ANYRESDEC=r4], 0x1d4}, 0x1, 0x0, 0x0, 0x4008000}, 0x2400c014) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000580)={{}, r3, 0x12, @unused=[0x9, 0x0, 0x7f, 0x20], @devid=r4}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000040)={{}, {@val={r4}, @max}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000600)={{}, 0x0, 0x0, @unused=[0x3, 0x3, 0x6240, 0x2], @devid=r4}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001040)={r4, "820336cbc9ca18bc7eebbd0853564a77"}) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f819bbe5ace602f1a6d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c3549b712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:34:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce000fff0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:34:53 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000940)="cfdfa470673694d7c360c82c3ef42752cf0dbe60f745b3d1967a6f3c195ee3aedfe002ae59805d838694465aac09a49a4e33d9f12f0d7e72e37485ff79bb7a4756df2640a40c5dcb67d9d7c040ba10f4fc9e7b119b52507af57437a80bf1cdf9cdee87be0d4a99af4e04ac19a623e2e5aa0e51cf379e11a2d076286e5e1aadb1835b67efbc370ab87ba70e1e5903269a9482b731c70d92d358720104912516fa90539cb7cee7fc14b33d23495a49a17accb346b82514e6ab5f23185afa90cf22002be219167ffba56a7f43a3ef38a963e638c8aed906517a37fb3d9e85ea84cb2ee41dd52dcff4624e673e031ca3db6afaabf1df412cf17b04b8b765765d3af4c5cbf03216eb5e44efd87916bbfe5d33a265987cd8fda12aac5424e7b6e7ac50870c147bf3a185d2af42b6e9276ef4beb53c991c7318d7fdec1d91d64cef9312532a6acacbcae3e4c285f280416f9625936941fc35954cd0b5126ec97e67d9e02bde20134578922da5b79578e0f62afb08e303baa1d8444cf30335f220769d4f51ad794b6e3b1e10a65a4c1df788b924eca93e92e0f4b080cbab5a6201ed6c3ef03c3fdb591f92c5ea024a0c597f59f8b82a79934d356fc9d89fce820bde5d686fb0caec3eeeea738bfd228c0a26de66bb983064084b3def7f5eae6cb965028ccf7b943cce874c7a5b1795beada2b4aaec677be4aa5aef5987e29b2b8fe882f62254ee4bf474e238afe1f9f835a0bf7c1846915e1d148330cea032bca65de42865e6b058ce862004c86282c14acef8518ed277022a09468a863acead44bf1295b1ae6e18c134577f39d8e18b3198ab9323176448d0187ec0f5779fcfebb5f6650437d9a933c96d10317e3eadbda5baa9edea3f1758f94929a814f3afd6c3a40adc0b925d3bff5ccae03a5ee2fcc411eb822b9fa959ecad01842b5ac5d872d0100312eae39e3dc01859a36b9b1d12e269dc6b4ddb2eaa9a873a21ab55fd277927e73fe986dee7e5bdcd85b974a5edc40877c17f028b4f90baeab36c80a6b8d762c12388ed9c1304b9978d7d0870dfff960e87ac5c4a615aa4ed5d1b26e4c39c45fe891f49cca76fa397ab2bf57430634eaa690c1360da20415bc83cf48904c2c0a8fb5fa8dd18b9eeaf114321f44fc0cb612e948a5e200158ff060008acce9a2736aba8a5d21e6c95f1c43eea511f2a0c41a38daf44b2b05c37f03d58e86b8d715f13497a342f5c6d996f8d5bce49e998cb9db4b1a6d4f319645665f5946af542b5026632b9decbf86b5efe1b1ecb825a467628057613fd48e87210abd18fd76416ecf56a733cd0708776ac9b356e976379450f1f79eb0e762ac76cea03f6f20e47fc7f9353c0d73f3fd09a8b4b2723820aebfa8a5f2334d8c10378d9ea433c16b6f10cee3eaa60361537d0630860dcc30b00b568e24c94d064f1ef7ef6dc1defd24e63067cdc2745a7376a75a63ebc546f771d6d7f3b704843652e37d4d299d2ff74554b024a4eab3f7e54471a676b7e59d96068f31b08384d5e7efd87f6dc9046f66a6311aa9b5d6f95c4aeaa6179878fb1905300c277f4788df0cdd2d3164c6030ef822427ea5f3e30e973f8a8e7a5b7f072678eb75f2b0ecb2b34b8b2714e7f7cf58238c6d8bc7ce718afc48dbb84142d05903cff685133390c42db31613408b48ee93ace923621c9fd41437d23fa7c7a34c683f2fdc6e7274697512bd49b9b52ee42e9e6fb40f468752a8fbea0e0f88714d88c9dea80533380714ff031008e9d48358abbee15121fe5749dfb2fbe41559a65daebabe4626ffda9d6d970e0d6f5e354a6a364ed73d08d0d91d846fa5b202991b017646166528d679c2065a39458fefc5564f93ecdfcdad42499db11937f77e19a9205395fabfefbfff1c92ca1e1c7fc7cf8d49fc6ca66efdc868dea17f253b5c56c4f88ba8abba97147a67810affa5dfa6f660f9fa48265fd3622c0b56d444f5c446846277a257278ba6990a116994f7f48a60f3d52ed2084797dd37d140653a33a1fd8c27cf0c47e5eb5f130bcd2d8afa8955a1671245d62053da2d79664d39cea2ac9265f22e6acd0ee820ec6f569f5df5f9636758214e13bc39f384f049517dcff60965a5d0994850055e25ebacdb6579655de514e9f3dd14a7776b6a3be488704d68723cab604756046ab37c00ea2ab5c335b0e0b32186d3ce926e6145c3fb51a8fb5dfba900383e68df6dab37d528857a33201ded88fbfa3708e8ee25e1f893cbb4146d6c41861af9102a06db58bfbc91a70300f075cdcb5d42c564aa94910c83991b6495cccf9765f397af8d091ecb1f6bf24ff62e72e9c15f02e1c79986bb7aa74cddb5737970821350bb84699abefa7c47cc13fd9e338c269017f8d6b8881f36ebc4f7417600ac3c9e87718fd3e978e6d872b9a25f8e544a2c00fd39b269c0de7063ef73178519ed3", 0x6c1}], 0x0, 0x0) 05:34:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000007a00000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:53 executing program 2: clock_gettime(0x7, &(0x7f0000000200)) 05:34:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000fb02b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:34:53 executing program 0: socketpair$unix(0x1, 0xa4892c629e550780, 0x0, 0x0) 05:34:53 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x35, &(0x7f00000000c0)={0x200000000000001}, 0x8) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb8, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0xf0f4, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000400)={{}, r3, 0x0, @inherit={0x88, &(0x7f0000001500)=ANY=[@ANYBLOB="0100000000000000080000000000000040000000000000001a0700000000000002000000000000000a891e06fbfc2973508c62e27a478204000000000000d20a0000000008000000000000010000000000cc070000000080000600000000000000040000001b00000005000000000000000600000005000000018000000000000000000000000000324baeeed1fdae4b018898751a3a619f8d2cb4d73c0947094bec75b3055dac80d4e62b8c6c6d426acf822ac0de980bf00d66df76e7a9ef35e6f19294"]}, @name="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"}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000100)={{r1}, r3, 0xc, @inherit={0x60, &(0x7f0000001840)=ANY=[@ANYBLOB="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"]}, @name="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"}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001d80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001980)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESDEC=r4], 0x1d4}, 0x1, 0x0, 0x0, 0x4008000}, 0x2400c014) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000580)={{}, 0x0, 0x0, @unused=[0x9, 0x0, 0x7f, 0x20], @devid=r4}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000040)={{}, {@val={r4}, @max}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000600)={{}, 0x0, 0x0, @unused=[0x3, 0x3, 0x6240, 0x2], @devid=r4}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001040)={r4, "820336cbc9ca18bc7eebbd0853564a77"}) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f819bbe5ace602f1a6d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c3549b712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) [ 1472.826214][T31282] loop1: detected capacity change from 0 to 264192 05:34:53 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x21) [ 1472.866696][T31288] loop3: detected capacity change from 0 to 512 [ 1472.883196][T31282] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1472.894000][T31288] EXT4-fs (loop3): Invalid log block size: 2046820352 05:34:53 executing program 2: socketpair(0x25, 0x3, 0x0, &(0x7f0000000000)) 05:34:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00feff0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:34:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000003b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1472.926148][T31302] loop4: detected capacity change from 0 to 184 [ 1472.957363][T31288] loop3: detected capacity change from 0 to 512 [ 1472.963601][T31288] EXT4-fs (loop3): Invalid log block size: 2046820352 05:34:53 executing program 0: mq_getsetattr(0xffffffffffffffff, &(0x7f0000000080)={0x1}, &(0x7f00000000c0)) 05:34:53 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000c00)="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", 0x1000}], 0x0, 0x0) 05:34:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000003000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1473.021501][T31324] loop1: detected capacity change from 0 to 264192 [ 1473.024588][T31324] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:34:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000402000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:53 executing program 5: syz_io_uring_setup(0x7e5, &(0x7f00000001c0)={0x0, 0x0, 0x2, 0x0, 0x136}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) 05:34:53 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000140)="13", 0x1, 0x6f0d9eed}, {&(0x7f0000000200)="a5", 0x1}, {0x0}], 0x0, 0x0) 05:34:53 executing program 5: sched_getparam(0x0, &(0x7f0000000240)) [ 1473.095446][T31340] loop4: detected capacity change from 0 to 184 05:34:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0xfff9}]}) 05:34:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000007603b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:34:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c000000070601021f0000000000000002000007080006400000000708000640fffff051080006400000000008000640000000050500010007"], 0x3c}}, 0x0) [ 1473.152472][T31353] loop3: detected capacity change from 0 to 512 [ 1473.162862][T31354] loop1: detected capacity change from 0 to 264192 [ 1473.179642][T31353] EXT4-fs (loop3): Invalid log block size: 67108864 05:34:53 executing program 2: io_setup(0x8, &(0x7f0000000380)=0x0) r1 = openat$null(0xffffff9c, &(0x7f00000003c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x0, r1, 0x0, 0xffffff23}]) io_pgetevents(r0, 0x2, 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f00000000c0)={0x0, 0x989680}, 0x0) [ 1473.207932][T31354] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1473.247269][T31353] loop3: detected capacity change from 0 to 512 05:34:53 executing program 0: mq_open(&(0x7f0000000000)=']\x00', 0x40, 0x0, &(0x7f0000000040)={0xffffffc0, 0x1f, 0x800000, 0x4}) 05:34:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 05:34:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000005000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:34:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000204b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1473.256571][T31353] EXT4-fs (loop3): Invalid log block size: 67108864 [ 1473.269893][T31375] loop4: detected capacity change from 0 to 184 05:34:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000003000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001840)={&(0x7f0000000700)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0}, 0x0) 05:34:53 executing program 5: r0 = socket(0x10, 0x800000000080002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$netlink(r0, &(0x7f0000000380)={&(0x7f00000001c0)=@kern={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0}, 0x0) 05:34:53 executing program 2: openat$vcs(0xffffff9c, &(0x7f0000000180), 0xa402, 0x0) [ 1473.344529][T31394] loop1: detected capacity change from 0 to 264192 [ 1473.383283][T31394] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:34:53 executing program 2: syz_read_part_table(0xfffffffa, 0x0, 0x0) 05:34:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000006000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:34:53 executing program 0: io_setup(0xcf1c, &(0x7f0000000000)) 05:34:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x21) [ 1473.405919][T31407] loop4: detected capacity change from 0 to 184 [ 1473.421380][T31408] loop3: detected capacity change from 0 to 512 05:34:53 executing program 2: r0 = socket(0x2, 0x3, 0xbb) sendmmsg$unix(r0, &(0x7f0000003d40)=[{&(0x7f0000001500)=@abs, 0x6e, 0x0}], 0x1, 0x0) 05:34:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000604b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1473.458338][T31408] EXT4-fs (loop3): fragment/cluster size (8192) != block size (1024) [ 1473.489861][T31423] loop1: detected capacity change from 0 to 264192 05:34:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000007000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:34:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @remote}, 0xc) [ 1473.499383][T31423] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1473.527594][T31431] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! [ 1473.531790][T31408] loop3: detected capacity change from 0 to 512 [ 1473.551657][T31441] loop4: detected capacity change from 0 to 184 05:34:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000204000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000200), 0x4) 05:34:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000005b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1473.560025][T31408] EXT4-fs (loop3): fragment/cluster size (8192) != block size (1024) 05:34:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_MM_AUXV(0x53564d41, 0xc, 0x0, 0x170) 05:34:54 executing program 2: set_mempolicy(0x0, &(0x7f0000000580), 0x0) 05:34:54 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) [ 1473.603567][T31447] loop1: detected capacity change from 0 to 264192 [ 1473.625121][T31447] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:34:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000009000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:34:54 executing program 0: syz_read_part_table(0x0, 0x5, &(0x7f0000002380)=[{0x0}, {&(0x7f0000000080), 0x0, 0x2}, {&(0x7f00000000c0)="e5bd2b831bf8a8bcf25bf8e2f62031", 0xf, 0xa4c0}, {&(0x7f0000000100)="3b93e60e6b6129ffa61ffde0ccb35ae18c8029b98bfa42e05dfb60f7ea6ee8305c72109bf5984edeb00885d3200d45affa58d34e9aed7baed319e4f636fe9933969199749756de25b6c500779e56c3e9ec03bb6983dc81c60c690ff4f48e0c3f54c8b973be462f3dc3f3330078c773215bd5855195b2aa62df00b290886fb19fd6a4b2b822ff60ef1825ceb397dea30ea46e04c9955b0309a071", 0x9a, 0x1}, {&(0x7f0000002440)="4b5d73f4c41011b613fd2c4385837c06b4047f8a191609fceb2b3a1f9ba7de9c5da6983a775f182110d8d5aa7f0d1be44c511949ef3609e471ae515f3ef83f1ecb2ab9e79410bc0be5f236eb465f4a3db409fcf0d953074585ed7b397465cc45e3d64ef3a42b0c31d938d7a73b82c6eeb1c06c36bab17786745a534afb5846664b019f09130b6c414f16528580edee59cff8cbead3ee3393a4ec5ce0cb9c608d7338b5c3c242b597b9f9f0cc62963bfc2ad2560b75b50d4193ad093f69b3dc25a0d4fa2eff809fcedba3ecf9fcd30657e8c95c040cacc979ebf028eaed07c08641de", 0xe2, 0xfffffffffffffff8}]) 05:34:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f0000000140)=@abs={0x8}, 0x8, 0x0}, 0x20084) [ 1473.676338][T31460] loop3: detected capacity change from 0 to 512 [ 1473.677627][T31467] loop4: detected capacity change from 0 to 184 [ 1473.693260][T31460] EXT4-fs (loop3): Invalid log block size: 33554432 05:34:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000006b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:34:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000240)=0x5d5, 0x4) 05:34:54 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000002300)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, &(0x7f00000023c0)={0x0, 0x989680}) [ 1473.762803][T31478] loop1: detected capacity change from 0 to 264192 [ 1473.773378][T31460] loop3: detected capacity change from 0 to 512 [ 1473.788701][T31488] loop4: detected capacity change from 0 to 184 [ 1473.797592][T31460] EXT4-fs (loop3): Invalid log block size: 33554432 [ 1473.805357][T31478] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:34:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000604000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:54 executing program 0: r0 = socket$inet(0x2, 0x3, 0x40) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 05:34:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000406b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:34:54 executing program 5: open$dir(&(0x7f0000000100)='./file0\x00', 0xb86c0, 0x0) 05:34:54 executing program 0: r0 = socket(0x2, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000140)=[{&(0x7f0000000380)="72a8c6f8d43601e949bb23c23c9081bf21b84d0b2a5347303f79e00594cddf5bf95927386bcba13b36988ac9c76b6fadaf58e4f3d248035999456502ea3bf5487a597003dd0608e6e41ceb7fe27f5eece57ea4fb7741e1044374454bd4fdb3303daa111b642b5ed09c2c63266a3e2ce73e8f115da628f68c590aebac9baa92ed5d3aaf5572986b141d7dade07b51267ecf37330880ccb7000000", 0x9a}], 0x100000000000019d, &(0x7f0000000240)=[@cred, @cred, @rights, @cred, @rights, @rights, @cred, @cred], 0xf8}, 0x0) 05:34:54 executing program 5: mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000a3d000/0x3000)=nil, 0x3000, 0x1) mlock(&(0x7f0000a3e000/0x2000)=nil, 0x2000) 05:34:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000a000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1473.918819][T31519] loop3: detected capacity change from 0 to 512 [ 1473.928815][T31519] EXT4-fs (loop3): Invalid log block size: 100663296 [ 1473.935600][T31518] loop4: detected capacity change from 0 to 184 05:34:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000007b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:34:54 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_int(r0, 0x29, 0x12, 0x0, 0x0) 05:34:54 executing program 0: mlock(&(0x7f0000800000/0x800000)=nil, 0x800000) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000b8f000/0x2000)=nil, 0x2000, 0x0) [ 1473.966876][T31534] loop1: detected capacity change from 0 to 264192 [ 1473.977576][T31534] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1474.000489][T31519] loop3: detected capacity change from 0 to 512 [ 1474.010617][T31519] EXT4-fs (loop3): Invalid log block size: 100663296 05:34:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) [ 1474.105253][T31557] loop4: detected capacity change from 0 to 184 05:34:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000001004000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:55 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000), 0x8) 05:34:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000b000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:34:55 executing program 5: semget$private(0x0, 0xc025a0aed2360094, 0x0) 05:34:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x17, &(0x7f0000000000)="64e13100", 0x4) 05:34:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000009b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:34:55 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r0, 0x0, 0x56) write$9p(r0, &(0x7f0000000200)="af", 0x1) 05:34:55 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4800000002060506000000000000000000000000050004000000000005000100060004000d000300686173683a6e6574000000000900020073797a3000000000050005000a"], 0x48}}, 0x0) [ 1474.689528][T31576] loop1: detected capacity change from 0 to 264192 [ 1474.698668][T31576] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1474.710691][T31577] loop4: detected capacity change from 0 to 184 [ 1474.719614][T31579] loop3: detected capacity change from 0 to 512 05:34:55 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') 05:34:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000ab8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1474.735953][T31579] EXT4-fs (loop3): Invalid log block size: 268435456 05:34:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000c000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:34:55 executing program 0: socket(0x11, 0x0, 0x32) [ 1474.780087][T31579] loop3: detected capacity change from 0 to 512 [ 1474.788720][T31579] EXT4-fs (loop3): Invalid log block size: 268435456 05:34:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000005000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:55 executing program 2: syz_open_dev$vcsu(&(0x7f0000000000), 0xffffffff, 0x40) 05:34:55 executing program 5: waitid(0x0, 0x0, &(0x7f0000000080), 0x4, 0x0) 05:34:55 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) fcntl$lock(r2, 0x7, &(0x7f0000000000)={0x1, 0x1, 0x100, 0x0, r1}) open(&(0x7f0000000080)='./bus\x00', 0x402e00, 0x1ba) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:34:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000d000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1474.850835][T31617] loop1: detected capacity change from 0 to 264192 [ 1474.861625][T31616] loop4: detected capacity change from 0 to 184 [ 1474.866508][T31617] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:34:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000bb8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1474.942680][T31635] loop3: detected capacity change from 0 to 512 [ 1474.953414][T31635] EXT4-fs (loop3): fragment/cluster size (32768) != block size (1024) 05:34:55 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r6, 0xc400941b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) r8 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r8, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_BALANCE_V2(r6, 0xc4009420, &(0x7f0000000500)={0x6, 0x4, {0x3, @struct={0x0, 0x5}, 0x0, 0x7, 0x6, 0x10001, 0x7, 0x7bc2, 0x0, @struct={0x2, 0x2}, 0x5, 0x1, [0x4, 0x7, 0xfffffffffffffff8, 0x0, 0x4, 0x40c]}, {0x4a, @usage=0x2, r7, 0x3, 0x800, 0x0, 0x8, 0x81, 0x428, @struct={0x1, 0x20}, 0x4, 0x2, [0x100000001, 0x1, 0x5, 0x1, 0x8000, 0x9]}, {0x7, @usage=0xffffffff, r9, 0x2, 0x0, 0x0, 0x4, 0x1f, 0x90, @usage=0x102, 0xe0000000, 0x6, [0x8000, 0x9d86, 0x2, 0xf4e, 0x1, 0x3]}, {0x0, 0x9adb, 0x5f2}}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000780)={r9, "23595f67225d198e8ca274788b2c7197"}) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:34:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000006000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:55 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="6cdf2da7a0cc4ced7a67d014679d5d380d796ae46c50f3ebc0667cbae44474067f95147703384a35ba3f48cfceea6175cbbc0f384345ccca67680d403d2c9b", 0x3f, 0x7}, {&(0x7f00000002c0)="9e0b92da122c3e41e4e0c701c5573c6b1309901fbb8877a859033d781409fd7c1ba7f1dca3668f88836a6e7d94753817a6051b03a17a633c9921c2c211122b2642c31097351e5f331dec7516f5a9d576594952d89caaec9900c62a07d61528fd0baa4e82aaaf8e61142e31e3b0bc1fdbe0b987cf60666efb55c640e09f7bed748a90cf51cfe9aabc44230a0d9b82", 0x8e, 0x8}, {&(0x7f0000000180)="16cda6f02a98d9586ad8b632aa70ae391bde461902e167976c8387444ec3051dded6fd74700ffff503209426a9279aaaa20ebc2e9ccc027f59c4", 0x3a, 0x3e}], 0x800000, &(0x7f0000000380)={[{}], [{@obj_role={'obj_role', 0x3d, '%'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@dont_hash}]}) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x10) [ 1474.984710][T31636] loop1: detected capacity change from 0 to 264192 [ 1474.993799][T31636] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:34:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000e000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1475.034169][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1475.067510][T31653] loop4: detected capacity change from 0 to 184 [ 1475.070995][T31658] nfs: Unknown parameter 'obj_role' 05:34:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000cb8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1475.083688][T31661] loop3: detected capacity change from 0 to 512 [ 1475.094991][T31661] EXT4-fs (loop3): fragment/cluster size (65536) != block size (1024) [ 1475.136294][T31672] loop1: detected capacity change from 0 to 264192 [ 1475.150579][T31672] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1475.170681][T31661] loop3: detected capacity change from 0 to 512 05:34:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000406000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000020f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1475.220044][T31661] EXT4-fs (loop3): fragment/cluster size (65536) != block size (1024) [ 1475.234168][T31684] loop4: detected capacity change from 0 to 184 05:34:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000db8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1475.291834][T31694] loop1: detected capacity change from 0 to 264192 [ 1475.303911][T31694] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:34:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000030f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1475.336048][T31698] loop3: detected capacity change from 0 to 512 [ 1475.355066][T31703] loop4: detected capacity change from 0 to 184 [ 1475.364864][T31698] EXT4-fs (loop3): Invalid log block size: 67108864 [ 1475.429435][T31712] loop1: detected capacity change from 0 to 264192 [ 1475.455450][T31712] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1475.471864][T31698] loop3: detected capacity change from 0 to 512 [ 1475.479592][T31698] EXT4-fs (loop3): Invalid log block size: 67108864 05:34:56 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x12) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) 05:34:56 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000fb8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:34:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000007000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1475.929465][T31729] loop3: detected capacity change from 0 to 512 [ 1475.942072][T31730] loop4: detected capacity change from 0 to 184 [ 1475.964143][T31729] EXT4-fs (loop3): fragment/cluster size (131072) != block size (1024) 05:34:56 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) sched_setattr(r1, &(0x7f0000000400)={0x38, 0x2, 0x0, 0x1000, 0x4, 0x5e81, 0x7, 0x6, 0xb5, 0xdd5}, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) execve(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000300)=[&(0x7f0000000140)='gcm(aes)\x00', &(0x7f0000000180)='\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00', &(0x7f00000002c0)='gcm(aes)\x00'], &(0x7f00000003c0)=[&(0x7f0000000340)='$.}\x83.*\x00', &(0x7f0000000380)='\x00']) sendfile(r0, r0, 0x0, 0x8080fffffffe) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000440)={0x1e0, 0x0, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x1cc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "ef487830952716444c1f96d4b951f3f25c777fde"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ID={0x67, 0x3, "43d7779eee03e34da3ade2ede59134215c284db73be3ec6c9584ec161ba45b98ddb293137c3ca2ed2891bb592d87b5965aca7683f2d96d1e60405192fe85bd6af297cf7e6e338245afceaf892fd7837e3a03dadac82111bae1a8ddf5365820423e7d78"}, @TIPC_NLA_NODE_ID={0x74, 0x3, "0833c36979fdde1d82d9c54ca6b2cca6c144840f9a234c283a984f1e0a0886c06deb657e926c28afc15faf27d34f44904abfc65528dca8f035910b2192b047f9a19d580a5cf5e1d014ca2a87bcb780462af8cbb7a4f1508eefb4617c9f68119bc6ef9effc925aaf69593bf6ad3a035a3"}, @TIPC_NLA_NODE_ID={0x40, 0x3, "bcf45540c6407eee6231cf72df2304f66858f19c6616a38e85de68cdc48280da617ff64e5edd99ac837c4085f73bdfa7f9a566d7b9383e2d79d2f341"}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "ced6f261169e2450bc7d33850b79d8681c29e85ffd071cf30d612aa93209c1f9624d15"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd4d2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x84}, 0x20000000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000640)='./bus\x00', 0x40, 0x1) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) 05:34:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000040f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1476.087605][T31729] loop3: detected capacity change from 0 to 512 [ 1476.101028][T31729] EXT4-fs (loop3): fragment/cluster size (131072) != block size (1024) [ 1476.119786][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1476.157575][T31749] loop1: detected capacity change from 0 to 264192 [ 1476.201614][T31749] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:34:56 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="6cdf2da7a0cc4ced7a67d014679d5d380d796ae46c50f3ebc0667cbae44474067f95147703384a35ba3f48cfceea6175cbbc0f384345ccca67680d403d2c9b", 0x3f, 0x7}, {&(0x7f00000002c0)="9e0b92da122c3e41e4e0c701c5573c6b1309901fbb8877a859033d781409fd7c1ba7f1dca3668f88836a6e7d94753817a6051b03a17a633c9921c2c211122b2642c31097351e5f331dec7516f5a9d576594952d89caaec9900c62a07d61528fd0baa4e82aaaf8e61142e31e3b0bc1fdbe0b987cf60666efb55c640e09f7bed748a90cf51cfe9aabc44230a0d9b82", 0x8e, 0x8}, {&(0x7f0000000180)="16cda6f02a98d9586ad8b632aa70ae391bde461902e167976c8387444ec3051dded6fd74700ffff503209426a9279aaaa20ebc2e9ccc027f59c4", 0x3a, 0x3e}], 0x800000, &(0x7f0000000380)={[{}], [{@obj_role={'obj_role', 0x3d, '%'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@dont_hash}]}) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x10) 05:34:56 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000002010b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:34:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000003407000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000050f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1476.302231][T31764] loop3: detected capacity change from 0 to 512 [ 1476.310680][T31764] EXT4-fs (loop3): Invalid log block size: 872415232 [ 1476.317818][T31765] loop4: detected capacity change from 0 to 184 05:34:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000009000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:56 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000011b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1476.397146][T31777] loop1: detected capacity change from 0 to 264192 [ 1476.410130][T31779] nfs: Unknown parameter 'obj_role' [ 1476.416033][T31777] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1476.426991][T31783] loop3: detected capacity change from 0 to 512 05:34:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000000a000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1476.440955][T31783] EXT4-fs (loop3): fragment/cluster size (524288) != block size (1024) [ 1476.444499][T31791] loop4: detected capacity change from 0 to 184 [ 1476.525561][T31805] loop3: detected capacity change from 0 to 512 [ 1476.545067][T31805] EXT4-fs (loop3): fragment/cluster size (1048576) != block size (1024) [ 1476.597062][T31805] loop3: detected capacity change from 0 to 512 [ 1476.612822][T31805] EXT4-fs (loop3): fragment/cluster size (1048576) != block size (1024) 05:34:57 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000114b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:34:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000060f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:34:57 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) readv(r3, &(0x7f0000000140)=[{&(0x7f0000000080)=""/149, 0x95}, {&(0x7f00000002c0)=""/250, 0xfa}, {&(0x7f00000003c0)=""/171, 0xab}, {&(0x7f0000000480)=""/142, 0x8e}, {&(0x7f0000000000)=""/26, 0x1a}, {&(0x7f0000000540)=""/154, 0x9a}], 0x6) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) [ 1476.951289][T31820] loop1: detected capacity change from 0 to 264192 [ 1476.959841][T31820] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1476.967913][T31822] loop4: detected capacity change from 0 to 184 [ 1477.140338][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:34:57 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) sched_setattr(r1, &(0x7f0000000400)={0x38, 0x2, 0x0, 0x1000, 0x4, 0x5e81, 0x7, 0x6, 0xb5, 0xdd5}, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) execve(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000300)=[&(0x7f0000000140)='gcm(aes)\x00', &(0x7f0000000180)='\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00', &(0x7f00000002c0)='gcm(aes)\x00'], &(0x7f00000003c0)=[&(0x7f0000000340)='$.}\x83.*\x00', &(0x7f0000000380)='\x00']) sendfile(r0, r0, 0x0, 0x8080fffffffe) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000440)={0x1e0, 0x0, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x1cc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "ef487830952716444c1f96d4b951f3f25c777fde"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ID={0x67, 0x3, "43d7779eee03e34da3ade2ede59134215c284db73be3ec6c9584ec161ba45b98ddb293137c3ca2ed2891bb592d87b5965aca7683f2d96d1e60405192fe85bd6af297cf7e6e338245afceaf892fd7837e3a03dadac82111bae1a8ddf5365820423e7d78"}, @TIPC_NLA_NODE_ID={0x74, 0x3, "0833c36979fdde1d82d9c54ca6b2cca6c144840f9a234c283a984f1e0a0886c06deb657e926c28afc15faf27d34f44904abfc65528dca8f035910b2192b047f9a19d580a5cf5e1d014ca2a87bcb780462af8cbb7a4f1508eefb4617c9f68119bc6ef9effc925aaf69593bf6ad3a035a3"}, @TIPC_NLA_NODE_ID={0x40, 0x3, "bcf45540c6407eee6231cf72df2304f66858f19c6616a38e85de68cdc48280da617ff64e5edd99ac837c4085f73bdfa7f9a566d7b9383e2d79d2f341"}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "ced6f261169e2450bc7d33850b79d8681c29e85ffd071cf30d612aa93209c1f9624d15"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd4d2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x84}, 0x20000000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000640)='./bus\x00', 0x40, 0x1) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) 05:34:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000000b000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1477.258536][T31839] loop3: detected capacity change from 0 to 512 [ 1477.271844][T31839] EXT4-fs (loop3): fragment/cluster size (2097152) != block size (1024) 05:34:57 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="6cdf2da7a0cc4ced7a67d014679d5d380d796ae46c50f3ebc0667cbae44474067f95147703384a35ba3f48cfceea6175cbbc0f384345ccca67680d403d2c9b", 0x3f, 0x7}, {&(0x7f00000002c0)="9e0b92da122c3e41e4e0c701c5573c6b1309901fbb8877a859033d781409fd7c1ba7f1dca3668f88836a6e7d94753817a6051b03a17a633c9921c2c211122b2642c31097351e5f331dec7516f5a9d576594952d89caaec9900c62a07d61528fd0baa4e82aaaf8e61142e31e3b0bc1fdbe0b987cf60666efb55c640e09f7bed748a90cf51cfe9aabc44230a0d9b82", 0x8e, 0x8}, {&(0x7f0000000180)="16cda6f02a98d9586ad8b632aa70ae391bde461902e167976c8387444ec3051dded6fd74700ffff503209426a9279aaaa20ebc2e9ccc027f59c4", 0x3a, 0x3e}], 0x800000, &(0x7f0000000380)={[{}], [{@obj_role={'obj_role', 0x3d, '%'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@dont_hash}]}) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x10) 05:34:57 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000018b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:34:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000070f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1477.334743][T31839] loop3: detected capacity change from 0 to 512 [ 1477.358666][T31839] EXT4-fs (loop3): fragment/cluster size (2097152) != block size (1024) 05:34:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000000c000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1477.405485][T31853] loop4: detected capacity change from 0 to 184 [ 1477.409213][T31852] loop1: detected capacity change from 0 to 264192 05:34:57 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000019b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1477.460328][T31856] nfs: Unknown parameter 'obj_role' [ 1477.471951][T31852] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1477.499718][T31872] loop3: detected capacity change from 0 to 512 05:34:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000020b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1477.515455][T31876] loop4: detected capacity change from 0 to 184 [ 1477.567662][T31872] EXT4-fs (loop3): fragment/cluster size (4194304) != block size (1024) 05:34:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000000d000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000080f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:34:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000000e000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1477.628617][T31872] loop3: detected capacity change from 0 to 512 [ 1477.639784][T31892] loop4: detected capacity change from 0 to 184 [ 1477.647435][T31872] EXT4-fs (loop3): fragment/cluster size (4194304) != block size (1024) [ 1477.765244][T31907] loop1: detected capacity change from 0 to 264192 [ 1477.774130][T31907] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:34:58 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) readv(r3, &(0x7f0000000140)=[{&(0x7f0000000080)=""/149, 0x95}, {&(0x7f00000002c0)=""/250, 0xfa}, {&(0x7f00000003c0)=""/171, 0xab}, {&(0x7f0000000480)=""/142, 0x8e}, {&(0x7f0000000000)=""/26, 0x1a}, {&(0x7f0000000540)=""/154, 0x9a}], 0x6) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) [ 1478.150470][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:34:58 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) sched_setattr(r1, &(0x7f0000000400)={0x38, 0x2, 0x0, 0x1000, 0x4, 0x5e81, 0x7, 0x6, 0xb5, 0xdd5}, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) execve(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000300)=[&(0x7f0000000140)='gcm(aes)\x00', &(0x7f0000000180)='\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00', &(0x7f00000002c0)='gcm(aes)\x00'], &(0x7f00000003c0)=[&(0x7f0000000340)='$.}\x83.*\x00', &(0x7f0000000380)='\x00']) sendfile(r0, r0, 0x0, 0x8080fffffffe) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000440)={0x1e0, 0x0, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x1cc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "ef487830952716444c1f96d4b951f3f25c777fde"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ID={0x67, 0x3, "43d7779eee03e34da3ade2ede59134215c284db73be3ec6c9584ec161ba45b98ddb293137c3ca2ed2891bb592d87b5965aca7683f2d96d1e60405192fe85bd6af297cf7e6e338245afceaf892fd7837e3a03dadac82111bae1a8ddf5365820423e7d78"}, @TIPC_NLA_NODE_ID={0x74, 0x3, "0833c36979fdde1d82d9c54ca6b2cca6c144840f9a234c283a984f1e0a0886c06deb657e926c28afc15faf27d34f44904abfc65528dca8f035910b2192b047f9a19d580a5cf5e1d014ca2a87bcb780462af8cbb7a4f1508eefb4617c9f68119bc6ef9effc925aaf69593bf6ad3a035a3"}, @TIPC_NLA_NODE_ID={0x40, 0x3, "bcf45540c6407eee6231cf72df2304f66858f19c6616a38e85de68cdc48280da617ff64e5edd99ac837c4085f73bdfa7f9a566d7b9383e2d79d2f341"}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "ced6f261169e2450bc7d33850b79d8681c29e85ffd071cf30d612aa93209c1f9624d15"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd4d2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x84}, 0x20000000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000640)='./bus\x00', 0x40, 0x1) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) 05:34:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000000f000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1478.269640][T31924] loop3: detected capacity change from 0 to 512 [ 1478.288703][T31924] EXT4-fs (loop3): fragment/cluster size (33554432) != block size (1024) [ 1478.352220][T31924] loop3: detected capacity change from 0 to 512 [ 1478.364393][T31924] EXT4-fs (loop3): fragment/cluster size (33554432) != block size (1024) 05:34:58 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) readv(r3, &(0x7f0000000140)=[{&(0x7f0000000080)=""/149, 0x95}, {&(0x7f00000002c0)=""/250, 0xfa}, {&(0x7f00000003c0)=""/171, 0xab}, {&(0x7f0000000480)=""/142, 0x8e}, {&(0x7f0000000000)=""/26, 0x1a}, {&(0x7f0000000540)=""/154, 0x9a}], 0x6) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:34:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000001020b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:34:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000090f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:34:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000410000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000022b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1478.462911][T31941] loop4: detected capacity change from 0 to 184 05:34:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000a0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1478.506664][T31942] loop1: detected capacity change from 0 to 264192 [ 1478.512885][T31946] loop3: detected capacity change from 0 to 512 [ 1478.519915][T31942] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1478.545443][T31946] EXT4-fs (loop3): Invalid log block size: 67108864 [ 1478.575374][T31961] loop4: detected capacity change from 0 to 184 [ 1478.597475][T31946] loop3: detected capacity change from 0 to 512 [ 1478.605025][T31969] loop1: detected capacity change from 0 to 264192 [ 1478.607823][T31946] EXT4-fs (loop3): Invalid log block size: 67108864 05:34:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000003fb8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1478.616702][T31969] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:34:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000b0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:34:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000002010000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1478.718339][T31981] loop4: detected capacity change from 0 to 184 [ 1478.765926][T31992] loop3: detected capacity change from 0 to 512 [ 1478.774545][T31988] loop1: detected capacity change from 0 to 264192 [ 1478.781463][T31992] EXT4-fs (loop3): Invalid log block size: 536870912 [ 1478.819823][T31988] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:34:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = mq_open(&(0x7f0000000000)='\x00', 0x40, 0x4, &(0x7f0000000080)={0x9, 0x3ff, 0x1, 0xfff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x12, r4, 0x5e328000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) [ 1479.127505][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:34:59 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREADLINK(r5, &(0x7f0000000080)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) ftruncate(r4, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r4, 0x8, 0xee9, 0x0, 0x5}) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) getdents(r0, &(0x7f0000000380)=""/202, 0xca) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x21, 0x37, 0x1, {0x1, 0x2, 0x5, r1, 0x3, ',}$'}}, 0x21) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) 05:34:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000040b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1479.269167][T32011] loop4: detected capacity change from 0 to 184 05:34:59 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r4 = openat(r0, &(0x7f0000000000)='./bus\x00', 0x2000, 0x10) sendto$inet6(r4, &(0x7f0000000780)="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", 0x1000, 0x20000001, &(0x7f0000000080)={0xa, 0x4e20, 0xecb7, @local, 0x84}, 0x1c) listen(r3, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:34:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000011000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:34:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000c0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:34:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000376b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1479.449078][T32023] loop3: detected capacity change from 0 to 512 [ 1479.456339][T32023] EXT4-fs (loop3): fragment/cluster size (134217728) != block size (1024) [ 1479.506138][T32023] loop3: detected capacity change from 0 to 512 [ 1479.513702][T32023] EXT4-fs (loop3): fragment/cluster size (134217728) != block size (1024) [ 1479.514445][T32026] loop1: detected capacity change from 0 to 264192 [ 1479.522619][T32031] loop4: detected capacity change from 0 to 184 05:35:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000012000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1479.590744][T32026] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000089b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1479.642316][T32050] loop3: detected capacity change from 0 to 512 [ 1479.652352][T32050] EXT4-fs (loop3): fragment/cluster size (268435456) != block size (1024) 05:35:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000014000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000d0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1479.731006][T32061] loop4: detected capacity change from 0 to 184 [ 1479.742770][T32066] loop3: detected capacity change from 0 to 512 05:35:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000002eab8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1479.780238][T32066] EXT4-fs (loop3): fragment/cluster size (1073741824) != block size (1024) [ 1479.802468][T32073] loop1: detected capacity change from 0 to 264192 [ 1479.846776][T32073] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1479.876645][T32078] loop4: detected capacity change from 0 to 184 [ 1479.916676][T32066] loop3: detected capacity change from 0 to 512 [ 1479.953835][T32066] EXT4-fs (loop3): fragment/cluster size (1073741824) != block size (1024) 05:35:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000e0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1480.104525][T32098] loop1: detected capacity change from 0 to 264192 [ 1480.113101][T32098] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:00 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREADLINK(r5, &(0x7f0000000080)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) ftruncate(r4, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r4, 0x8, 0xee9, 0x0, 0x5}) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) getdents(r0, &(0x7f0000000380)=""/202, 0xca) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x21, 0x37, 0x1, {0x1, 0x2, 0x5, r1, 0x3, ',}$'}}, 0x21) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) 05:35:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = mq_open(&(0x7f0000000000)='\x00', 0x40, 0x4, &(0x7f0000000080)={0x9, 0x3ff, 0x1, 0xfff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x12, r4, 0x5e328000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) [ 1480.272003][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:35:00 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r4 = openat(r0, &(0x7f0000000000)='./bus\x00', 0x2000, 0x10) sendto$inet6(r4, &(0x7f0000000780)="bbac2cbaa44ad3abd459e167d0c2221fa548f28483f05706ad08955e73ef665dc444b433fc24b9e6a952c6f3fc3cd5f87f065d7359ce73794941a8086d000c7db2012baca2f3e61c53e6566023720c025e6a794718e5b9bd63b525d2584c543fdef4f6576e6284cfb6460acbab12c9d4f7f562714d4fe27fc6c805d3f04aa2f5f62ae5cf4e085dfca3c84561e368f9a7a04239ce9b4c2a7c194e97bda6acda982d743524907d69720e75dcce5399775cf5a0dd6ba48fac48c68f4f0d273a74055fccdd19493ad3b206227ef086940e3bb22f93fda6836dc5029d0b31941ed33a8dbfe58f22816c09fdf8bea69099a796738849769079698925c7e80f6c841e746d4e2b9404323ec6294d5324f46a0a616f8754a44040d0220fcf6678022fa4863545953e93d39606556a3ab0a1622b34dac5a90e501cc46999982a975e83fa07532b7f270402b828b5135d2a14cd5cd7e703c4d94b1f901dbfaf4bdac4470dfae190781576f937c9698a5617018ee963aa6bff32b6da09618894924c1a4966daaba1243749ab6090e098bd4be78798afb2d7d84c45e7d0b5e0e14ea7e88f7648ac868007d160f201bb4864cab3034a1ab96cf6cdb3c5da54fd5026411b4b3d51105d54130ab2d8b9bce7d821434ca73e940081750af69d9a028c125fe672f219dbf0736ab0d53445d665d9b8d319d4b6d8e4ba05bc974d9d04fca6da1d8fa644f3aa192eaaca0b16758513f5e4b75fe232023544878f78f51978b5b985746b83d7b6c6b37f145cbfe23cd3d4a1b6b2ff50e065e987660750276e59016bcc91097bfa541509a6bb418afa9b274ad3d01cb8623a37fc75b2b9981cdf9acecf35188413be69231ecb6476a1161b9ce766b343d315fb06ceffe4d2ffe8c90767ecaea75f9ffb576fc1b3b44f878e89ef42e6e109157d05bc24a9d289a12a4cf3044bb1dd837b3f2c04239b3741721af591d5b226cd98ec8a1e56b7e11bbd170743290fafc365303895919a071cd254e51f354672cea163ec319e81c2bac86be6429e697acfd07d68f2416348eef6c7e019925b15bf0eb6db524e936e238064adb1022a0d084a8326095c12e1cbfa7395eb9ce4d116bdbe5713d2a5c5933b3059bdbeae0f1b7f7e5a417e1897683b4e94b01db26bb46c37ecda5f5ded6e68f274f140bf3670876bf36f0449e615ea9b12620491c470e48f722fe008720a08ab68473e6be4f63e6a3b3bdb06eb40d405d830a49fd9b8feaaf441da34dd19194a406d9bf8d812a8cf9dd5544f0db08a2c329cc774516ef0171cd95b4cdee6e61183f7961160301980bde5dabd2fb4b5f8a8cbeb4f76b7ce9ad049c3d3e61106b928f073662b3c4491245487e00df81c4b016aee950ee27a3f3a9a1e252d54361bbbbfcad66aa9174dc47d12373f0ea24f0495f47642c615b74d1dd323b1f0d7863e28c618db1c906fa9dd0e97f839d684aec86a6e21dbbb0f5d7a07ad3923e645b1e7fbf939e420709610d0b97de7d687d89752be308526751cf5440b2af64fad40ad8b0e26d565416b32b0c436a54181c72bc924793b2c1eb8907401efc03279425656aeaaf31baf9b89a5661c68efbf0a4b7941a0297dcee3315453bba4c548705c085b658c371306b4231707b1bbd0fc40be7b5dc29a0ed6eefcc3a80e1b57be3b17c1c9667896d25d6355e80530b9e2a0aff84b982c8f33767df69cca82852dc14fff0ddfdbed6535c065ea02aeed20db33477c26421391082787c9d7008438b0124d340a3ae900ed4e6dadbbdd265da1a0d3ece8afd3716d509bd86a5a95544f46d2f9bd0641bb71b90a65240acc1813dbece574091b8d0094efb2b550dec7d8d71a31860bf4a5ee150fca0b77cb65e62d6ec8db480ca2359192744652bcc97701cc8e00028e685d588cf921bd30c6d209a1ce358c4094bac51fe8b60aef33c956d72cc3be532815a356ccea34c764de3b27c468b172c36d2e6af95798487dc9fa895c1fa7d8106249ecbcf6f259f98e0e740fd2c424ed6511118570a42fc13dfff5ece42d8d7eda37e3d892aa2db9c2cddc32aef6eac5b366d660f0b19901200b94ee8a0368ca0e7d683770cf5ab6d16129b70c89cf2e40699d7f034cef5bbcd40c5925f5e0e8e558343754043220ff2463bc242256c35b3a2d5394cc611df4b2010406696cb84c2b7f508e6203603f9ebd89c858d68b7f44a01c6cdd32bc8b7a06282a062d7015e1a2e8ce015249b66de5fdacc5468ec31343630027328b2fbd9817e0280c8ab56cd1a016955752beed4493a4b84fab3b810a7cd0a7fb588deae5bd5fa4351da251bd58be3ab9b89d3877b3e8d31bcd30c2dd79b330e5af60d8750ce4d948829327ab51cfdf71e0cf882b0e8294c4cd546d74e20ca43307859d354a741430569e2a47b7c7f26b5a8b6178301803e61ef3dc27a30a0cec840f7178cf4d5e91736b19823e4fb0bce57a61acbd6c58e6991f62380dfcb940b6bf2dc7b6ef1f8f845257714e3ad3492f1a3831cef334cbcee5a8014352acc26e37c1edca34baf5b426b12233844dae02ccecfd9931959ce33643c749d2138fc4b03fac9c64b6be0b4be52ea2cb5afe0eefd2f62c6b3d9736979cab79e85339025b04a1f03795c633dd30c1fe412685d42c03aa81c6b49a7ada50443bfbabeaa79990e60199e574c16446e62e879dbf0f337ad059c77a3236b1920472a99d02918fb86afdbfdc780ae33f8ce9f17f95ccdccea15054f17c7d14269bf1a48ba8e8e19c162b1011fd2126e16795a03c6b0510266c6ad6b4a8ea1cbe12fec1b72535b1638d3cef6b2cfcc249a811d7d270cbc03735e181c021ffa2d512dad7982d85e004becb65446849e20b1f2f0056b2cfc5333c997a140df59563dde1f36994862e0f2416fc81b2a605c88194ed8065853b14f39bc01f80a81afd1212e41e4ecf0d61db879d9960ab619f7a38192dca6125d9f6b82534e5fe75e96432efbab5bae2fc2c1b224b267d8eccd4ff7e1a733926bec0c6128e59226e0a8355cba24479862d08b0eb336de6a55aa1d29efe0c29465619af5a6f70f4050463520cba594b893aa2fb5ff4ea4817537ad373fce6b8ff75b516c3056b3b1e26a28d11240ac58975e68179607c31e9e6c7b187fcdd66d5262fbae460bd38a3305e383d9b95f8eff5e4cb0f0cd24b3cd917d1397a6fc26d2816760f0b395cbea0c35b42bd81d1a435431abac942b5264e26e1b94978fc0d0b1241602912bcb656ee2bd3335e376dfb7db1adaa6bac1fdc1aa4d35fc41fe7a7403c1ae3a0a5822c6c8ba0da0575f6b4e340fa5193ebc19d3b61c2a003c931b91e48e08332800d99ac77f259e3898eec8fe6d8b5b83756e6389e0538e9d0f214cb1f4fed1a0c268f1026ab4188abfa1489f580074380d4903d07a37aa4116684c739458817a32a6da373e62dc2bc68f2f27e65187bbcd934a72eac0ac8491d7f660d38f72b82e5c2cd6326adfe42bca165edac8939496bdf25e3b496f837c934f7ac3513da56822d21c25d71a377f7bc27c9a05821217f895ee5d5fdabc872c04fab45424283de404cc06e3b0cfe7ad725d55388151d9b4b89b4dbd7895e9f4586980c374657dcc140cb6d62315a99243723525d4b389e1eec8e683e386e5dd96654655694876a31dadc5bf894758275e32fa846df62ef2a3e435e11a5c5ad2c9565001b5035c0d37713f9ef26e3cdf085838c48cc158b2cc9accda429a9bccb860afbe6aa4d9b33c82b089abf18df162bc7a001931fd4a723fea711c7c4bfeeb0491400af5e7de6a22226f249b272420c64d2a6337842a4a6bda0b08fe8965fab18b34a16f0a53e6696e862c5aa45499b88595f74b94fb9c24c7e99e725017d67777c05aca754ef35f086f8107f65d1e4e3e0a2fa80b02300c0c0699be9cd116b8139114d2726e2dc6a9f2f48340315bbafa0308a5ad75813c0bc55f40b7430ede9dbbfc333443ed99ad8e69d13d485c7fff98868303da372c8c74bc80780c8df1b840f96ee68fc56292afd37286442a4756037a2d16181021456cabb019e99ebf33ae2a39e03b2868000e0e24afaf147502f43d17683e7b5305c72ec34efe031e6ac9f05836c7a589de02cdc96a43a7c33b46692c92ab5d89c8accb9a7c01f5345aa40a7164c4033c4d8ac87be78a32eaa9ba8ec71fbb94865c329bb7b6c918aede805264112ef1b981684391ed4254683ce6c816dd7dddc6ccfd232b7be1069ea76736b9a495fe06d8e0744e2398a72e87fbf85803892f7d86a2b0a77042c0a2a6cf84625ed5497e6ee822604dcc08fd19ab4cd265bce118975687866b46923f4a6cbb26f1ca5bc396dbb98b1acd91d997315082f136a218e31d11d6647cc32fd13d3dfea5e5f65d0396bc2c0c4a8917f74a6311678c7e12c27d5c5aae8b4ede9b8a3bb8011ad42714f62c936d9c36f3f7b50003fe98c676157893f818f81895387769aad38c4b222928ecc855826038443f7d7a3a25809c0dc189b396f0a8ee28a49eefcfb059134951e423c1ca44ffc8c89a397418a8491d57e7135eb0d082fc6ebddac4473cd4254e90d896bf2141735b51bb26ddb9ce93c402df6e95a30416978ba1da19f08e4068eeb12cee9d80aec0a9340416d5d877f55cb04d0ead487e82f1d0267dab51dcab4dd7cb91191ddd0a07188c9931137977d6abc6487d8431bb1a57364c264f9ec3a12beb04ff27c531b840229def13bd355e0992e1451999f1fbc5d1f485aa887425182372bb0139f0e54900d5e1f2639d5548fd1302aca91c1cd58f85431815b6f0ac8bfa3648d1a43fd93d9256effc6436e3d67c7ad4afe3f83457dc3274048f59d1306578082dcefa6d851ab8c7a6e5b964c4e38418894dae6409ff98233bd1341007b1480ef1a2c1a4f7efe19e8ff5020e0d6089789df2f27a64ac70a8571b7c86c26325e387397626194f9a429b4411dfc699cd8c1b63a39872cc6797c1518d7d230668ee4a8fc42e4d3793b93b1c035ab32212f834b9420df8174313634071344a7fe946f2fd5a019bcaf3f7847862f4a0d44fe7ae3f7e18378e52c28bcd09b3fe2ab0aa6af9d1e7c50412f33cc1ef2d1cf193a69f0beb5ce61094c804218371a24a1fcd15924a0f4f01621c5d391b955af42561c0be63341e4a4450da95fd9314f6101c47f5fe8292609dda7e9d4d5be32e2980b58cdb21a38955fdcba5ff51b178560205f076f97af9f515812655be4e039549456bbda0437b67bc6e5301c5af4e0b8b52ec5f05e078125a90983bd29b469fe3893d5ac2cfdc06f694ac887f9a4454713dadf6f1133b129620fb13958edb086e5ae0d449a25471c37b880c676236d201cb98ededbe035865595b05246dcbf48192d97f83eea65add0b1f3fd5150811ebb0cee2b6169050607b4a63cfe52b02e5a5b0d81e48c89f1946254109a3c225b3430fea94f5f14ce6868eac7859a12ed741f69babf1b592535c1b831c0bba723267383fff73cbf90ccd50e1c0704f829e500762707cfa533eb79b10d7367402027bc7c6ffcd5f6dcdc8a141b3eb828a41c7524d24dec8b03c9e1fc92850e255feb26ddcfdbf92ad032319bf9232f681fff3f1c648edf0947d99b63e89310904cf4a2aa4be76356ddb49b3ac0ed8a1fab4977fb1ee9b239028119134c7dcd18f7187b916885516bc036adb806eec0518f45535d24ecd55bf27157acc440b06e3262d555e59546b2c18a934ecd14af64f6b5f69fcf7dd463694368d6b0ce5b5cae634648e6773c044dac21d2d4d35ae80bfdeb34957529748b78bf7d126231b0", 0x1000, 0x20000001, &(0x7f0000000080)={0xa, 0x4e20, 0xecb7, @local, 0x84}, 0x1c) listen(r3, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000020000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000002fbb8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000f0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1480.424427][T32115] loop4: detected capacity change from 0 to 184 [ 1480.437057][T32116] loop1: detected capacity change from 0 to 264192 [ 1480.443832][T32118] loop3: detected capacity change from 0 to 512 05:35:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000fffeb8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1480.472916][T32116] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1480.495199][T32118] EXT4-fs (loop3): Invalid log cluster size: 32 05:35:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000001020000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000100f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1480.567811][T32135] loop4: detected capacity change from 0 to 184 05:35:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000fffb8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1480.625672][T32146] loop3: detected capacity change from 0 to 512 [ 1480.635845][T32146] EXT4-fs (loop3): Invalid log block size: 268435456 [ 1480.678945][T32153] loop1: detected capacity change from 0 to 264192 [ 1480.698840][T32146] loop3: detected capacity change from 0 to 512 05:35:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000110f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000022000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1480.728816][T32146] EXT4-fs (loop3): Invalid log block size: 268435456 [ 1480.741738][T32153] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1480.753094][T32162] loop4: detected capacity change from 0 to 184 [ 1480.828706][T32174] loop1: detected capacity change from 0 to 264192 [ 1480.842311][T32178] loop3: detected capacity change from 0 to 512 [ 1480.852693][T32174] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1480.853125][T32178] EXT4-fs (loop3): Invalid log cluster size: 34 [ 1480.910004][T32178] loop3: detected capacity change from 0 to 512 [ 1480.939468][T32178] EXT4-fs (loop3): Invalid log cluster size: 34 05:35:01 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREADLINK(r5, &(0x7f0000000080)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) ftruncate(r4, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r4, 0x8, 0xee9, 0x0, 0x5}) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) getdents(r0, &(0x7f0000000380)=""/202, 0xca) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x21, 0x37, 0x1, {0x1, 0x2, 0x5, r1, 0x3, ',}$'}}, 0x21) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) 05:35:01 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() ptrace$setsig(0x4203, r2, 0x101, &(0x7f00000000c0)={0x1d, 0x4, 0x8d}) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) lremovexattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)=@random={'btrfs.', '\x00'}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) [ 1481.309757][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:35:01 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r4 = openat(r0, &(0x7f0000000000)='./bus\x00', 0x2000, 0x10) sendto$inet6(r4, &(0x7f0000000780)="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", 0x1000, 0x20000001, &(0x7f0000000080)={0xa, 0x4e20, 0xecb7, @local, 0x84}, 0x1c) listen(r3, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000feffb8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000120f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000025000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1481.393725][T32203] loop4: detected capacity change from 0 to 184 05:35:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000040000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1481.437655][T32211] loop3: detected capacity change from 0 to 512 [ 1481.451042][T32210] loop1: detected capacity change from 0 to 264192 [ 1481.463312][T32211] EXT4-fs (loop3): Invalid log cluster size: 37 [ 1481.472572][T32210] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000130f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000044000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1481.494535][T32225] loop4: detected capacity change from 0 to 184 [ 1481.529573][T32211] loop3: detected capacity change from 0 to 512 05:35:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000002e000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1481.563944][T32211] EXT4-fs (loop3): Invalid log cluster size: 37 [ 1481.591215][T32237] loop4: detected capacity change from 0 to 184 [ 1481.600897][T32238] loop1: detected capacity change from 0 to 264192 [ 1481.634614][T32238] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1481.669763][T32249] loop3: detected capacity change from 0 to 512 05:35:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000005c000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1481.680473][T32249] EXT4-fs (loop3): Invalid log cluster size: 46 05:35:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000140f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1481.731323][T32249] loop3: detected capacity change from 0 to 512 [ 1481.740104][T32249] EXT4-fs (loop3): Invalid log cluster size: 46 [ 1481.832184][T32263] loop4: detected capacity change from 0 to 184 [ 1481.843772][T32268] loop1: detected capacity change from 0 to 264192 [ 1481.852965][T32268] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:02 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) 05:35:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000734000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1482.263384][T32281] loop3: detected capacity change from 0 to 512 [ 1482.272110][T32281] EXT4-fs (loop3): Invalid log block size: 117440512 [ 1482.334370][T32281] loop3: detected capacity change from 0 to 512 [ 1482.351093][T32281] EXT4-fs (loop3): Invalid log block size: 117440512 05:35:02 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x2, 0x2, 0x9, 0x4, 0x0, 0x9, 0x4881, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x10, 0x9, 0x23da, 0x5, 0x7, 0x9aa, 0x53b, 0x0, 0xffff8000, 0x0, 0x48000}, r1, 0x1, r2, 0x8) pwrite64(r2, &(0x7f00000002c0)="2e657290a526e1b83f4c542506042a8dc7d473f3d7780b73ae18c6770f6999f818236bebdab7e37e0691bb140ad6f66751b6e9f88be41bf93e724a571375528f613dea1bd9c4ce06c5b3c29d76ad4122ddb599762ccde02f16d3d76b3a46d6dcdbf7bba051de22a7d97ff96894658b97e155a1b57cf3b9c2f7399496e47f456530b072a9414eb28a9af0f127c4d7db559bae39dd7f8896c8fbb5f7e9ca1233ede81c17390e9b56222f0f5c3d3a44f3f52158e45ce082144e2d22a655c212a7d9304551e5e8d89b521d94468afc9ad1118e6d0f06e5877a4be0fc21e414876ebd0d08043d43b67323831b2c7b2bf443fe", 0xf0, 0x1) 05:35:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000150f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000002b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x10000000000006, 0x2000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1b114, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x3) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) 05:35:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000003f000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1482.417074][T32298] loop4: detected capacity change from 0 to 184 [ 1482.433217][T32299] loop1: detected capacity change from 0 to 264192 [ 1482.451519][T32306] loop3: detected capacity change from 0 to 512 05:35:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000003b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000160f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1482.458194][T32299] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1482.470825][T32306] EXT4-fs (loop3): Invalid log cluster size: 63 [ 1482.493322][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:35:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000004b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1482.535981][T32306] loop3: detected capacity change from 0 to 512 [ 1482.546127][T32326] loop4: detected capacity change from 0 to 184 [ 1482.570184][T32306] EXT4-fs (loop3): Invalid log cluster size: 63 05:35:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000005b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1482.595417][T32330] loop1: detected capacity change from 0 to 264192 [ 1482.620536][T32330] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000040000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1482.679388][T32344] loop4: detected capacity change from 0 to 184 [ 1482.700874][T32348] loop3: detected capacity change from 0 to 512 [ 1482.711950][T32348] EXT4-fs (loop3): Invalid log cluster size: 64 [ 1482.749343][T32348] loop3: detected capacity change from 0 to 512 [ 1482.760574][T32348] EXT4-fs (loop3): Invalid log cluster size: 64 05:35:03 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) 05:35:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000170f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1483.212238][T32363] loop1: detected capacity change from 0 to 264192 [ 1483.222182][T32363] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:03 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x2, 0x2, 0x9, 0x4, 0x0, 0x9, 0x4881, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x10, 0x9, 0x23da, 0x5, 0x7, 0x9aa, 0x53b, 0x0, 0xffff8000, 0x0, 0x48000}, r1, 0x1, r2, 0x8) pwrite64(r2, &(0x7f00000002c0)="2e657290a526e1b83f4c542506042a8dc7d473f3d7780b73ae18c6770f6999f818236bebdab7e37e0691bb140ad6f66751b6e9f88be41bf93e724a571375528f613dea1bd9c4ce06c5b3c29d76ad4122ddb599762ccde02f16d3d76b3a46d6dcdbf7bba051de22a7d97ff96894658b97e155a1b57cf3b9c2f7399496e47f456530b072a9414eb28a9af0f127c4d7db559bae39dd7f8896c8fbb5f7e9ca1233ede81c17390e9b56222f0f5c3d3a44f3f52158e45ce082144e2d22a655c212a7d9304551e5e8d89b521d94468afc9ad1118e6d0f06e5877a4be0fc21e414876ebd0d08043d43b67323831b2c7b2bf443fe", 0xf0, 0x1) 05:35:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000006b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000048000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000180f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:03 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000007b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1483.408164][T32377] loop3: detected capacity change from 0 to 512 [ 1483.414583][T32378] loop4: detected capacity change from 0 to 184 [ 1483.420936][T32381] loop1: detected capacity change from 0 to 264192 [ 1483.425739][T32377] EXT4-fs (loop3): Invalid log cluster size: 72 [ 1483.439344][T32381] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000190f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1483.504329][T32377] loop3: detected capacity change from 0 to 512 [ 1483.511739][T32377] EXT4-fs (loop3): Invalid log cluster size: 72 05:35:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000004c000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000008b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1483.545861][T32404] loop4: detected capacity change from 0 to 184 05:35:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00001a0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1483.601603][T32413] loop3: detected capacity change from 0 to 512 [ 1483.622534][T32413] EXT4-fs (loop3): Invalid log cluster size: 76 [ 1483.643730][T32423] loop4: detected capacity change from 0 to 184 [ 1483.675754][T32413] loop3: detected capacity change from 0 to 512 [ 1483.686216][T32421] loop1: detected capacity change from 0 to 264192 [ 1483.686287][T32413] EXT4-fs (loop3): Invalid log cluster size: 76 [ 1483.763147][T32421] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:04 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) 05:35:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000060000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1484.160018][T32438] loop3: detected capacity change from 0 to 512 [ 1484.168385][T32438] EXT4-fs (loop3): Invalid log cluster size: 96 05:35:04 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x2, 0x2, 0x9, 0x4, 0x0, 0x9, 0x4881, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x10, 0x9, 0x23da, 0x5, 0x7, 0x9aa, 0x53b, 0x0, 0xffff8000, 0x0, 0x48000}, r1, 0x1, r2, 0x8) pwrite64(r2, &(0x7f00000002c0)="2e657290a526e1b83f4c542506042a8dc7d473f3d7780b73ae18c6770f6999f818236bebdab7e37e0691bb140ad6f66751b6e9f88be41bf93e724a571375528f613dea1bd9c4ce06c5b3c29d76ad4122ddb599762ccde02f16d3d76b3a46d6dcdbf7bba051de22a7d97ff96894658b97e155a1b57cf3b9c2f7399496e47f456530b072a9414eb28a9af0f127c4d7db559bae39dd7f8896c8fbb5f7e9ca1233ede81c17390e9b56222f0f5c3d3a44f3f52158e45ce082144e2d22a655c212a7d9304551e5e8d89b521d94468afc9ad1118e6d0f06e5877a4be0fc21e414876ebd0d08043d43b67323831b2c7b2bf443fe", 0xf0, 0x1) 05:35:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000009b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00001b0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000068000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:04 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xffffc0fe}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) [ 1484.474687][T32451] loop1: detected capacity change from 0 to 264192 [ 1484.478715][T32453] loop3: detected capacity change from 0 to 512 [ 1484.483380][T32451] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1484.488883][T32454] loop4: detected capacity change from 0 to 184 05:35:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000ab8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00001c0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1484.525892][T32453] EXT4-fs (loop3): Invalid log cluster size: 104 [ 1484.548622][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1484.615222][T32472] loop4: detected capacity change from 0 to 184 [ 1484.620131][T32453] loop3: detected capacity change from 0 to 512 [ 1484.642420][T32453] EXT4-fs (loop3): Invalid log cluster size: 104 05:35:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000bb8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000006c000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1484.673012][T32482] loop1: detected capacity change from 0 to 264192 [ 1484.684237][T32482] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00001d0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1484.765497][T32499] loop4: detected capacity change from 0 to 184 [ 1484.802098][T32502] loop3: detected capacity change from 0 to 512 [ 1484.811285][T32502] EXT4-fs (loop3): Invalid log cluster size: 108 [ 1484.846064][T32508] loop1: detected capacity change from 0 to 264192 [ 1484.854109][T32508] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:05 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xffffffe0}, 0x1c) 05:35:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000cb8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1485.174810][T32518] loop4: detected capacity change from 0 to 184 05:35:05 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xffff0000}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000074000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00001e0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000db8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xffffc0fe}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) [ 1485.484399][T32531] loop1: detected capacity change from 0 to 264192 [ 1485.493345][T32531] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1485.511033][T32538] loop3: detected capacity change from 0 to 512 [ 1485.516745][T32539] loop4: detected capacity change from 0 to 184 05:35:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000210f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1485.562404][T32538] EXT4-fs (loop3): Invalid log cluster size: 116 [ 1485.591235][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:35:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000220f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000fb8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1485.614013][T32556] loop1: detected capacity change from 0 to 264192 [ 1485.622343][T32556] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1485.680452][T32538] loop3: detected capacity change from 0 to 512 [ 1485.696022][T32538] EXT4-fs (loop3): Invalid log cluster size: 116 [ 1485.708225][T32563] loop1: detected capacity change from 0 to 264192 [ 1485.717882][T32563] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000007a000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1485.728584][T32573] loop4: detected capacity change from 0 to 184 05:35:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000011b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1485.774712][T32581] loop3: detected capacity change from 0 to 512 [ 1485.785989][T32581] EXT4-fs (loop3): Invalid log cluster size: 122 [ 1485.829224][T32581] loop3: detected capacity change from 0 to 512 [ 1485.840764][T32581] EXT4-fs (loop3): Invalid log cluster size: 122 [ 1485.852234][T32592] loop4: detected capacity change from 0 to 184 05:35:06 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xffffffe0}, 0x1c) 05:35:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000230f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1486.126007][T32602] loop1: detected capacity change from 0 to 264192 [ 1486.146207][T32602] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:06 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xffff0000}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000c0ed000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000018b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000240f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xff000000}, 0x1c) 05:35:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000019b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1486.567455][T32617] loop4: detected capacity change from 0 to 184 [ 1486.575574][T32619] loop3: detected capacity change from 0 to 512 [ 1486.582161][T32616] loop1: detected capacity change from 0 to 264192 [ 1486.584898][T32619] EXT4-fs (loop3): Invalid log block size: 3221225472 [ 1486.606377][T32616] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1486.631600][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1486.667058][T32619] loop3: detected capacity change from 0 to 512 05:35:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000250f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000022b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1486.683876][T32619] EXT4-fs (loop3): Invalid log block size: 3221225472 [ 1486.711919][T32646] loop1: detected capacity change from 0 to 264192 [ 1486.721099][T32635] loop4: detected capacity change from 0 to 184 05:35:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000fff000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1486.744940][T32646] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000260f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1486.819609][T32660] loop3: detected capacity change from 0 to 512 [ 1486.838416][T32660] EXT4-fs (loop3): Invalid log block size: 251658240 [ 1486.845719][T32661] loop4: detected capacity change from 0 to 184 [ 1486.918958][T32660] loop3: detected capacity change from 0 to 512 [ 1486.931923][T32660] EXT4-fs (loop3): Invalid log block size: 251658240 [ 1486.943462][T32679] loop1: detected capacity change from 0 to 264192 [ 1486.975761][T32679] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000089b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:07 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xffffffe0}, 0x1c) [ 1487.118965][T32689] loop4: detected capacity change from 0 to 184 05:35:08 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xffff0000}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000040000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000270f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:08 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000feb8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:08 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xfec0ffff}, 0x1c) [ 1487.604239][T32701] loop3: detected capacity change from 0 to 512 [ 1487.613272][T32701] EXT4-fs (loop3): Invalid log cluster size: 1024 [ 1487.622545][T32705] loop1: detected capacity change from 0 to 264192 [ 1487.629975][T32709] loop4: detected capacity change from 0 to 184 05:35:08 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000002000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1487.652050][T32705] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1487.675837][T32701] loop3: detected capacity change from 0 to 512 05:35:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000280f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1487.697426][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1487.715119][T32701] EXT4-fs (loop3): Invalid log cluster size: 1024 [ 1487.731989][T32720] loop4: detected capacity change from 0 to 184 05:35:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000ffffe00000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:08 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000004000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1487.819824][T32739] loop3: detected capacity change from 0 to 512 [ 1487.831063][T32739] EXT4-fs (loop3): Invalid log block size: 4278190080 [ 1487.855030][T32736] loop1: detected capacity change from 0 to 264192 [ 1487.863454][T32746] loop4: detected capacity change from 0 to 184 05:35:08 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000044000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1487.887188][T32736] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1487.901448][T32739] loop3: detected capacity change from 0 to 512 [ 1487.915725][T32739] EXT4-fs (loop3): Invalid log block size: 4278190080 [ 1488.044671][T32765] loop4: detected capacity change from 0 to 184 05:35:08 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xfe80ffff}, 0x1c) 05:35:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000100002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1488.129635][ T302] loop3: detected capacity change from 0 to 512 [ 1488.141062][ T302] EXT4-fs (loop3): Invalid log cluster size: 65536 [ 1488.211950][ T302] loop3: detected capacity change from 0 to 512 [ 1488.221143][ T302] EXT4-fs (loop3): Invalid log cluster size: 65536 05:35:09 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xf5ffffff}, 0x1c) 05:35:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000290f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000005c000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000200002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:09 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xfec0ffff}, 0x1c) [ 1488.647420][ T325] loop1: detected capacity change from 0 to 264192 [ 1488.657385][ T324] loop4: detected capacity change from 0 to 184 [ 1488.657846][ T325] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1488.666106][ T323] loop3: detected capacity change from 0 to 512 05:35:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00002a0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8020000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1488.709189][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1488.735368][ T323] EXT4-fs (loop3): Invalid log cluster size: 131072 [ 1488.790898][ T345] loop1: detected capacity change from 0 to 264192 [ 1488.815421][ T323] loop3: detected capacity change from 0 to 512 [ 1488.838597][ T345] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1488.855871][ T323] EXT4-fs (loop3): Invalid log cluster size: 131072 05:35:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00002b0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000040200002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1488.913662][ T360] loop4: detected capacity change from 0 to 184 05:35:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8030000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1489.001553][ T369] loop1: detected capacity change from 0 to 264192 [ 1489.010896][ T371] loop3: detected capacity change from 0 to 512 [ 1489.014618][ T369] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1489.030510][ T371] EXT4-fs (loop3): Invalid log cluster size: 132096 [ 1489.091587][ T371] loop3: detected capacity change from 0 to 512 [ 1489.093383][ T378] loop4: detected capacity change from 0 to 184 [ 1489.117040][ T371] EXT4-fs (loop3): Invalid log cluster size: 132096 05:35:09 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xfe80ffff}, 0x1c) 05:35:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8040000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1489.241089][ T396] loop4: detected capacity change from 0 to 184 05:35:10 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xf5ffffff}, 0x1c) 05:35:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000300002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00002c0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8050000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x7ffff000}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) [ 1489.669565][ T408] loop3: detected capacity change from 0 to 512 [ 1489.683809][ T408] EXT4-fs (loop3): Invalid log cluster size: 196608 [ 1489.701861][ T416] loop1: detected capacity change from 0 to 264192 [ 1489.708933][ T415] loop4: detected capacity change from 0 to 184 05:35:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000400002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8060000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1489.727538][ T416] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1489.760480][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:35:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00002d0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1489.795023][ T434] loop3: detected capacity change from 0 to 512 [ 1489.805938][ T434] EXT4-fs (loop3): Invalid log cluster size: 262144 [ 1489.844756][ T437] loop4: detected capacity change from 0 to 184 [ 1489.860595][ T434] loop3: detected capacity change from 0 to 512 [ 1489.873750][ T434] EXT4-fs (loop3): Invalid log cluster size: 262144 05:35:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000500002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1489.897322][ T447] loop1: detected capacity change from 0 to 264192 [ 1489.907776][ T447] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8070000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1489.968699][ T457] loop3: detected capacity change from 0 to 512 [ 1489.983746][ T457] EXT4-fs (loop3): Invalid log cluster size: 327680 [ 1490.011122][ T464] loop4: detected capacity change from 0 to 184 [ 1490.032999][ T457] loop3: detected capacity change from 0 to 512 [ 1490.062091][ T457] EXT4-fs (loop3): Invalid log cluster size: 327680 05:35:10 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xfe80ffff}, 0x1c) 05:35:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00002e0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1490.246428][ T485] loop1: detected capacity change from 0 to 264192 [ 1490.257312][ T485] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:11 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xf5ffffff}, 0x1c) 05:35:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8080000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000600002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00002f0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:11 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x41020000}, 0x1c) [ 1490.712379][ T500] loop1: detected capacity change from 0 to 264192 [ 1490.720539][ T505] loop3: detected capacity change from 0 to 512 [ 1490.728255][ T506] loop4: detected capacity change from 0 to 184 [ 1490.730900][ T500] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1490.740561][ T505] EXT4-fs (loop3): Invalid log cluster size: 393216 05:35:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8090000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000300f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1490.785456][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1490.818767][ T505] loop3: detected capacity change from 0 to 512 [ 1490.825914][ T505] EXT4-fs (loop3): Invalid log cluster size: 393216 05:35:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000040600002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80a0000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1490.897518][ T532] loop1: detected capacity change from 0 to 264192 [ 1490.904299][ T526] loop4: detected capacity change from 0 to 184 [ 1490.919117][ T532] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1490.938508][ T537] loop3: detected capacity change from 0 to 512 05:35:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000310f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1490.979826][ T537] EXT4-fs (loop3): Invalid log cluster size: 394240 [ 1491.021607][ T549] loop4: detected capacity change from 0 to 184 [ 1491.022436][ T551] loop1: detected capacity change from 0 to 264192 [ 1491.037772][ T551] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1491.063288][ T537] loop3: detected capacity change from 0 to 512 [ 1491.079425][ T537] EXT4-fs (loop3): Invalid log cluster size: 394240 05:35:11 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xf000000}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80b0000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1491.201365][ T567] loop4: detected capacity change from 0 to 184 05:35:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000700002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:12 executing program 5: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) mkdir(&(0x7f0000000140)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000002c0)={[0xfffffffffffffff6]}, 0x0, 0x0, 0x8) r3 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0xffffffffffff2695]}, 0x8) readv(r3, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/4075, 0xfeb}], 0x1) close(r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800007, 0x10, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa0000000) rmdir(&(0x7f0000000100)='./control\x00') 05:35:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000320f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80c0000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x6000000}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) [ 1491.720426][ T583] loop3: detected capacity change from 0 to 512 [ 1491.728982][ T583] EXT4-fs (loop3): Invalid log cluster size: 458752 [ 1491.745182][ T585] loop4: detected capacity change from 0 to 184 [ 1491.796181][ T589] loop1: detected capacity change from 0 to 264192 [ 1491.802854][ T583] loop3: detected capacity change from 0 to 512 [ 1491.815584][ T583] EXT4-fs (loop3): Invalid log cluster size: 458752 [ 1491.827163][ T589] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80d0000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000007fffffff002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1491.838551][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:35:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000800002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1491.896617][ T609] loop5: detected capacity change from 0 to 512 [ 1491.935102][ T609] EXT4-fs (loop5): Invalid log cluster size: 4294967167 05:35:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000330f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1491.965002][ T622] loop3: detected capacity change from 0 to 512 [ 1491.987723][ T622] EXT4-fs (loop3): Invalid log cluster size: 524288 [ 1491.994734][ T623] loop4: detected capacity change from 0 to 184 05:35:12 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x2000000}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) [ 1492.026579][ T630] loop1: detected capacity change from 0 to 264192 [ 1492.052357][ T622] loop3: detected capacity change from 0 to 512 [ 1492.064157][ T630] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1492.076359][ T622] EXT4-fs (loop3): Invalid log cluster size: 524288 05:35:12 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x7000000}, 0x1c) 05:35:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80f0000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000900002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000340f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000350f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1492.260518][ T658] loop1: detected capacity change from 0 to 264192 [ 1492.272560][ T658] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1492.282929][ T663] loop3: detected capacity change from 0 to 512 [ 1492.291532][ T662] loop4: detected capacity change from 0 to 184 05:35:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000360f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1492.333702][ T663] EXT4-fs (loop3): Invalid log cluster size: 589824 [ 1492.387390][ T663] loop3: detected capacity change from 0 to 512 [ 1492.424751][ T663] EXT4-fs (loop3): Invalid log cluster size: 589824 [ 1492.431591][ T686] loop1: detected capacity change from 0 to 264192 [ 1492.443864][ T686] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:13 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x5000000}, 0x1c) 05:35:13 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8110000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000370f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000a00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1492.691075][ T700] loop4: detected capacity change from 0 to 184 [ 1492.704383][ T701] loop1: detected capacity change from 0 to 264192 [ 1492.713026][ T699] loop3: detected capacity change from 0 to 512 [ 1492.725821][ T701] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:13 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8180000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1492.731612][ T699] EXT4-fs (loop3): Invalid log cluster size: 655360 [ 1492.801544][ T699] loop3: detected capacity change from 0 to 512 [ 1492.811663][ T699] EXT4-fs (loop3): Invalid log cluster size: 655360 [ 1492.826923][ T723] loop4: detected capacity change from 0 to 184 [ 1492.834192][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:35:13 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x2000000}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:13 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x7000000}, 0x1c) 05:35:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000380f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000b00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:13 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8190000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1493.315094][ T751] loop1: detected capacity change from 0 to 264192 [ 1493.322177][ T749] loop3: detected capacity change from 0 to 512 [ 1493.333090][ T751] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1493.335026][ T748] loop4: detected capacity change from 0 to 184 [ 1493.352612][ T749] EXT4-fs (loop3): Invalid log cluster size: 720896 05:35:13 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8220000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000c00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1493.471913][ T774] loop3: detected capacity change from 0 to 512 [ 1493.480258][ T774] EXT4-fs (loop3): Invalid log cluster size: 786432 [ 1493.487186][ T773] loop4: detected capacity change from 0 to 184 05:35:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xf0ff7f}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000390f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000d00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8890000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1493.716613][ T790] loop1: detected capacity change from 0 to 264192 [ 1493.723392][ T791] loop4: detected capacity change from 0 to 184 [ 1493.730926][ T787] loop3: detected capacity change from 0 to 512 [ 1493.739873][ T790] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1493.752409][ T787] EXT4-fs (loop3): Invalid log cluster size: 851968 05:35:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000e00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1493.837672][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1493.864416][ T807] loop3: detected capacity change from 0 to 512 05:35:14 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x2000000}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) [ 1493.919636][ T807] EXT4-fs (loop3): Invalid log cluster size: 917504 [ 1493.978921][ T807] loop3: detected capacity change from 0 to 512 [ 1493.993196][ T807] EXT4-fs (loop3): Invalid log cluster size: 917504 05:35:14 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x7000000}, 0x1c) 05:35:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8fe0000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00003a0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000f00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1494.369808][ T830] loop1: detected capacity change from 0 to 264192 [ 1494.377268][ T832] loop3: detected capacity change from 0 to 512 [ 1494.378423][ T834] loop4: detected capacity change from 0 to 184 [ 1494.394354][ T830] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8140100000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1494.419713][ T832] EXT4-fs (loop3): Invalid log cluster size: 983040 05:35:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000001000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1494.511515][ T851] loop4: detected capacity change from 0 to 184 [ 1494.527868][ T858] loop3: detected capacity change from 0 to 512 [ 1494.561230][ T858] EXT4-fs (loop3): Invalid log cluster size: 1048576 [ 1494.626980][ T858] loop3: detected capacity change from 0 to 512 [ 1494.651651][ T858] EXT4-fs (loop3): Invalid log cluster size: 1048576 05:35:15 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) mkdir(&(0x7f0000000140)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000002c0)={[0xfffffffffffffff6]}, 0x0, 0x0, 0x8) r3 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) readv(r3, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/4075, 0xfeb}], 0x1) close(r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa0000000) rmdir(&(0x7f0000000100)='./control\x00') 05:35:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00003b0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8040200000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000041000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1494.792705][ T874] loop4: detected capacity change from 0 to 184 [ 1494.808655][ T872] loop1: detected capacity change from 0 to 264192 05:35:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8ea0200000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1494.840719][ T872] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1494.857431][ T882] loop3: detected capacity change from 0 to 512 [ 1494.866881][ T882] EXT4-fs (loop3): Invalid log cluster size: 1049600 [ 1494.923041][ T898] loop4: detected capacity change from 0 to 184 [ 1494.946707][ T882] loop3: detected capacity change from 0 to 512 [ 1494.966746][ T882] EXT4-fs (loop3): Invalid log cluster size: 1049600 05:35:15 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xfc00}, 0x1c) 05:35:15 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x7fdc}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00003c0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8fb0200000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:15 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) mkdir(&(0x7f0000000140)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000002c0)={[0xfffffffffffffff6]}, 0x0, 0x0, 0x8) r3 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) readv(r3, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/4075, 0xfeb}], 0x1) close(r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa0000000) rmdir(&(0x7f0000000100)='./control\x00') 05:35:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000001100002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000300000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1495.379131][ T923] loop3: detected capacity change from 0 to 512 [ 1495.386030][ T926] loop4: detected capacity change from 0 to 184 [ 1495.392438][ T925] loop1: detected capacity change from 0 to 264192 [ 1495.403594][ T923] EXT4-fs (loop3): Invalid log cluster size: 1114112 [ 1495.415391][ T925] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00003d0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000001200002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00003e0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8760300000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:16 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) mkdir(&(0x7f0000000140)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000002c0)={[0xfffffffffffffff6]}, 0x0, 0x0, 0x8) r3 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) readv(r3, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/4075, 0xfeb}], 0x1) close(r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa0000000) rmdir(&(0x7f0000000100)='./control\x00') [ 1495.497970][ T945] loop4: detected capacity change from 0 to 184 [ 1495.503977][ T923] loop3: detected capacity change from 0 to 512 [ 1495.522469][ T923] EXT4-fs (loop3): Invalid log cluster size: 1114112 [ 1495.576255][ T960] loop3: detected capacity change from 0 to 512 [ 1495.605826][ T960] EXT4-fs (loop3): Invalid log cluster size: 1179648 [ 1495.630524][ T973] loop1: detected capacity change from 0 to 264192 [ 1495.633450][ T975] loop4: detected capacity change from 0 to 184 [ 1495.645752][ T973] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1495.659560][ T960] loop3: detected capacity change from 0 to 512 [ 1495.671775][ T960] EXT4-fs (loop3): Invalid log cluster size: 1179648 05:35:16 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xfc00}, 0x1c) 05:35:16 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x7fdc}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000480f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8020400000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x5400}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000001400002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1496.336159][ T1005] loop3: detected capacity change from 0 to 512 [ 1496.346821][ T1005] EXT4-fs (loop3): Invalid log cluster size: 1310720 [ 1496.365146][ T1009] loop4: detected capacity change from 0 to 184 05:35:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8060400000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1496.406825][ T1005] loop3: detected capacity change from 0 to 512 [ 1496.406825][ T1010] loop1: detected capacity change from 0 to 264192 [ 1496.411182][ T1005] EXT4-fs (loop3): Invalid log cluster size: 1310720 [ 1496.439317][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:35:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000002000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1496.451323][ T1010] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00004c0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000500000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1496.495212][ T1027] loop4: detected capacity change from 0 to 184 [ 1496.541031][ T1037] loop3: detected capacity change from 0 to 512 [ 1496.550141][ T1037] EXT4-fs (loop3): Invalid log cluster size: 2097152 [ 1496.559110][ T1039] loop1: detected capacity change from 0 to 264192 [ 1496.574810][ T1039] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1496.632108][ T1048] loop4: detected capacity change from 0 to 184 [ 1496.639945][ T1037] loop3: detected capacity change from 0 to 512 [ 1496.669335][ T1037] EXT4-fs (loop3): Invalid log cluster size: 2097152 05:35:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000600000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000600f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1496.766583][ T1066] loop4: detected capacity change from 0 to 184 [ 1496.770001][ T1063] loop1: detected capacity change from 0 to 264192 [ 1496.791912][ T1063] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:17 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xfc00}, 0x1c) 05:35:17 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x7fdc}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000102000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8040600000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000680f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x700}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) [ 1497.384428][ T1089] loop4: detected capacity change from 0 to 184 [ 1497.400852][ T1090] loop3: detected capacity change from 0 to 512 [ 1497.408410][ T1093] loop1: detected capacity change from 0 to 264192 [ 1497.416868][ T1090] EXT4-fs (loop3): Invalid log cluster size: 2101248 05:35:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000002200002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000700000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1497.448834][ T1093] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1497.452296][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:35:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00006c0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1497.519639][ T1111] loop3: detected capacity change from 0 to 512 [ 1497.532494][ T1111] EXT4-fs (loop3): Invalid log cluster size: 2228224 [ 1497.540772][ T1116] loop4: detected capacity change from 0 to 184 [ 1497.559976][ T1122] loop1: detected capacity change from 0 to 264192 05:35:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000900000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1497.591414][ T1111] loop3: detected capacity change from 0 to 512 [ 1497.619056][ T1111] EXT4-fs (loop3): Invalid log cluster size: 2228224 [ 1497.626002][ T1122] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000002500002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1497.650308][ T1133] loop4: detected capacity change from 0 to 184 05:35:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000a00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1497.736597][ T1147] loop3: detected capacity change from 0 to 512 [ 1497.745526][ T1147] EXT4-fs (loop3): Invalid log cluster size: 2424832 [ 1497.787641][ T1153] loop4: detected capacity change from 0 to 184 05:35:18 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x500}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:18 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xb00}, 0x1c) 05:35:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000740f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000002e00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000b00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1498.393280][ T1167] loop4: detected capacity change from 0 to 184 [ 1498.409788][ T1171] loop3: detected capacity change from 0 to 512 [ 1498.416778][ T1170] loop1: detected capacity change from 0 to 264192 05:35:18 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000004000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000c00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1498.444554][ T1171] EXT4-fs (loop3): Invalid log cluster size: 3014656 [ 1498.451519][ T1170] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:19 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000004000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00007a0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1498.494961][ T1171] loop3: detected capacity change from 0 to 512 [ 1498.510652][ T1190] loop4: detected capacity change from 0 to 184 [ 1498.511708][ T1171] EXT4-fs (loop3): Invalid log cluster size: 3014656 05:35:19 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000d00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:19 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000004000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000073400002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1498.622312][ T1206] loop1: detected capacity change from 0 to 264192 [ 1498.634881][ T1209] loop3: detected capacity change from 0 to 512 [ 1498.635409][ T1206] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1498.652742][ T1209] EXT4-fs (loop3): Invalid log cluster size: 3409664 [ 1498.687821][ T1217] loop4: detected capacity change from 0 to 184 [ 1498.726041][ T1209] loop3: detected capacity change from 0 to 512 [ 1498.741434][ T1209] EXT4-fs (loop3): Invalid log cluster size: 3409664 05:35:19 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x500}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:19 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xb00}, 0x1c) 05:35:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x4b8}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000fe0f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:19 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000f00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000003f00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1499.376895][ T1242] loop1: detected capacity change from 0 to 264192 [ 1499.387591][ T1242] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1499.398886][ T1246] loop4: detected capacity change from 0 to 184 [ 1499.399633][ T1247] loop3: detected capacity change from 0 to 512 05:35:19 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8201000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000011000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1499.449715][ T1247] EXT4-fs (loop3): Invalid log cluster size: 4128768 [ 1499.473006][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1499.496754][ T1263] loop1: detected capacity change from 0 to 264192 05:35:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000004000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1499.529678][ T1263] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1499.541816][ T1270] loop4: detected capacity change from 0 to 184 05:35:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8001100000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1499.588742][ T1275] loop3: detected capacity change from 0 to 512 [ 1499.601628][ T1275] EXT4-fs (loop3): Invalid log cluster size: 4194304 05:35:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8011400000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000012000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1499.631366][ T1286] loop4: detected capacity change from 0 to 184 [ 1499.694410][ T1294] loop1: detected capacity change from 0 to 264192 [ 1499.703988][ T1294] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1499.722420][ T1291] loop4: detected capacity change from 0 to 184 05:35:20 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x500}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:20 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xb00}, 0x1c) 05:35:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000004800002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8001800000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000013000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x48}, 0x1c) [ 1500.452015][ T1319] loop3: detected capacity change from 0 to 512 [ 1500.458523][ T1317] loop4: detected capacity change from 0 to 184 [ 1500.468004][ T1319] EXT4-fs (loop3): Invalid log cluster size: 4718592 [ 1500.482804][ T1318] loop1: detected capacity change from 0 to 264192 05:35:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8001900000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1500.522100][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1500.539061][ T1319] loop3: detected capacity change from 0 to 512 [ 1500.544805][ T1318] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1500.546538][ T1319] EXT4-fs (loop3): Invalid log cluster size: 4718592 05:35:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000004c00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000006000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000014000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1500.628601][ T1342] loop3: detected capacity change from 0 to 512 [ 1500.639751][ T1342] EXT4-fs (loop3): Invalid log cluster size: 4980736 [ 1500.704051][ T1353] loop3: detected capacity change from 0 to 512 [ 1500.713032][ T1353] EXT4-fs (loop3): Invalid log cluster size: 6291456 [ 1500.719859][ T1352] loop4: detected capacity change from 0 to 184 [ 1500.726647][ T1356] loop1: detected capacity change from 0 to 264192 05:35:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8002000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1500.753747][ T1356] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8102000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1500.795812][ T1353] loop3: detected capacity change from 0 to 512 [ 1500.813506][ T1370] loop4: detected capacity change from 0 to 184 [ 1500.852902][ T1353] EXT4-fs (loop3): Invalid log cluster size: 6291456 [ 1500.888024][ T1375] loop4: detected capacity change from 0 to 184 05:35:21 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xf}, 0x1c) 05:35:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000015000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8002200000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:21 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x6}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000006800002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x3}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8003f00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1501.474101][ T1395] loop3: detected capacity change from 0 to 512 [ 1501.477997][ T1394] loop1: detected capacity change from 0 to 264192 [ 1501.487635][ T1397] loop4: detected capacity change from 0 to 184 [ 1501.490248][ T1395] EXT4-fs (loop3): Invalid log cluster size: 6815744 [ 1501.503705][ T1394] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000006c00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8004000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000016000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1501.586419][ T1410] loop4: detected capacity change from 0 to 184 [ 1501.612854][ T1423] loop3: detected capacity change from 0 to 512 [ 1501.641667][ T1423] EXT4-fs (loop3): Invalid log cluster size: 7077888 [ 1501.662087][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1501.676165][ T1431] loop1: detected capacity change from 0 to 264192 05:35:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8037600000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1501.687473][ T1432] loop4: detected capacity change from 0 to 184 [ 1501.706382][ T1423] loop3: detected capacity change from 0 to 512 [ 1501.718702][ T1431] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1501.718774][ T1423] EXT4-fs (loop3): Invalid log cluster size: 7077888 05:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000007400002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1501.818631][ T1446] loop3: detected capacity change from 0 to 512 [ 1501.837792][ T1446] EXT4-fs (loop3): Invalid log cluster size: 7602176 [ 1501.848395][ T1453] loop4: detected capacity change from 0 to 184 [ 1501.884727][ T1446] loop3: detected capacity change from 0 to 512 [ 1501.902087][ T1446] EXT4-fs (loop3): Invalid log cluster size: 7602176 05:35:22 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xf}, 0x1c) 05:35:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000017000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8008900000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1502.073046][ T1472] loop4: detected capacity change from 0 to 184 [ 1502.077781][ T1471] loop1: detected capacity change from 0 to 264192 [ 1502.090078][ T1471] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:22 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x6}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000007a00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x2}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:23 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b802ea00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000018000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1502.562449][ T1491] loop3: detected capacity change from 0 to 512 [ 1502.572959][ T1491] EXT4-fs (loop3): Invalid log cluster size: 7995392 [ 1502.646297][ T1499] loop4: detected capacity change from 0 to 184 [ 1502.652686][ T1491] loop3: detected capacity change from 0 to 512 [ 1502.662866][ T1491] EXT4-fs (loop3): Invalid log cluster size: 7995392 [ 1502.678304][ T1500] loop1: detected capacity change from 0 to 264192 05:35:23 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8c0ed00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000ffffff8c00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1502.693209][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1502.732313][ T1500] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1502.784309][ T1518] loop3: detected capacity change from 0 to 512 [ 1502.796293][ T1518] EXT4-fs (loop3): Invalid log block size: 4278190080 05:35:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000019000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000edc000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1502.840867][ T1530] loop4: detected capacity change from 0 to 184 [ 1502.906523][ T1537] loop3: detected capacity change from 0 to 512 [ 1502.984352][ T1537] EXT4-fs (loop3): Invalid log cluster size: 12643584 [ 1502.992434][ T1540] loop1: detected capacity change from 0 to 264192 05:35:23 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0xf}, 0x1c) 05:35:23 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b802fb00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1503.032148][ T1537] loop3: detected capacity change from 0 to 512 [ 1503.042869][ T1540] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1503.067770][ T1537] EXT4-fs (loop3): Invalid log cluster size: 12643584 05:35:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000001a000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1503.111533][ T1556] loop4: detected capacity change from 0 to 184 [ 1503.181659][ T1565] loop1: detected capacity change from 0 to 264192 [ 1503.231449][ T1565] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:23 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x6}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000ffffffda00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:24 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8c0ed00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8fffe00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000001b000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1503.554845][ T1579] loop3: detected capacity change from 0 to 512 [ 1503.570590][ T1579] EXT4-fs (loop3): Invalid log block size: 4278190080 [ 1503.621361][ T1587] loop4: detected capacity change from 0 to 184 [ 1503.630146][ T1588] loop1: detected capacity change from 0 to 264192 [ 1503.641876][ T1579] loop3: detected capacity change from 0 to 512 [ 1503.655334][ T1588] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80fff00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:24 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8c0ed00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1503.666161][ T1579] EXT4-fs (loop3): Invalid log block size: 4278190080 05:35:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000001c000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8feff00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1503.742167][ T1609] loop4: detected capacity change from 0 to 184 [ 1503.804968][ T1618] loop4: detected capacity change from 0 to 184 [ 1503.822522][ T1620] loop1: detected capacity change from 0 to 264192 [ 1503.840997][ T1620] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:24 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback={0x0, 0x700}}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:24 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8c0ed00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000fffffff600002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1504.105318][ T1641] loop3: detected capacity change from 0 to 512 [ 1504.113754][ T1641] EXT4-fs (loop3): Invalid log block size: 4278190080 [ 1504.157268][ T1641] loop3: detected capacity change from 0 to 512 [ 1504.163908][ T1641] EXT4-fs (loop3): Invalid log block size: 4278190080 05:35:24 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback={0xfec0ffff00000000}}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000004000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000001d000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:24 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback={0x0, 0x7}}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000fffffdf900002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000008000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1504.523410][ T1664] loop4: detected capacity change from 0 to 184 [ 1504.557065][ T1667] loop3: detected capacity change from 0 to 512 [ 1504.557608][ T1668] loop1: detected capacity change from 0 to 264192 [ 1504.579311][ T1667] EXT4-fs (loop3): Invalid log block size: 4278190080 [ 1504.594766][ T1668] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1504.614321][ T1667] loop3: detected capacity change from 0 to 512 05:35:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000003f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000fffffdfd00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1504.623359][ T1667] EXT4-fs (loop3): Invalid log block size: 4278190080 [ 1504.677547][ T1698] loop1: detected capacity change from 0 to 264192 [ 1504.692380][ T1700] loop4: detected capacity change from 0 to 184 [ 1504.697737][ T1698] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1504.711268][ T1709] loop3: detected capacity change from 0 to 512 05:35:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800000c000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1504.724333][ T1709] EXT4-fs (loop3): Invalid log block size: 4278190080 [ 1504.776675][ T1709] loop3: detected capacity change from 0 to 512 [ 1504.799436][ T1709] EXT4-fs (loop3): Invalid log block size: 4278190080 [ 1504.809441][ T1719] loop4: detected capacity change from 0 to 184 05:35:25 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback={0x1802000000000000}}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000040000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8ffff1f000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1505.134727][ T1729] loop1: detected capacity change from 0 to 264192 [ 1505.145605][ T1739] loop4: detected capacity change from 0 to 184 [ 1505.155739][ T1729] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:25 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x180) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000fffffffe00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000040000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce000007cd000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback={0xf0ffffff7f0000}}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) [ 1505.550847][ T1756] loop3: detected capacity change from 0 to 512 [ 1505.557293][ T1759] loop4: detected capacity change from 0 to 184 [ 1505.568526][ T1756] EXT4-fs (loop3): Invalid log block size: 4278190080 [ 1505.585242][ T1763] loop1: detected capacity change from 0 to 264192 05:35:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000010000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000000fff00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1505.597673][ T1763] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000fffe000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000020000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1505.728164][ T1783] loop3: detected capacity change from 0 to 512 [ 1505.732372][ T1785] loop4: detected capacity change from 0 to 184 [ 1505.780063][ T1783] EXT4-fs (loop3): Invalid log cluster size: 16715520 [ 1505.787520][ T1794] loop1: detected capacity change from 0 to 264192 [ 1505.797519][ T1794] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1505.826429][ T1783] loop3: detected capacity change from 0 to 512 [ 1505.833347][ T1783] EXT4-fs (loop3): Invalid log cluster size: 16715520 [ 1505.874386][ T1807] loop4: detected capacity change from 0 to 184 05:35:26 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0xfe80ffff, @loopback}, 0x1c) 05:35:26 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x180) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000fffffbff00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000002000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000004020000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000030000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1506.133876][ T1823] loop4: detected capacity change from 0 to 184 [ 1506.137291][ T1822] loop1: detected capacity change from 0 to 264192 [ 1506.154550][ T1821] loop3: detected capacity change from 0 to 512 [ 1506.172543][ T1821] EXT4-fs (loop3): Invalid log block size: 4278190080 05:35:26 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x180) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1506.181391][ T1822] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1506.247327][ T1838] loop4: detected capacity change from 0 to 184 [ 1506.285134][ T1821] loop3: detected capacity change from 0 to 512 [ 1506.292675][ T1821] EXT4-fs (loop3): Invalid log block size: 4278190080 05:35:26 executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x180) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000040000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000003000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:26 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0xeffdffff, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000e0ffff00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1506.543208][ T1863] loop3: detected capacity change from 0 to 512 [ 1506.550087][ T1865] loop1: detected capacity change from 0 to 264192 [ 1506.558724][ T1866] loop4: detected capacity change from 0 to 184 [ 1506.560896][ T1863] EXT4-fs (loop3): Invalid log cluster size: 16777184 [ 1506.586243][ T1865] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:27 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0xfe80ffff, @loopback}, 0x1c) 05:35:27 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000050000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000fffbffff00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000004000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:27 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xd000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:27 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xd000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1507.120597][ T1896] loop3: detected capacity change from 0 to 512 [ 1507.127195][ T1894] loop4: detected capacity change from 0 to 184 [ 1507.139840][ T1896] EXT4-fs (loop3): Invalid log block size: 4278190080 [ 1507.149011][ T1897] loop1: detected capacity change from 0 to 264192 [ 1507.157127][ T1897] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:27 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xd000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000005000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:27 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000060000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1507.216034][ T1896] loop3: detected capacity change from 0 to 512 [ 1507.231998][ T1896] EXT4-fs (loop3): Invalid log block size: 4278190080 05:35:27 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000004060000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1507.266558][ T1926] loop4: detected capacity change from 0 to 184 [ 1507.298958][ T1928] loop1: detected capacity change from 0 to 264192 [ 1507.318242][ T1928] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1507.366279][ T1934] loop4: detected capacity change from 0 to 184 05:35:27 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0xeffdffff, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:27 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:28 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0xfe80ffff, @loopback}, 0x1c) 05:35:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000f9fdffff00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000006000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:28 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000070000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:28 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:28 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000fdfdffff00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1508.178695][ T1960] loop3: detected capacity change from 0 to 512 [ 1508.192235][ T1960] EXT4-fs (loop3): Invalid log block size: 4177526784 [ 1508.204351][ T1964] loop1: detected capacity change from 0 to 264192 [ 1508.211647][ T1965] loop4: detected capacity change from 0 to 184 05:35:28 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000080000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:28 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0xcec3a76b, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) [ 1508.238096][ T1964] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000007000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1508.291650][ T1984] loop3: detected capacity change from 0 to 512 [ 1508.299923][ T1982] loop4: detected capacity change from 0 to 184 [ 1508.318931][ T1984] EXT4-fs (loop3): Invalid log block size: 4244635648 [ 1508.351054][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1508.354206][ T1998] loop1: detected capacity change from 0 to 264192 [ 1508.370607][ T1998] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:28 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0xeffdffff, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:28 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000090000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1508.513353][ T2010] loop4: detected capacity change from 0 to 184 05:35:29 executing program 5: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x180) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000261000/0x2000)=nil, 0x2000, 0x1000000, 0x30, r0, 0x6a5d1000) dup2(r2, r0) fcntl$addseals(r4, 0x409, 0x5) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/200, 0xc8) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000007fffffff00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000008000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80000000a0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:29 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0xcec3a76b, @loopback}, 0x1c) syz_open_dev$loop(0x0, 0x0, 0x0) 05:35:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80000000b0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1509.325065][ T2025] loop4: detected capacity change from 0 to 184 [ 1509.340982][ T2026] loop1: detected capacity change from 0 to 264192 [ 1509.352767][ T2027] loop3: detected capacity change from 0 to 512 [ 1509.360248][ T2026] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1509.387470][ T2027] EXT4-fs (loop3): Invalid log block size: 2130706432 [ 1509.425550][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:35:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000009000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1509.438683][ T2040] loop4: detected capacity change from 0 to 184 05:35:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80000000c0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1509.533020][ T2027] loop3: detected capacity change from 0 to 512 [ 1509.554396][ T2053] loop1: detected capacity change from 0 to 264192 [ 1509.566438][ T2027] EXT4-fs (loop3): Invalid log block size: 2130706432 05:35:30 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0xdc7f0000, @loopback}, 0x1c) 05:35:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000008cffffff00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000a000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1509.586514][ T2053] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80000000d0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1509.645148][ T2070] loop4: detected capacity change from 0 to 184 05:35:30 executing program 5 (fault-call:9 fault-nth:0): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1509.697455][ T2072] loop3: detected capacity change from 0 to 512 [ 1509.699743][ T2079] loop1: detected capacity change from 0 to 264192 [ 1509.717698][ T2072] EXT4-fs (loop3): Invalid log block size: 2348810240 [ 1509.739275][ T2088] loop4: detected capacity change from 0 to 184 05:35:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80000000f0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1509.772524][ T2079] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1509.806889][ T2072] loop3: detected capacity change from 0 to 512 [ 1509.816132][ T2072] EXT4-fs (loop3): Invalid log block size: 2348810240 05:35:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000daffffff00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1509.826566][ T2099] FAULT_INJECTION: forcing a failure. [ 1509.826566][ T2099] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1509.839968][ T2099] CPU: 1 PID: 2099 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1509.848999][ T2099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1509.859232][ T2099] Call Trace: [ 1509.862509][ T2099] dump_stack+0x137/0x19d [ 1509.867058][ T2099] should_fail+0x23c/0x250 [ 1509.871455][ T2099] should_fail_usercopy+0x16/0x20 [ 1509.876665][ T2099] _copy_from_user+0x1c/0xd0 [ 1509.881337][ T2099] io_submit_one+0x42/0x1350 [ 1509.886000][ T2099] ? asm_exc_page_fault+0x1e/0x30 [ 1509.891282][ T2099] ? __get_user_4+0x1c/0x30 [ 1509.895820][ T2099] __se_sys_io_submit+0xf5/0x260 [ 1509.900974][ T2099] __x64_sys_io_submit+0x3f/0x50 [ 1509.906240][ T2099] do_syscall_64+0x4a/0x90 [ 1509.910648][ T2099] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1509.916661][ T2099] RIP: 0033:0x4665d9 [ 1509.920750][ T2099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1509.940877][ T2099] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1509.949297][ T2099] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1509.957276][ T2099] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1509.965689][ T2099] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1509.973696][ T2099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1509.981693][ T2099] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000b000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1510.017905][ T2108] loop3: detected capacity change from 0 to 512 [ 1510.035567][ T2108] EXT4-fs (loop3): Invalid log block size: 3657433088 [ 1510.049909][ T2112] loop4: detected capacity change from 0 to 184 [ 1510.072352][ T2115] loop1: detected capacity change from 0 to 264192 [ 1510.107001][ T2115] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) sendmmsg$sock(r0, &(0x7f0000003f40)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e23, @remote}, 0x80, 0x0}}, {{&(0x7f0000000140)=@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, &(0x7f00000035c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000003680)=[@txtime={{0x18}}, @mark={{0x14}}], 0x30}}], 0x2, 0x0) recvfrom(r0, &(0x7f0000000040)=""/55, 0x37, 0x2001, &(0x7f00000001c0)=@generic={0x1f, "393c51424c84b052f7a6ba471cd41c9835eac6443eb9d8c7788e3dd87e0c27c51f7494e3da11d9e270449462b0c6aeef5c43163e8b2dfb3a6b03ddaa08ec335580b4dbb32bae712e863bf8392b06e795171f4c508d897025fcadf9e58a8aa866afbb55c7c33d55eef4309632bd6ec31ec5caf208029a0170d8aa84912a47"}, 0x80) 05:35:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000f6ffffff00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000110000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:30 executing program 5 (fault-call:9 fault-nth:1): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1510.283188][ T2132] loop3: detected capacity change from 0 to 512 [ 1510.292300][ T2132] EXT4-fs (loop3): Invalid log block size: 4127195136 [ 1510.292795][ T2134] loop4: detected capacity change from 0 to 184 [ 1510.337816][ T2143] FAULT_INJECTION: forcing a failure. [ 1510.337816][ T2143] name failslab, interval 1, probability 0, space 0, times 0 [ 1510.350725][ T2143] CPU: 0 PID: 2143 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1510.359726][ T2143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1510.369931][ T2143] Call Trace: [ 1510.373202][ T2143] dump_stack+0x137/0x19d [ 1510.377528][ T2143] should_fail+0x23c/0x250 [ 1510.381943][ T2143] ? io_submit_one+0xb0/0x1350 [ 1510.386710][ T2143] __should_failslab+0x81/0x90 [ 1510.391527][ T2143] should_failslab+0x5/0x20 [ 1510.396034][ T2143] kmem_cache_alloc+0x46/0x2f0 [ 1510.400882][ T2143] io_submit_one+0xb0/0x1350 [ 1510.405460][ T2143] ? asm_exc_page_fault+0x1e/0x30 [ 1510.410486][ T2143] __se_sys_io_submit+0xf5/0x260 [ 1510.415446][ T2143] __x64_sys_io_submit+0x3f/0x50 [ 1510.420401][ T2143] do_syscall_64+0x4a/0x90 [ 1510.424828][ T2143] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1510.430771][ T2143] RIP: 0033:0x4665d9 [ 1510.434682][ T2143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1510.455152][ T2143] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1510.463650][ T2143] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1510.471710][ T2143] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1510.479809][ T2143] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1510.487876][ T2143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1510.495954][ T2143] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:31 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0xdc7f0000, @loopback}, 0x1c) 05:35:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000c000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000feffffff00002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000001140000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:31 executing program 0: clone(0x66008d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/233, 0xe9}], 0x1, 0xd9f, 0x0) ioctl$sock_netdev_private(r0, 0x8990, &(0x7f0000000040)) 05:35:31 executing program 5 (fault-call:9 fault-nth:2): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1510.579036][ T2155] loop4: detected capacity change from 0 to 184 [ 1510.585605][ T2157] loop3: detected capacity change from 0 to 512 [ 1510.616251][ T2160] loop1: detected capacity change from 0 to 264192 05:35:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000180000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:31 executing program 0: r0 = clone3(&(0x7f0000001c80)={0x20000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000001c00)=[0x0], 0x1}, 0x58) r1 = getpid() clone3(&(0x7f00000002c0)={0x5000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x35}, &(0x7f00000000c0)=""/164, 0xa4, &(0x7f0000000180)=""/237, &(0x7f0000000280)=[r0, r1], 0x2}, 0x58) 05:35:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000000000020000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1510.622975][ T2157] EXT4-fs (loop3): Invalid log block size: 4261412864 [ 1510.639985][ T2160] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1510.699330][ T2188] FAULT_INJECTION: forcing a failure. [ 1510.699330][ T2188] name failslab, interval 1, probability 0, space 0, times 0 [ 1510.712206][ T2188] CPU: 0 PID: 2188 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1510.721206][ T2188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1510.731271][ T2188] Call Trace: [ 1510.734541][ T2188] dump_stack+0x137/0x19d [ 1510.739037][ T2188] should_fail+0x23c/0x250 [ 1510.743456][ T2188] __should_failslab+0x81/0x90 [ 1510.748224][ T2188] ? __iomap_dio_rw+0xf1/0xad0 [ 1510.752988][ T2188] should_failslab+0x5/0x20 [ 1510.757588][ T2188] kmem_cache_alloc_trace+0x49/0x310 [ 1510.762976][ T2188] __iomap_dio_rw+0xf1/0xad0 [ 1510.767571][ T2188] ? schedule+0x67/0x90 [ 1510.771728][ T2188] ? __down_read_common+0x516/0x5a0 [ 1510.777008][ T2188] iomap_dio_rw+0x30/0x70 [ 1510.781432][ T2188] ext4_file_read_iter+0x21a/0x290 [ 1510.786624][ T2188] aio_read+0x1c1/0x280 [ 1510.790767][ T2188] ? kmem_cache_alloc+0x201/0x2f0 [ 1510.794323][ T2187] loop4: detected capacity change from 0 to 184 [ 1510.795839][ T2188] io_submit_one+0x7fb/0x1350 [ 1510.807403][ T2188] __se_sys_io_submit+0xf5/0x260 [ 1510.812776][ T2188] __x64_sys_io_submit+0x3f/0x50 [ 1510.817757][ T2188] do_syscall_64+0x4a/0x90 [ 1510.822298][ T2188] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1510.828187][ T2188] RIP: 0033:0x4665d9 [ 1510.832094][ T2188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1510.851996][ T2188] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1510.860529][ T2188] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1510.868807][ T2188] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1510.876773][ T2188] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1510.884728][ T2188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 05:35:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000d000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1510.892714][ T2188] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000190000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:31 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000040)={0x40002002}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x2c}}) [ 1510.920956][ T2201] loop3: detected capacity change from 0 to 512 [ 1510.930928][ T2201] EXT4-fs (loop3): #blocks per group too big: 2097152 [ 1510.960141][ T2204] loop1: detected capacity change from 0 to 264192 [ 1510.969232][ T2204] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1511.019670][ T2219] loop4: detected capacity change from 0 to 184 05:35:31 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0xdc7f0000, @loopback}, 0x1c) 05:35:31 executing program 0: unshare(0x22020000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) mkdir(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x80000, &(0x7f00000002c0)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=0xee00, @ANYBLOB=',uid=', @ANYRESHEX=0xee01, @ANYBLOB=',smackfsfloor=rpc_pipefs\x00,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c6673757569643d39393931340035642d660036372d346666392d613937352d30613066323035382c7375626a5f747970653d2e7d7d265d2c646f6e745f61010000006973652c686173682c00"]) 05:35:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000002000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:31 executing program 5 (fault-call:9 fault-nth:3): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000e000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000200000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1511.551881][ T2237] loop3: detected capacity change from 0 to 512 [ 1511.559851][ T2237] EXT4-fs (loop3): fragment/cluster size (4096) != block size (1024) [ 1511.564676][ T2236] loop1: detected capacity change from 0 to 264192 [ 1511.574664][ T2240] loop4: detected capacity change from 0 to 184 05:35:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000010200000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000010000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1511.605068][ T2236] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1511.620549][ T2253] FAULT_INJECTION: forcing a failure. [ 1511.620549][ T2253] name failslab, interval 1, probability 0, space 0, times 0 [ 1511.633271][ T2253] CPU: 0 PID: 2253 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1511.641957][ T2253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1511.652068][ T2253] Call Trace: [ 1511.654590][ T2237] loop3: detected capacity change from 0 to 512 [ 1511.655376][ T2253] dump_stack+0x137/0x19d [ 1511.666038][ T2253] should_fail+0x23c/0x250 [ 1511.670512][ T2253] ? mempool_alloc_slab+0x16/0x20 [ 1511.671353][ T2237] EXT4-fs (loop3): fragment/cluster size (4096) != block size (1024) [ 1511.675541][ T2253] __should_failslab+0x81/0x90 [ 1511.675568][ T2253] should_failslab+0x5/0x20 [ 1511.675614][ T2253] kmem_cache_alloc+0x46/0x2f0 [ 1511.675630][ T2253] ? strlcpy+0x65/0x80 [ 1511.675645][ T2253] mempool_alloc_slab+0x16/0x20 [ 1511.675662][ T2253] ? mempool_free+0x130/0x130 [ 1511.675677][ T2253] mempool_alloc+0x8c/0x300 [ 1511.715942][ T2253] ? handle_mm_fault+0x71f/0x1a70 [ 1511.720965][ T2253] ? percpu_counter_add_batch+0x69/0xd0 [ 1511.726766][ T2253] ? iov_iter_npages+0x211/0xa00 [ 1511.731758][ T2253] ? ext4_es_lookup_extent+0x36b/0x490 [ 1511.737331][ T2253] bio_alloc_bioset+0xcc/0x480 [ 1511.742168][ T2253] iomap_dio_bio_actor+0x511/0xb50 [ 1511.747332][ T2253] iomap_dio_actor+0x26e/0x3b0 [ 1511.752117][ T2253] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1511.758164][ T2253] iomap_apply+0x1e2/0x400 [ 1511.762583][ T2253] __iomap_dio_rw+0x5af/0xad0 [ 1511.767268][ T2253] ? __iomap_dio_rw+0xad0/0xad0 [ 1511.772185][ T2253] iomap_dio_rw+0x30/0x70 [ 1511.776516][ T2253] ext4_file_read_iter+0x21a/0x290 [ 1511.781724][ T2253] aio_read+0x1c1/0x280 [ 1511.785889][ T2253] ? kmem_cache_alloc+0x201/0x2f0 [ 1511.790932][ T2253] io_submit_one+0x7fb/0x1350 [ 1511.795600][ T2253] __se_sys_io_submit+0xf5/0x260 [ 1511.800702][ T2253] __x64_sys_io_submit+0x3f/0x50 [ 1511.805633][ T2253] do_syscall_64+0x4a/0x90 [ 1511.810356][ T2253] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1511.816271][ T2253] RIP: 0033:0x4665d9 [ 1511.820154][ T2253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1511.840123][ T2253] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1511.848531][ T2253] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1511.856617][ T2253] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1511.864746][ T2253] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1511.872707][ T2253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1511.880670][ T2253] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000003000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000220000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000011000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1511.950832][ T2271] loop3: detected capacity change from 0 to 512 [ 1511.954395][ T2268] loop4: detected capacity change from 0 to 184 [ 1511.966364][ T2273] loop1: detected capacity change from 0 to 264192 [ 1511.966875][ T2271] EXT4-fs (loop3): fragment/cluster size (8192) != block size (1024) [ 1511.976125][ T2273] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:32 executing program 5 (fault-call:9 fault-nth:4): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1512.043026][ T2271] loop3: detected capacity change from 0 to 512 [ 1512.060533][ T2288] loop4: detected capacity change from 0 to 184 [ 1512.067528][ T2271] EXT4-fs (loop3): fragment/cluster size (8192) != block size (1024) [ 1512.100013][ T2294] loop1: detected capacity change from 0 to 264192 [ 1512.111521][ T2294] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1512.128881][ T2296] FAULT_INJECTION: forcing a failure. [ 1512.128881][ T2296] name failslab, interval 1, probability 0, space 0, times 0 [ 1512.141528][ T2296] CPU: 0 PID: 2296 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1512.150212][ T2296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1512.160387][ T2296] Call Trace: [ 1512.163676][ T2296] dump_stack+0x137/0x19d [ 1512.168011][ T2296] should_fail+0x23c/0x250 [ 1512.172425][ T2296] ? bio_alloc_bioset+0x27d/0x480 [ 1512.177453][ T2296] __should_failslab+0x81/0x90 [ 1512.182217][ T2296] should_failslab+0x5/0x20 [ 1512.186742][ T2296] kmem_cache_alloc+0x46/0x2f0 [ 1512.191696][ T2296] ? iov_iter_npages+0x211/0xa00 [ 1512.196660][ T2296] ? ext4_es_lookup_extent+0x36b/0x490 [ 1512.202113][ T2296] bio_alloc_bioset+0x27d/0x480 [ 1512.207062][ T2296] iomap_dio_bio_actor+0x511/0xb50 [ 1512.212551][ T2296] iomap_dio_actor+0x26e/0x3b0 [ 1512.217349][ T2296] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1512.223311][ T2296] iomap_apply+0x1e2/0x400 [ 1512.227732][ T2296] __iomap_dio_rw+0x5af/0xad0 [ 1512.232403][ T2296] ? __iomap_dio_rw+0xad0/0xad0 [ 1512.237325][ T2296] iomap_dio_rw+0x30/0x70 [ 1512.241792][ T2296] ext4_file_read_iter+0x21a/0x290 [ 1512.246974][ T2296] aio_read+0x1c1/0x280 [ 1512.251176][ T2296] ? kmem_cache_alloc+0x201/0x2f0 [ 1512.256248][ T2296] io_submit_one+0x7fb/0x1350 [ 1512.261015][ T2296] __se_sys_io_submit+0xf5/0x260 [ 1512.265986][ T2296] __x64_sys_io_submit+0x3f/0x50 [ 1512.270938][ T2296] do_syscall_64+0x4a/0x90 [ 1512.275343][ T2296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1512.281234][ T2296] RIP: 0033:0x4665d9 [ 1512.285124][ T2296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1512.304726][ T2296] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1512.313340][ T2296] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1512.321309][ T2296] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1512.329315][ T2296] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1512.337374][ T2296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1512.345491][ T2296] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:32 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) r2 = gettid() r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x80000, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xfc, 0x20, 0x7, 0x2, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x7, @perf_bp={&(0x7f0000000080), 0x1}, 0x1000, 0x100, 0x57, 0x4, 0x80000001, 0x2, 0x1c42, 0x0, 0x4, 0x0, 0x100}, r2, 0xc, r3, 0x2) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000780)=0x1, 0x5a) setsockopt$sock_int(r1, 0x1, 0x1, &(0x7f00000000c0)=0x1000, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) dup3(r0, r1, 0x0) 05:35:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80000003f0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000004000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000012000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:32 executing program 0: syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x20, &(0x7f0000000700)=ANY=[@ANYBLOB='\x00\x00\x00\x00W']) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x400, &(0x7f0000000240)={'trans=unix,', {[{@uname={'uname', 0x3d, ')\''}}], [{@fsmagic={'fsmagic', 0x3d, 0xb5fc}}, {@appraise_type}, {@subj_type={'subj_type', 0x3d, '*-,$\xd7c^^'}}]}}) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r2, r3) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r6, r7) chown(&(0x7f0000000080)='./bus\x00', 0xee00, r7) lchown(&(0x7f0000000000)='./file0\x00', r0, r3) r8 = accept4$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x0, @multicast2}, &(0x7f00000003c0)=0x10, 0xc0000) r9 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@private2}}, &(0x7f0000000500)=0xe8) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r12) r13 = getgid() sendmsg$netlink(r4, &(0x7f00000005c0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x80}, 0xc, &(0x7f0000000540)=[{&(0x7f0000000740)={0x680, 0x3c, 0x400, 0x70bd2d, 0x25dfdbff, "", [@typed={0x4, 0x11}, @typed={0x9, 0x1c, 0x0, 0x0, @str='uname'}, @nested={0x238, 0x11, 0x0, 0x1, [@generic="62fa6bfe584596d7546b23873afa022c70d748e6a7cf", @typed={0x75, 0x56, 0x0, 0x0, @binary="b183992963ea7574af1d8ff3ae03053d57b9795a73a8b74406ac5f786987944d5a3a1a9612fb6e3378385a2d7bbcaa522d40d09bcd55d53035fb042509d8baf38a8b63b749b33ac3d519fb7b88b9f05e3c9d0ff536249371dd3508fb6b6c5a70c5717b61a15f4120484cbe5807abfed3f8"}, @generic="b4a7579b321757bacde4f0e51e2bf9acefe7bdc78c3219c3a457e1e78d5f50f7bc4e8e4a28a0bb708521a9e30a60c0191c293ad3c7e21734311251603160bf1ca24c3e91c366b2261108f3b3d4945d0b1f2757bd76", @typed={0x6e, 0x0, 0x0, 0x0, @binary="ff247e9e055711ffc162f359407ff3b1e1a634e75845fb96928d12d8ca953f0e09f5c9e50fd56b1ac74865f37a0e8052210f3880d3e9d22469cf1267eb71f01b8c50212531f370acab66840f5161d48b8e9ca2b1a1a6d42723bf2d598d3f26d8b3c3701bdcfddfda321d"}, @generic="6d569c15363c67def6529dbf5d6d8f51f05a875375098ad8313bbbd1be75c855ad6a1e6aecd97e6da4b94a85d9885573ac13aa046797bde80a95ea0d176c8af1c5a831d7595d553d2bc3a14318e9bcc8b2f44fccd7c647c80d99bcbfc729e51a83640df9c477b5b1bd7f141f5eabe6edfa1baa3bc82f33a71be486068e1d61460ad0fd68dd1716333581f1a64ac469e7e9ebab24b6dd6ce6ebb77e93e0d6c6eb25d71ce9eca3d7907c97dd930dc1c6e531920b04463ed57d627fcaac9f53403c0948e0e91c8323a51b6e42344870c3ca105f32aa7d2efa3bdd", @typed={0x8, 0x1c, 0x0, 0x0, @fd=r8}]}, @nested={0xd6, 0x65, 0x0, 0x1, [@generic="e23e6e804d35577a47e191aa952f7a76bace010ce287f18126d9a8be505c8048bbceac064125c011e9ea28da30b763ed9cc0edcace3bb01450e0c88e7beaf653ad92e1ae6fd785c72484651d8ef2e35a9bc34f8b5f78661fe87a2239e0b67f9fcc2f39b973b1e6c7022b4feda7ed2ae4d2089ea50314c097e5fa231ba01c9ff6b451a4b178dd3e7981c4c7d345dde3d79315796fffbda45d29f9395fa13e5327ddef200559ee1b7a70e8cec2b12a6bbcf58d7b9a0b479c43952c98ce43d691548feb21cdd5f670f178ee248021ace84ac128"]}, @generic="e4d9194ed5caaa8a08457c87ea0a4aa7a437ba7e92611805c0d1569c9b00b65d3faacf0f875cea30b1b94fd390460361f417e874f767729aee6e8e8fa57f29c727f34715bae6904e01486aa3be842ec5a84a98d618de9ca7216e921c221e22a0eb1c07e55ac5e31ac60a168ae0047718f34732664ed85886a49eec6901e5e10f9f56bf21ef4d68abaf492e6df64c52e48d8c346cbeb93ed4137843e4bddb49a3af0dc039fabe59b4d598", @nested={0x29c, 0x38, 0x0, 0x1, [@generic="b8065cbf6645f47d4fa485418f5d83920c07c9f116798669c3355a0ee6784e7f00e93a14d70aca40221d4f228ccc55c94047cd03005e7803e95eb276caae8a748d9bfb3b79d6cdf28cd3dcd863a5a2130183ae36e6ff60ddc052343a6070", @typed={0x4, 0x2a}, @typed={0x8, 0xc, 0x0, 0x0, @fd=r9}, @typed={0x14, 0x30, 0x0, 0x0, @ipv6=@mcast2}, @generic="be9ab964a337953f64417f816ed141503df424544b1ca86a92d4f215042f59de8f6408f42483fe1542052896b0e9c10a247c5a621a89a46fd4253155d6ae67f8ab3ac4131e3a9e585f29f13101545069c4227ab15510f5e8cd79bd354a84c93f01faa3c07f84097eec328ed8e7f1f05eabf675c362800a2e71c2f69d9f39af550cb4", @generic="b5cc0317c80aa7acec767567a28d41a2d9ffcfe2", @typed={0xc, 0x5d, 0x0, 0x0, @u64=0x9}, @generic="7342f32419d5a1a5618dc38043ad9ae64ea614844f4de02b4eaa300555a0a037ea80f7d916c4af56fe1d821d7b2d74c01235350a6960903f3276a8aab908f3ca69ae97efabe6bd64257e22fa19069c285ce8d6245c991c8fee78ef00edebc051872bf9cd7fc2fc5877e6f2e9481b99cf439cebdb453aa1dc36", @typed={0x8, 0x7e, 0x0, 0x0, @u32=0x9383}, @generic="a53846ac3bd635a935abd0a7d0c83d19c9ce15d9929aa952a3c3bac720861c3947bb3be1b8c56be454149424ae75c3560c636365e6236936dda2a22c1ed84e96be42b7d47872008b4d43858246640a2904ed1208dbb052db0a169aad13b71fc9c89b39de2117ecbbae982551b46fa9099ddf1243d3b42ead324e59c5cb9a2d3bab73329ca8fab1877123beffd955546c5f4507ad7043b693d4a89e4fb647e4fe24c9f787c1ca2d3d36c0c152dc2c62a6c240131f6f1f416a5b7f5594f7cc45d54993a9f664f2ab4436680edcd571e3b4269dea84d15fd670ea817b4bccd85091636588aea80366c25c3637392624a98c90b027285b4a7f"]}, @typed={0x8, 0x1e, 0x0, 0x0, @u32=0x2}]}, 0x680}, {&(0x7f0000000dc0)={0x574, 0x10, 0x4, 0x70bd2c, 0x25dfdbfc, "", [@nested={0x1d3, 0x75, 0x0, 0x1, [@generic="d5dd1ab601fc7f27f8a08bc8856541f2c9ef178db9dbb7e531476eff807f4cdb50d3d41b15f1b259a877bae1d76be6be42a0c47115a86efad604e8211e1905fd009bc841cca480f2ca71a5f48e661e143e7774ae323ccc45f85972152c9cd1de921dbd14077b512fc2d0f3f3a50f9a13615fe4ca48a0acb5", @generic="91ea9a3f5f2a4e0bcf173590a46fb15d82ffc73fb4d5da6ed2e9d8a73fb4713ebe488b87cd103a9350a5c42b8e20820bca03cdb16fd31f3f01bf94b280a16c78887ce35c62c56cb2bcc079b854b454996a9ec6e63191bbdbbe44a010122a1c2b082ce056b9f0b0e27d741439722096120526f3c02c70f453263ea3a4ba32912dec29c3d41e53374756c4712bec672439d7cfa773e7be107ef6ec29f0915d044d1f6015d72442ff4ea84d3c902a67e23e1437c62c88b1867d0ac6e5998222e69184afed447858ecf26835d0708f80f23e30dd59fbbdc36b801d5661c82e688ec8b157f1cc0537a7ad5150d468eb1d", @typed={0x8, 0xe, 0x0, 0x0, @uid=r10}, @generic="76160aba673c87441319bafa61110b12680488a020429d72d9e2ade9327b272fc8c2c1047463c405e474ef6b0f0a7a22b289b214aa5de469c8866b9c51736b1d2cf3aae97d82cc958016fa5caab2e55651d226363e993407de70f1749cd6d6bbab"]}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@loopback}, @nested={0x37, 0x72, 0x0, 0x1, [@generic="9051b2717c21b9f9a38cfbaa511110b0c988f6cfcf323d22a75f539a03c99cc77edf2b", @typed={0x8, 0x70, 0x0, 0x0, @uid=r12}, @typed={0x8, 0x5d, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}]}, @generic="f1072e29ff0f15dc25189a47b92740fbd88640249e7e7c0b93e7f0d7bab80b605069ec74bb36b136f97f8400c994eb33cbc90290e2cf53c3afab4544aa", @nested={0xb3, 0x22, 0x0, 0x1, [@generic="500aaf3da8595aaa35823180ebeabe09cfeb033dde7da13125e19154b1512cae95c1e5c5f4c056988fc7c1cf3cd91fe5a3f97de56c69657f46f3ae69a1fb5d2a7b383f4d2482a2ce4e08bb2054d102ebfcf89ac82dc0f635360edf862237b1945bd9102401ea668f5eea770553244045805ed13fa337630836af5fce0bfeaf53fe8dbcf74441b94b41dfa8c483e26b31f143de9c6bb7bfd68ca2b2bd4fdae0ea1a57b2", @typed={0xc, 0x37, 0x0, 0x0, @str='*-,$\xd7c^^'}]}, @nested={0xf5, 0x29, 0x0, 0x1, [@generic="27fca1049f94eae315fe0cf8f9be2350161d8da988bd05cb4dde1c0d077fb416dc79225db08624bf125e9323fa31a76cc97abbe9de2c59f45cf8425d0cfcceed69cee625069c4ee666cd7fc6a7f487fdb2f7933a2a7e42c62a0a238ec26a34fc2799d73034eb73b0677c5ce51fd4b52648f52320b3f94e1c7929f9004f8cfbb22707c09cd77cd4f2bea3222e34b4003d363a1e4d642d5bb317ed2eb25665e22917e4266d2377bc40495407e4fc49b7de72cc136fc64335f9e2b2c34c35cad99b38f2b33be99f6732674cd852e92985e54c289dce8bfb0a603fb01d6034bff654ea355dbee66030cb9bc2e4b90df466154a"]}, @nested={0x156, 0x8f, 0x0, 0x1, [@generic="fece6c741ac7991402a4a6d7a31665b8dbe9fe51e997c8843bc8e48f1c484eb1ea0a0c73318788ee82242e3db159ce1baa5c931abf873753f90419836df45022c9", @generic="c6670fcef62ad9fb97b7111cd3026382b4504b041e2358d5aef0a7049cdad7102e81e4a583c2029163b261e8b008bb81c708eea37f10b7e54859da0b675d4174a7217d8d394f45f3fc91315c4f75d7b305e082335d38464be8a58e41d8e18745ce8a0d86b55d4d706033424fa032e6d029aa02f55d726f369939ae9be48d088ef935", @typed={0x8, 0x30, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0xa}}, @generic="bb8b25e30fc761dc1caf7eac2e8db8d9818891f840e72df78713212700d2d1c43f302b18aaa5251fbb55fde3d06fd77a1fde4682434ecb46596ad1770bda5537722264682fe88c0de0db0a3d8609c338e0cb301c1bfc5051cef340ad59b1d1ef6ea9a8fb9576ebcc777fe60e338e0256d0f84633724eeb69141ac11e77675a7760190243d0a468"]}]}, 0x574}, {&(0x7f0000001340)={0x1428, 0x2f, 0x20, 0x70bd26, 0x25dfdbfb, "", [@generic="dda4dbe07a0147d5e1182b53d47a71ea3192a2fff8601fc51d5cfdbaa22f689a2ab70cf3dd2c8cf4cf75c2704ccdd3b0c081db33ca683e773a0a1604141eb25cd9cf54556deed5e4d9b02841f283d77db58c72c9111824cb004178c2adf548c770d4dc733cbcc95b1e2e15c5097762969a5d400f3e64b2a8dd6655516e43546a7c08b7cd0df70f9ee5bd15eb62f04fe09593bc0d44f8797e74f78ab4e5c19c38c3e32d3f61f707b091ccb61709eb3c49eea46af8f8", @generic="5278bb36b2ffbedb6f3e6adee3d5bff247a40e3edff4c0f7fa36a8", @typed={0xd, 0x75, 0x0, 0x0, @str='subj_type'}, @generic="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", @nested={0xff, 0x62, 0x0, 0x1, [@generic="eb30ae7df892f1cad67837ddf5211a244cd4e2e5a59c93c762295139670ca6ed80ec1838a9a6e04e7760e8f9f742d48b5a", @generic, @typed={0x14, 0x93, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00'}, @typed={0x6, 0x36, 0x0, 0x0, @str='/\x00'}, @generic="705b1f34de71a276a3012a07355609213ca242a9ee1cf1c0e79602015b6ca5a85110a15ae41feb1f6b5639f33cfc42db1ae8949667f5a1352edd251942eb129db0a9321360eeeb465c323f70a2bfd6a6536bf1a989aface7a5f7e73547bd9f6012ad967cf54697c421fc1e2821840b24c9dd1a7b0c66f896c851afa96eea6d1adbdbb0d9a95f671254597681370b6d220b42fc48a8a7b249bf53d300ae1d0c3b69a4", @typed={0x9, 0x15, 0x0, 0x0, @str='uname'}]}, @generic="1bcd328c7d72bf7424a2daee394b308f856fb25de8d0934b9faff196684c093e3dbe6ec5ccd1a394ac35d2398ddf82f56e5716235a548ff94fdf9e8c45", @nested={0x1e3, 0x27, 0x0, 0x1, [@generic="0d6e1047eb1888198827a451da9bdd4df3cb381e4df5d9a898466eafe9d264e55e7a7c7a3b18296bdfc5385b80a1cc456e57c81d239311a77de2f01f8552f94ce2d9cd5117e4999641b6c77cbf7edeb309a9f1e64d3facf77aba69952695559210bdf68ee14e4956f931e37c30203b5ad4b37c6f449f3fd267bb694af9d183cb7bee7ab20919def83e848925a3bfd7ae7b77258d4e553d552fc5776bec97f788b8c8e22b712c333d6611d7c84638865638492e53dbe96eba00ab008fff5179067c4d54fa9c309fbbe46dcd39ec2e0d7417b33e90d1d244dfa9f741e677c70fd96975eb90b7203b2c", @generic="5e2f430d62767d2d9583135d37509a86e4b06c8ddd667919cb4644b05cec569e765b4009c17bfe39e6bf23f67e3ba34cf126bd8183e987929a479f2f41b43f34ee9b010b0d8c3fc8f4da241220adb351939496bc1620559a00fd9d8c2de009dced4f8179da81c68b2a81ee0a3e6ace4ec9e4fbb2812364c826c5bfe1239a7be571cb7d9f76ceb200a07dfd3f0a3e9034e5d89cc6e3ace455d753638a5e3dbdf45d87f6145ee56483101affbb13271caaa2688fd2755f25a939ed3c4084b16204e80dab6e9edc23ba8cb420d91ae25df80d1004d8e769e5dfaa49228133dcfcca29b0835c9dd05967cf060329368436", @typed={0x8, 0x47, 0x0, 0x0, @ipv4=@broadcast}]}, @typed={0x14, 0x38, 0x0, 0x0, @ipv6=@mcast1}]}, 0x1428}], 0x3, &(0x7f0000000580)=[@cred={{0x1c, 0x1, 0x2, {r5, r2, r13}}}], 0x20, 0x8000}, 0x10) 05:35:32 executing program 5 (fault-call:9 fault-nth:5): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r0) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x1}, 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) unshare(0x68000400) ioctl$sock_ifreq(r3, 0x8901, &(0x7f0000000240)={'caif0\x00', @ifru_data=0x0}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r5, r4, 0x0) getdents(r4, &(0x7f0000000280)=""/200, 0xc8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r4) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r7 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r7, r6, 0x0) getdents(r6, &(0x7f0000000280)=""/200, 0xc8) [ 1512.520078][ T2313] loop1: detected capacity change from 0 to 264192 [ 1512.531996][ T2313] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1512.538100][ T2318] loop4: detected capacity change from 0 to 184 [ 1512.551153][ T2323] loop3: detected capacity change from 0 to 512 [ 1512.560291][ T2323] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 05:35:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000013000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6900) ftruncate(r2, 0x800) copy_file_range(r1, 0x0, r0, &(0x7f00000000c0)=0x8, 0x2, 0x0) lseek(r2, 0x0, 0x2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = syz_mount_image$nfs4(&(0x7f0000000100), &(0x7f0000000140)='./bus\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="f07e89a056adbfa97238ad1823cbf24e24dd571588635e78d64686d4658cb2324cbc65d041294f7234001ae4e41c3f2c1b3fe6835531f6ec8191f4aba5f673c238fa626e680f3cddf4bfff24d4904ae4d653d7e2cfa5af012621bddca619be3500a2da7afe4fcfadcab0f66a6b0e21aa0d88c0235d991909e29b92f6a67dda35dbcf5886af6262b702d12121de9d387dae8010b4d6eb817be34c53f400527d3e1cfc6379cab7d53e34e60238a985b7d4ac97fecbc8d58d", 0xb7, 0x40c8}], 0x200400, &(0x7f00000003c0)={[{}], [{@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@euid_lt={'euid<', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x34, 0x66, 0x64, 0x30, 0x33], 0x2d, [0x33, 0x64, 0x35, 0x33], 0x2d, [0x36, 0x64, 0x6, 0x61], 0x2d, [0x35, 0x63, 0x39], 0x2d, [0x38, 0x38, 0x36, 0x66, 0x66, 0x33, 0x63, 0x66]}}}, {@subj_type={'subj_type', 0x3d, '\''}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '@/('}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@subj_role={'subj_role', 0x3d, ':'}}]}) perf_event_open(&(0x7f00000008c0)={0x2, 0x80, 0x81, 0x1, 0x7, 0x0, 0x0, 0x9, 0xf15f2cc25495143d, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xb606c5e, 0x5, @perf_bp={&(0x7f0000000880), 0x8}, 0x0, 0x7, 0x7, 0x4, 0x7, 0x6, 0x3ff, 0x0, 0x10000, 0x0, 0x3ff}, 0x0, 0x2, r2, 0x9) pwritev2(r4, &(0x7f0000000800)=[{&(0x7f00000004c0)="83c9d8a720a2b3466462883919d932a137afef810e290b4a0b51ccbe7f697944b814c5f1214dd7296d712f1901c61bc447ed41d34367fd774a78351bf39fd7ac01e8305763ffa2cf5d51ce835327134467e80c7730dd6176b5ddb33cf47c4284c488878d57ce1005333dfecbe70e4b6bf4c1dc48e892b73d063cd67b5a58bea860e366e96ad65540640660e37512981487482bb72195a269b23da87e9a3a50532ce60ecc8f3b58852bf76b8f8210b2fc62a064469d3030765f65b20de1a461fbd10c94891f7f37fda5ccd5cdc4f601d6d582c669e77486fb901c7291d065", 0xde}, {&(0x7f00000005c0)="5c91845a445772e142adc3194dbdbaea53e5ae962757bc30c4ad1f14f3976ce4f6305fd409712306d88a158cd68e58524602d30a8f0bc283425747393daec2eb1b854359f0f9b0fa0d78ed7b5b0f9302ee1568cc9b4b27f91a3bdf0f6c3229e5f1fbc99366c59690535ad1adea45558737c300b0eaae053115549fa57505b07de4978d87e5b44df731c1ff8fe87c940103a583f0d198c7db7172e5cd1fb8d123c96e7346b45a8ccb703d8d30ef89037764a32f903911709c77fae55e5c9fbbee3d3f6d50", 0xc4}, {&(0x7f00000002c0)="0dee3f1ad1ffeb0216a03df56d36bf111310f628ea119294fe4e0e48da65b0a02549af90093fec01b9b97ac7a0e2800109a7f302e047d42229431b24bc25c2be39458dc06f34698e71a942e5833fd2e67315984dfc63636801386f6c09972ca333c597984071929f6caebe2fc1c678496b6a3edcbeeaf8592e3da4d70359607ec1dc66a4ca480fbc2e921eb4136872c38777a0f146a993312df41f6b7e607c9da018134a935f11fc3f04df81", 0xac}, {&(0x7f00000006c0)="b09f15eb85bb0fc8c91f60dee4a263311268b94f6d79d7163d606d66a5b79230bf9fc4ef4069092d35a9c7f5c6d1c8fb05380a8b73ace9e4ffbe649db2db442ba504008b312c089c8beba7bb072f33096fc26afb4e0d71a107a4fab4704ab252f889c12b34971383af8a9d2d95c37d3cf24e12dbde36", 0x76}, {&(0x7f0000000740)="56da96f6db92a3b6ddfcc509e9c7e74ce520a3e49ef622e507698a6914795c5b6b54fa3db95f8e75fce1c327fac08795748076d221dcc4fddedfa51b5eaf5fc609657e0d9c3a0e8b08e6d2793da16d64ab0138deaef9c31e16413703d2bfc1cedbf5a78c4b8954f19b346e370a7122d318c01779f96bdb5306353bba3f03647e8512a3b593d51c", 0x87}], 0x5, 0x9, 0x10000, 0x3) [ 1512.591995][ T2334] FAULT_INJECTION: forcing a failure. [ 1512.591995][ T2334] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1512.605372][ T2334] CPU: 1 PID: 2334 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1512.614127][ T2334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1512.624177][ T2334] Call Trace: [ 1512.627542][ T2334] dump_stack+0x137/0x19d [ 1512.631876][ T2334] should_fail+0x23c/0x250 [ 1512.636303][ T2334] __alloc_pages+0x102/0x320 05:35:33 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat$incfs(r1, &(0x7f0000000080)='.log\x00', 0x8440, 0x2) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000005c0)={0x7, {{0xa, 0x4e20, 0x6, @remote, 0x9}}, 0x1, 0xa, [{{0xa, 0x4e21, 0x688, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x40}}, {{0xa, 0x4e22, 0xfffffffd, @local, 0x5caa}}, {{0xa, 0x4e22, 0x3ff, @empty, 0x8}}, {{0xa, 0x4e21, 0x4, @mcast2}}, {{0xa, 0x4e20, 0x2, @private1}}, {{0xa, 0x4e24, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x5}}, {{0xa, 0x4e22, 0x10001, @private1, 0x4}}, {{0xa, 0x4e21, 0x95, @remote, 0x4}}, {{0xa, 0x4e22, 0x9, @loopback, 0x8}}, {{0xa, 0x4e24, 0x8, @mcast1, 0x6}}]}, 0x590) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="b80000001900010000000000000000007f000001000000000000000000000000fc01000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"/112], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x49, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x20) 05:35:33 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x77359400}}, 0x100) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)={[{@norecovery}]}) [ 1512.640978][ T2334] alloc_pages_vma+0x391/0x660 [ 1512.645778][ T2334] wp_page_copy+0x14c/0x10c0 [ 1512.650369][ T2334] ? virtscsi_queuecommand+0x252/0x2d0 [ 1512.655989][ T2334] do_wp_page+0x5a8/0xba0 [ 1512.660328][ T2334] handle_mm_fault+0xb31/0x1a70 [ 1512.665183][ T2334] ? follow_page_mask+0xc2c/0x1040 [ 1512.670300][ T2334] __get_user_pages+0x947/0xee0 [ 1512.675328][ T2334] get_user_pages_unlocked+0x135/0x5f0 [ 1512.680776][ T2334] __gup_longterm_unlocked+0x47/0x110 [ 1512.686218][ T2334] internal_get_user_pages_fast+0xfab/0x1130 05:35:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x1c1000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x32ad, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, 0x0, r0}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000580)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x200}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='fdinfo/4\x00') vmsplice(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="58a66689b42d5129659048fc93faf2ccb53236445c0c90d42362f25fc63ef2eaec059288f6ef9ceb94568897ab09a5505634a2a08e80427fca15ff8ff7ff58dba4f91c508aa570261d11c3b163af351acd675a12d9e6015422a511d2c1daf18997198a3f91de8fff691caf24562c6581d92301224637c1fc1900350eb40686c9b0ea2d898f4f01573dabf6e3bb156efe34bb7b546beaa51e91a6bd5fe361e63c11a85da2a3ac3ddd7e147f97b3efc9fa485f6a1e12", 0xb5}, {&(0x7f0000000300)="76b482b7034fe891fc6121fa2e6bb0de040b95d0db27fea50f8b88e24b210eb61e512ba1ac27d0ca97764dff56b11dd23c1b1638f2329506a524656c3beb22292fb68e3e1ab04c39fe126d41dea69409913f2c5152c789f2a5122c974ff8d7e5866988fd8ac5c969c3174a86dede3113f151914b1f0ee65813ba98a6ad11f3eeda19e442b90e1414d818448d529007fc0c8d0619e2f92e0e69a7d3f5f3baff1cdff36f333c0240e70d1d9643f11745b7d345bbab6e9bd89b235d8f17a8a667d454b3b194", 0xc4}, {&(0x7f0000000400)="4e966fe74f64ffaf836dc285b3ae73fd252d1270c4bf", 0x16}, {&(0x7f0000000440)="bad9c4f27096a859dffe93eb68297ad3f8a4e88628da6a07a2e330899f56bb19dc5305a1b0a09a93e51a83ed33ec3e20bbbf3733de36f2f8ea92e2aee01e5f5f9792296fd8b9a782aa2b6d77d37d2eace75a06eb24eb04e48f1f4ccfad223991264cf7acc3cbaed261160bd98097049b8064f57b56f55f1988661fb8b8b3cb3a01c519c013c1880f8b6d1f2a1aaecf86494e1c500d3b666145b4c765c274947e0ff4e7afefdb5fbc9429f0f882c9a9dd48289b06fbf33ccc0a30f3f62da9119d3917258ae393af86b4d030872245e364ad28f0022d2fcef5194362f34f82ec691ac5a5", 0xe3}], 0x4, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x0) r5 = accept4(r0, 0x0, &(0x7f0000000100), 0x0) poll(&(0x7f0000000140)=[{r5}], 0x1, 0x8000) [ 1512.692257][ T2334] get_user_pages_fast+0x5d/0x80 [ 1512.697238][ T2334] iov_iter_get_pages+0x1e9/0xcc0 [ 1512.702267][ T2334] ? kmem_cache_alloc+0x201/0x2f0 [ 1512.707417][ T2334] ? mempool_alloc_slab+0x16/0x20 [ 1512.712562][ T2334] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1512.717934][ T2334] ? kmem_cache_alloc+0x201/0x2f0 [ 1512.723012][ T2334] ? bio_alloc_bioset+0x27d/0x480 [ 1512.728116][ T2334] iomap_dio_bio_actor+0x673/0xb50 [ 1512.733299][ T2334] iomap_dio_actor+0x26e/0x3b0 [ 1512.738042][ T2334] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1512.743847][ T2334] iomap_apply+0x1e2/0x400 [ 1512.748293][ T2334] __iomap_dio_rw+0x5af/0xad0 [ 1512.752961][ T2334] ? __iomap_dio_rw+0xad0/0xad0 [ 1512.757808][ T2334] iomap_dio_rw+0x30/0x70 [ 1512.762133][ T2334] ext4_file_read_iter+0x21a/0x290 [ 1512.767309][ T2334] aio_read+0x1c1/0x280 [ 1512.771450][ T2334] ? kmem_cache_alloc+0x201/0x2f0 [ 1512.776555][ T2334] io_submit_one+0x7fb/0x1350 [ 1512.781227][ T2334] __se_sys_io_submit+0xf5/0x260 [ 1512.786161][ T2334] __x64_sys_io_submit+0x3f/0x50 [ 1512.791077][ T2334] do_syscall_64+0x4a/0x90 [ 1512.795487][ T2334] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1512.801437][ T2334] RIP: 0033:0x4665d9 [ 1512.805398][ T2334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1512.825472][ T2334] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1512.833946][ T2334] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 05:35:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000400000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1512.841899][ T2334] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1512.849866][ T2334] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1512.857817][ T2334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1512.865799][ T2334] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1512.908981][ T2323] loop3: detected capacity change from 0 to 512 [ 1512.918478][ T2323] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1512.922079][ T2364] loop1: detected capacity change from 0 to 264192 [ 1512.936684][ T2364] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000005000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1512.953906][ T2359] loop4: detected capacity change from 0 to 184 05:35:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000014000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000003760000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1513.014465][ T2376] loop3: detected capacity change from 0 to 512 [ 1513.023315][ T2376] EXT4-fs (loop3): fragment/cluster size (32768) != block size (1024) 05:35:33 executing program 5 (fault-call:9 fault-nth:6): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1513.091214][ T2376] loop3: detected capacity change from 0 to 512 [ 1513.102839][ T2376] EXT4-fs (loop3): fragment/cluster size (32768) != block size (1024) [ 1513.117031][ T2384] loop4: detected capacity change from 0 to 184 [ 1513.123766][ T2389] loop1: detected capacity change from 0 to 264192 [ 1513.162528][ T2395] FAULT_INJECTION: forcing a failure. [ 1513.162528][ T2395] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1513.175813][ T2395] CPU: 1 PID: 2395 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1513.184480][ T2395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1513.194532][ T2395] Call Trace: [ 1513.197824][ T2395] dump_stack+0x137/0x19d [ 1513.202146][ T2395] should_fail+0x23c/0x250 [ 1513.206572][ T2395] __alloc_pages+0x102/0x320 [ 1513.211146][ T2395] alloc_pages_vma+0x391/0x660 [ 1513.216010][ T2395] ? unlock_page_memcg+0xc3/0xe0 [ 1513.220929][ T2395] ? page_remove_rmap+0x1de/0x230 [ 1513.225938][ T2395] wp_page_copy+0x14c/0x10c0 [ 1513.230638][ T2395] do_wp_page+0x5a8/0xba0 [ 1513.235030][ T2395] handle_mm_fault+0xb31/0x1a70 [ 1513.239868][ T2395] ? follow_page_mask+0xc2c/0x1040 [ 1513.245049][ T2395] __get_user_pages+0x947/0xee0 [ 1513.249899][ T2395] get_user_pages_unlocked+0x135/0x5f0 [ 1513.255567][ T2395] __gup_longterm_unlocked+0x47/0x110 [ 1513.260987][ T2395] internal_get_user_pages_fast+0xfab/0x1130 [ 1513.266947][ T2395] get_user_pages_fast+0x5d/0x80 [ 1513.272130][ T2395] iov_iter_get_pages+0x1e9/0xcc0 [ 1513.277214][ T2395] ? kmem_cache_alloc+0x201/0x2f0 [ 1513.282218][ T2395] ? mempool_alloc_slab+0x16/0x20 [ 1513.287302][ T2395] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1513.292908][ T2395] ? kmem_cache_alloc+0x201/0x2f0 [ 1513.297935][ T2395] ? bio_alloc_bioset+0x27d/0x480 [ 1513.302954][ T2395] iomap_dio_bio_actor+0x673/0xb50 [ 1513.308072][ T2395] iomap_dio_actor+0x26e/0x3b0 [ 1513.312886][ T2395] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1513.318724][ T2395] iomap_apply+0x1e2/0x400 [ 1513.323179][ T2395] __iomap_dio_rw+0x5af/0xad0 [ 1513.327883][ T2395] ? __iomap_dio_rw+0xad0/0xad0 [ 1513.332809][ T2395] iomap_dio_rw+0x30/0x70 [ 1513.337127][ T2395] ext4_file_read_iter+0x21a/0x290 [ 1513.342237][ T2395] aio_read+0x1c1/0x280 [ 1513.346399][ T2395] ? kmem_cache_alloc+0x201/0x2f0 [ 1513.351863][ T2395] io_submit_one+0x7fb/0x1350 [ 1513.356584][ T2395] __se_sys_io_submit+0xf5/0x260 [ 1513.361661][ T2395] __x64_sys_io_submit+0x3f/0x50 [ 1513.366623][ T2395] do_syscall_64+0x4a/0x90 [ 1513.371125][ T2395] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1513.377035][ T2395] RIP: 0033:0x4665d9 [ 1513.380911][ T2395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1513.400764][ T2395] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 05:35:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000006000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1513.409193][ T2395] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1513.417238][ T2395] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1513.425268][ T2395] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1513.433481][ T2395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1513.441473][ T2395] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000890000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1513.458740][ T2389] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1513.466023][ T2399] loop3: detected capacity change from 0 to 512 [ 1513.500891][ T2399] EXT4-fs (loop3): fragment/cluster size (65536) != block size (1024) 05:35:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'sit0\x00', {0x3}, 0x800}) 05:35:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000015000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/171, 0xab}, {&(0x7f0000001300)}, {&(0x7f0000001340)=""/24, 0x18}, {&(0x7f0000001380)=""/23, 0x17}, {&(0x7f00000013c0)=""/58, 0x3a}], 0x5, 0xd9f, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r1, r0, 0x0) getdents(r0, &(0x7f0000000280)=""/200, 0xc8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r3, r2, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000180)={{r3}, 0x0, 0x1a, @unused=[0x9, 0x28, 0x7, 0x7fff], @devid}) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000001480)=ANY=[@ANYBLOB="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"], 0xa8}, 0x1, 0x0, 0x0, 0x4000004}, 0x800) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$TCFLSH(r4, 0x4b40, 0x0) [ 1513.549638][ T2395] syz-executor.5 (2395) used greatest stack depth: 9304 bytes left [ 1513.562494][ T2399] loop3: detected capacity change from 0 to 512 [ 1513.570504][ T2399] EXT4-fs (loop3): fragment/cluster size (65536) != block size (1024) [ 1513.583051][ T2416] loop4: detected capacity change from 0 to 184 05:35:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8ffffff8c0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='@']) connect$unix(r0, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e22}, 0x6e) preadv(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/77, 0x4d}, {&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000000400)=""/205, 0xcd}], 0x3, 0x7, 0xffffffb9) syz_mount_image$tmpfs(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300070, &(0x7f0000001640)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x65]}}]}) 05:35:34 executing program 5 (fault-call:9 fault-nth:7): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:34 executing program 2: set_mempolicy(0x3, &(0x7f0000002a40)=0x5, 0x8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0xffffffffffff939d) 05:35:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000007000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000016000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1513.668687][ T2430] loop1: detected capacity change from 0 to 264192 [ 1513.676772][ T2430] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1513.694944][ T2441] tmpfs: Unknown parameter '@…C' [ 1513.703820][ T2435] loop4: detected capacity change from 0 to 184 05:35:34 executing program 0: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00e1000008000100", @ANYRES32=0x0, @ANYBLOB="10000100000000002000000000000000"], 0x2c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) socket$netlink(0x10, 0x3, 0x10) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) r5 = creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r5, 0x0, 0x8}) mknodat(r6, &(0x7f0000000080)='./bus\x00', 0x8000, 0x81) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r8 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r8, r7, 0x0) getdents(r7, &(0x7f0000000280)=""/200, 0xc8) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x81, 0x81, 0x2, 0x4d, 0x0, 0x6, 0x0, 0xf, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x4400, 0x6, 0x2010, 0x0, 0x37c7, 0x20, 0x24, 0x0, 0x8, 0x0, 0x8}, 0xffffffffffffffff, 0x2, r7, 0x1) 05:35:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80000edc00000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1513.722640][ T2441] tmpfs: Unknown parameter '@…C' [ 1513.744642][ T2445] loop3: detected capacity change from 0 to 512 [ 1513.757200][ T2445] EXT4-fs (loop3): fragment/cluster size (131072) != block size (1024) [ 1513.764806][ T2456] FAULT_INJECTION: forcing a failure. [ 1513.764806][ T2456] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1513.778799][ T2456] CPU: 1 PID: 2456 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1513.788120][ T2456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1513.798616][ T2456] Call Trace: [ 1513.801983][ T2456] dump_stack+0x137/0x19d [ 1513.806586][ T2456] should_fail+0x23c/0x250 [ 1513.811128][ T2456] __alloc_pages+0x102/0x320 [ 1513.815916][ T2456] alloc_pages_vma+0x391/0x660 [ 1513.821377][ T2456] ? unlock_page_memcg+0xc3/0xe0 [ 1513.826664][ T2456] ? page_remove_rmap+0x1de/0x230 [ 1513.831711][ T2456] wp_page_copy+0x14c/0x10c0 [ 1513.836446][ T2456] do_wp_page+0x5a8/0xba0 [ 1513.840766][ T2456] handle_mm_fault+0xb31/0x1a70 [ 1513.845776][ T2456] ? follow_page_mask+0xc2c/0x1040 [ 1513.850873][ T2456] __get_user_pages+0x947/0xee0 [ 1513.855751][ T2456] get_user_pages_unlocked+0x135/0x5f0 [ 1513.861194][ T2456] __gup_longterm_unlocked+0x47/0x110 [ 1513.866571][ T2456] internal_get_user_pages_fast+0xfab/0x1130 [ 1513.872623][ T2456] get_user_pages_fast+0x5d/0x80 [ 1513.877556][ T2456] iov_iter_get_pages+0x1e9/0xcc0 [ 1513.882841][ T2456] ? kmem_cache_alloc+0x201/0x2f0 [ 1513.888224][ T2456] ? mempool_alloc_slab+0x16/0x20 [ 1513.893704][ T2456] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1513.899385][ T2456] ? kmem_cache_alloc+0x201/0x2f0 [ 1513.904489][ T2456] ? bio_alloc_bioset+0x27d/0x480 [ 1513.909608][ T2456] iomap_dio_bio_actor+0x673/0xb50 [ 1513.914966][ T2456] iomap_dio_actor+0x26e/0x3b0 [ 1513.920276][ T2456] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1513.926534][ T2456] iomap_apply+0x1e2/0x400 [ 1513.931268][ T2456] __iomap_dio_rw+0x5af/0xad0 [ 1513.935933][ T2456] ? __iomap_dio_rw+0xad0/0xad0 [ 1513.940866][ T2456] iomap_dio_rw+0x30/0x70 [ 1513.945932][ T2456] ext4_file_read_iter+0x21a/0x290 [ 1513.951133][ T2456] aio_read+0x1c1/0x280 [ 1513.955284][ T2456] ? kmem_cache_alloc+0x201/0x2f0 [ 1513.960359][ T2456] io_submit_one+0x7fb/0x1350 [ 1513.965025][ T2456] __se_sys_io_submit+0xf5/0x260 [ 1513.970105][ T2456] __x64_sys_io_submit+0x3f/0x50 [ 1513.975038][ T2456] do_syscall_64+0x4a/0x90 [ 1513.979441][ T2456] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1513.985504][ T2456] RIP: 0033:0x4665d9 [ 1513.989428][ T2456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1514.009698][ T2456] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1514.018197][ T2456] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1514.026345][ T2456] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1514.034571][ T2456] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 05:35:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000008000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:34 executing program 0: mkdir(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000040)=""/231, 0xe7}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000140)=""/238, 0xee}, {&(0x7f0000000440)=""/115, 0x73}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/4096, 0x1000}], 0x6, 0xd9f, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r2, r1, 0x0) getdents(r1, &(0x7f0000000280)=""/200, 0xc8) mmap(&(0x7f000035f000/0x2000)=nil, 0x2000, 0x1000008, 0x11, r1, 0x825e1000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r3, 0x0) mkdir(&(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x38) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r4, r3, 0x0) getdents(r3, &(0x7f0000000280)=""/200, 0xc8) preadv(r3, &(0x7f0000000280), 0x0, 0xe9fe, 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') preadv(r2, &(0x7f00000038c0)=[{&(0x7f0000000240)=""/8, 0x8}, {&(0x7f0000000580)=""/199, 0xc7}, {&(0x7f0000003780)=""/215, 0xd7}, {&(0x7f0000000380)=""/49, 0x31}, {&(0x7f0000000680)=""/10, 0xa}, {&(0x7f0000003880)=""/43, 0x2b}], 0x6, 0x8, 0x7fff) [ 1514.042547][ T2456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1514.051507][ T2456] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1514.103975][ T2460] loop1: detected capacity change from 0 to 264192 [ 1514.114764][ T2460] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1514.129433][ T2467] loop3: detected capacity change from 0 to 512 [ 1514.138181][ T2468] loop4: detected capacity change from 0 to 184 05:35:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000017000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8ffffffda0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x400182, 0x0) writev(r3, &(0x7f0000001580)=[{&(0x7f0000000140)="3a07e686b9524c30d5cee7036828da673807ed10a2ad0a8197592cbf89bf70f057d576a5b10ea1020917783611547446421e52959d73d22323d9c943088a921575b8da6954e24c5c7e5e8e6cfec0edb402f9f95e111d1ccaaa53e6875da2a49548b686a911923500fae2ebb43878c66a59b046858857acf35341876211e55dd36cba671cb8fac65dba81b3457bc4e7da35ab681699b2924467550cbac3", 0x9d}, {&(0x7f0000000200)="70351c1ddad68896ca48e6379fe4872b5670ad4558d9bef0bd744330ae2658eca9a4a5cdb38a2424dae28be57706a7f58ad310a6069dde55eeb179adec7e7c0a76db56411b", 0x45}, {&(0x7f00000000c0)="11d5b2329be80d4515f179cc5ef855fc2eb03d1ca88845cdfe4fa5d7eac27361319c7f38e4e04a25b385058590276bb0ae7fce5e9308253c", 0x38}, {&(0x7f0000000280)="fe817069aa48a9c8831defdc15d056aba355c532d368de59393710373c8332eb39b8eac25bc90de51f0f8e9c91a41c68bb0eb6f7a294f36627fe458e3aa002bd09ab94bb8f622294b33edbbbc53727d0c699bfe7a40b9144c84a40c6bc127286b7703fd3348d651eb8a670bf2f6be69b2c291635a247f5e7153223c9ae39c7447320c94ab6dccb9c0b8615490eaa42d9f1b695c0f9f24b4c94f85544871e2fba694b83800c65ef57fee59550fb4798471e7b957128e3df7e06cc85acf9b912c1152f79bf3c27f006fba565b264ebfce1becbac8dddf177", 0xd7}, {&(0x7f0000000380)="31f09e19dcae40a4bd59863052bac230d31cf4d6082210dd61c34b0b191be0153a", 0x21}, {&(0x7f00000003c0)="acfa6b818a4edb6b9aa277ea35f82b9b94fbab5add833386b3a37ca415e69b0f33fbf7ea9afc0d99c99d97374a0ba5c22be6a63963b396b1dd565ac9fa2bd7998ba2210e5ae7cc717cf6cf4fd8acc6418d135fb7b51552e88fe21e73afcc129aadcc82d53ac2f1bc84c7561cbe8708db6408242b4262f60d56a92742388634e74550ef0e7672b301d562e5d620d8cca8332656913d94f40ac253faae2baa91c431ebeb83ec95bbdcdd00840cbfc09e3864b443c1f776d44eed5269e34268bc", 0xbf}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="6119294e63e4a9a021abc82e7747f74ab84b809a305d0443f424540e1b1c3e59094aed92f479a43f47e52eb60742c57fc67e22717870d8e5f84b06b28ffcd0dd9aeddbe55768066f7376e7e83e6d6525eb0b906991d1c90c62893030c0813de44d8825281dcc510fa6ee78e50b156037e81a174f9de06e30130ecdd0e08915b15f0174d9560d9a0a53aa2a85c49ec31a65616d6650c2d91127bde888d77a1e72b771e2fb3f19c958a90e6194f6c164e8a9dc2214e84ffbad3ca76cd99a8105b43c7ef4188c080f582f42f03e185fb5", 0xcf}], 0x8) close(r1) [ 1514.150063][ T2467] EXT4-fs (loop3): fragment/cluster size (262144) != block size (1024) 05:35:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000009000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1514.209212][ T2485] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1514.240456][ T2484] loop4: detected capacity change from 0 to 184 [ 1514.244131][ T2485] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 05:35:34 executing program 5 (fault-call:9 fault-nth:8): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:34 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x76, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r4, r3, 0x0) r5 = dup3(r4, r0, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r6, 0xc400941b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000d80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_BALANCE_V2(r6, 0xc4009420, &(0x7f0000000500)={0x6, 0x4, {0x3, @struct={0x0, 0x5}, 0x0, 0x7, 0x6, 0x10001, 0x7, 0x7bc2, 0x0, @struct={0x2, 0x2}, 0x5, 0x1, [0x4, 0x7, 0xfffffffffffffff8, 0x0, 0x4, 0x40c]}, {0x4a, @usage=0x2, r7, 0x3, 0x800, 0x0, 0x8, 0x81, 0x428, @struct={0x1, 0x20}, 0x0, 0x2, [0x100000001, 0x1, 0x5, 0x1, 0x8000, 0x9]}, {0x7, @usage=0xffffffff, r8, 0x2, 0x0, 0x0, 0x4, 0x1f, 0x90, @usage=0x102, 0xe0000000, 0x6, [0x8000, 0x9d86, 0x2, 0xf4e, 0x1, 0x3]}, {0x0, 0x9adb, 0x5f2}}) ioctl$BTRFS_IOC_BALANCE_V2(r5, 0xc4009420, &(0x7f0000000580)={0x18, 0x7, {0x2, @struct={0xfff, 0x6fc6}, 0x0, 0x8, 0x0, 0x1, 0x8000, 0x1, 0x4, @usage=0x40, 0x7a, 0x0, [0x5, 0x2, 0xfffffffffffffff9, 0x3f, 0x1000, 0x5]}, {0x0, @usage=0xf7, r8, 0xd39b, 0x7, 0x1, 0x0, 0x1000, 0x8, @usage=0x80000000, 0xfffff652, 0x3f, [0x5d, 0x7, 0x3, 0x3, 0x6, 0xfffffffffffffffb]}, {0x8001, @struct={0x1f, 0x1}, 0x0, 0x200, 0x80, 0x0, 0x1, 0x0, 0x400, @struct={0x1ff, 0x14d61b75}, 0x4, 0x3, [0x5, 0x1, 0x400, 0x4, 0x6, 0x1]}, {0x800, 0x1f, 0x20}}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x40ac00) poll(&(0x7f00000000c0), 0x0, 0x5) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 05:35:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000002ea0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:34 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000780)={0x0, @l2tp={0x2, 0x0, @loopback}, @l2tp={0x2, 0x0, @remote}, @ipx={0x4, 0x0, 0x0, "65fe080b9c9a"}, 0x4}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) pipe2(&(0x7f00000000c0), 0x84000) sendto$inet(r1, &(0x7f0000000040)="c2e75d594c90f289d2a361", 0xb, 0x10, &(0x7f0000000080)={0x2, 0x4e21, @private=0xa010101}, 0x10) [ 1514.270629][ T2456] syz-executor.5 (2456) used greatest stack depth: 8600 bytes left [ 1514.286224][ T2497] loop1: detected capacity change from 0 to 264192 [ 1514.293885][ T2494] loop3: detected capacity change from 0 to 512 [ 1514.318185][ T2497] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1514.329087][ T2494] EXT4-fs (loop3): fragment/cluster size (524288) != block size (1024) [ 1514.344220][ T2514] loop4: detected capacity change from 0 to 184 [ 1514.410898][ T2520] FAULT_INJECTION: forcing a failure. [ 1514.410898][ T2520] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1514.424515][ T2520] CPU: 1 PID: 2520 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1514.433572][ T2520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1514.443629][ T2520] Call Trace: [ 1514.446914][ T2520] dump_stack+0x137/0x19d [ 1514.451250][ T2520] should_fail+0x23c/0x250 [ 1514.455687][ T2520] __alloc_pages+0x102/0x320 [ 1514.460290][ T2520] alloc_pages_vma+0x391/0x660 [ 1514.465137][ T2520] ? unlock_page_memcg+0xc3/0xe0 [ 1514.470227][ T2520] ? page_remove_rmap+0x1de/0x230 [ 1514.475353][ T2520] wp_page_copy+0x14c/0x10c0 [ 1514.479984][ T2520] do_wp_page+0x5a8/0xba0 [ 1514.484323][ T2520] handle_mm_fault+0xb31/0x1a70 [ 1514.489190][ T2520] ? follow_page_mask+0xc2c/0x1040 [ 1514.494314][ T2520] __get_user_pages+0x947/0xee0 [ 1514.499179][ T2520] get_user_pages_unlocked+0x135/0x5f0 [ 1514.504723][ T2520] __gup_longterm_unlocked+0x47/0x110 [ 1514.510456][ T2520] internal_get_user_pages_fast+0xfab/0x1130 [ 1514.516458][ T2520] get_user_pages_fast+0x5d/0x80 [ 1514.521415][ T2520] iov_iter_get_pages+0x1e9/0xcc0 [ 1514.526932][ T2520] ? kmem_cache_alloc+0x201/0x2f0 [ 1514.531981][ T2520] ? mempool_alloc_slab+0x16/0x20 [ 1514.537016][ T2520] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1514.542472][ T2520] ? kmem_cache_alloc+0x201/0x2f0 [ 1514.547503][ T2520] ? bio_alloc_bioset+0x27d/0x480 [ 1514.552534][ T2520] iomap_dio_bio_actor+0x673/0xb50 [ 1514.557650][ T2520] iomap_dio_actor+0x26e/0x3b0 [ 1514.562413][ T2520] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1514.568226][ T2520] iomap_apply+0x1e2/0x400 [ 1514.572639][ T2520] __iomap_dio_rw+0x5af/0xad0 [ 1514.577317][ T2520] ? __iomap_dio_rw+0xad0/0xad0 [ 1514.582342][ T2520] iomap_dio_rw+0x30/0x70 [ 1514.586674][ T2520] ext4_file_read_iter+0x21a/0x290 [ 1514.591884][ T2520] aio_read+0x1c1/0x280 [ 1514.596120][ T2520] ? kmem_cache_alloc+0x201/0x2f0 [ 1514.601159][ T2520] io_submit_one+0x7fb/0x1350 [ 1514.605857][ T2520] __se_sys_io_submit+0xf5/0x260 [ 1514.611155][ T2520] __x64_sys_io_submit+0x3f/0x50 [ 1514.616110][ T2520] do_syscall_64+0x4a/0x90 [ 1514.620680][ T2520] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1514.626617][ T2520] RIP: 0033:0x4665d9 [ 1514.630573][ T2520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1514.650189][ T2520] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 05:35:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000000a000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000018000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r2, r1, 0x0) fallocate(r0, 0x48, 0x0, 0x8002) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000002000038000000c20200006b", 0x65, 0x400}, {&(0x7f0000000040)="0000000000000000000000002f527b4327a84164871303f1137e59080100403468f629ba91f73713e930ed1e0b2b09f0649c677d90f5780519b1a69e4de5226d086591982b5586660dcef9e44c50e41dcdef2c1d9be1fbe980123c24137c0ea26b122ebb783364f64b0631d4a3d3642709290077b80c5877df4dc03fb6", 0x7d, 0x4e0}], 0x0, &(0x7f0000014600)) 05:35:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8fffffff00000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1514.658743][ T2520] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1514.666723][ T2520] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1514.674701][ T2520] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1514.682696][ T2520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1514.690674][ T2520] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:35 executing program 0: set_mempolicy(0x1, 0x0, 0x0) symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='./file0\x00') symlink(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000008c0)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r1, r0, 0x0) getdents(r0, &(0x7f0000000280)=""/200, 0xc8) faccessat(r0, &(0x7f0000000140)='./file1\x00', 0xab) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r2, &(0x7f0000008600)=[{{0x0, 0x38, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0xfffffdef}}], 0x2, 0x0) open(&(0x7f0000000000)='./file1\x00', 0x40041, 0x0) [ 1514.735249][ T2527] loop1: detected capacity change from 0 to 264192 [ 1514.742299][ T2531] loop3: detected capacity change from 0 to 512 [ 1514.748951][ T2527] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1514.753340][ T2531] EXT4-fs (loop3): fragment/cluster size (1048576) != block size (1024) 05:35:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000019000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1514.798720][ T2542] loop4: detected capacity change from 0 to 184 [ 1514.834563][ T2531] loop3: detected capacity change from 0 to 512 05:35:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8fffffff60000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:35 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x0, 0x0, 0x4, 0x1, "f9d48be4b8016875c981a1bef883338e562790fc6e1f09be0ff78b6f3b058d95a4844671e70893eb2202cf25f0fad2613c18194aff3c42794365822767ce6c61758b72a68fbc1901c53930150160da53b70cf76e13252a0fb21dd4c8109b56bbffe28c166adec7939239c83454fe0765c4366059b69912762e5a2f30c7ff2ff7385ce494e1fd18ba0b0b835f5e9f000bf8d5abfdb4e9d4b3b7a464b6145e6e8b04cc053cfcd4bf984708ee36b6f6af4df6f4763de1e20721"}, 0xc8) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x80) r1 = socket$inet(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000280)="240000001a005f0014f9e407000904000200000074", 0x15) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @broadcast}}) [ 1514.847425][ T2531] EXT4-fs (loop3): fragment/cluster size (1048576) != block size (1024) [ 1514.866621][ T2554] loop1: detected capacity change from 0 to 264192 05:35:35 executing program 5 (fault-call:9 fault-nth:9): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1514.894025][ T2554] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1514.916282][ T2562] loop4: detected capacity change from 0 to 184 [ 1515.009618][ T2580] FAULT_INJECTION: forcing a failure. [ 1515.009618][ T2580] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1515.022904][ T2580] CPU: 1 PID: 2580 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1515.031725][ T2580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1515.041867][ T2580] Call Trace: [ 1515.045154][ T2580] dump_stack+0x137/0x19d [ 1515.049567][ T2580] should_fail+0x23c/0x250 [ 1515.054031][ T2580] __alloc_pages+0x102/0x320 [ 1515.058679][ T2580] alloc_pages_vma+0x391/0x660 [ 1515.063446][ T2580] ? unlock_page_memcg+0xc3/0xe0 [ 1515.068465][ T2580] ? page_remove_rmap+0x1de/0x230 [ 1515.073486][ T2580] wp_page_copy+0x14c/0x10c0 [ 1515.078126][ T2580] do_wp_page+0x5a8/0xba0 [ 1515.082485][ T2580] handle_mm_fault+0xb31/0x1a70 [ 1515.087465][ T2580] ? follow_page_mask+0xc2c/0x1040 [ 1515.092649][ T2580] __get_user_pages+0x947/0xee0 [ 1515.097505][ T2580] get_user_pages_unlocked+0x135/0x5f0 [ 1515.103078][ T2580] __gup_longterm_unlocked+0x47/0x110 [ 1515.108567][ T2580] internal_get_user_pages_fast+0xfab/0x1130 [ 1515.114535][ T2580] get_user_pages_fast+0x5d/0x80 [ 1515.119574][ T2580] iov_iter_get_pages+0x1e9/0xcc0 [ 1515.124987][ T2580] ? kmem_cache_alloc+0x201/0x2f0 [ 1515.129993][ T2580] ? mempool_alloc_slab+0x16/0x20 [ 1515.135027][ T2580] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1515.140522][ T2580] ? kmem_cache_alloc+0x201/0x2f0 [ 1515.145628][ T2580] ? bio_alloc_bioset+0x27d/0x480 [ 1515.150656][ T2580] iomap_dio_bio_actor+0x673/0xb50 [ 1515.155929][ T2580] iomap_dio_actor+0x26e/0x3b0 [ 1515.160706][ T2580] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1515.166495][ T2580] iomap_apply+0x1e2/0x400 [ 1515.170991][ T2580] __iomap_dio_rw+0x5af/0xad0 [ 1515.175655][ T2580] ? __iomap_dio_rw+0xad0/0xad0 [ 1515.180553][ T2580] iomap_dio_rw+0x30/0x70 [ 1515.184930][ T2580] ext4_file_read_iter+0x21a/0x290 [ 1515.190274][ T2580] aio_read+0x1c1/0x280 [ 1515.194479][ T2580] ? kmem_cache_alloc+0x201/0x2f0 [ 1515.199517][ T2580] io_submit_one+0x7fb/0x1350 [ 1515.204186][ T2580] __se_sys_io_submit+0xf5/0x260 [ 1515.209193][ T2580] __x64_sys_io_submit+0x3f/0x50 [ 1515.214125][ T2580] do_syscall_64+0x4a/0x90 [ 1515.218545][ T2580] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1515.224425][ T2580] RIP: 0033:0x4665d9 [ 1515.228314][ T2580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.247918][ T2580] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 05:35:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8fffffdf90000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000000b000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000001a000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:35 executing program 0: creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) io_setup(0x9, &(0x7f0000000180)) io_setup(0x7fffffff, &(0x7f0000000080)=0x0) io_submit(r2, 0x2, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000600)="9b", 0x1}, &(0x7f00000005c0)={0x0, 0x0, 0x8, 0x0, 0x0, r1, 0x0}]) 05:35:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r2, 0x8008f512, &(0x7f0000000580)) dup3(r1, r0, 0x0) preadv(r1, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/75, 0x4b}, {&(0x7f0000000140)=""/115, 0x73}, {&(0x7f00000001c0)=""/209, 0xd1}, {&(0x7f00000002c0)=""/111, 0x6f}, {&(0x7f0000000340)=""/195, 0xc3}, {&(0x7f0000000440)=""/166, 0xa6}], 0x6, 0x1, 0x4) syz_mount_image$iso9660(&(0x7f0000001200), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000001bc0), 0x240090, &(0x7f0000000080)=ANY=[@ANYBLOB='dmode=0x0000000000rockperm,map=normal,\x00']) [ 1515.256318][ T2580] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1515.264277][ T2580] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1515.272245][ T2580] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.280207][ T2580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1515.288160][ T2580] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000180)=0x573, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000040)=""/9, 0x9}], 0x1, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=@expire={0x1c4, 0x18, 0x200, 0x70bd26, 0x25dfdbfb, {{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x4e22, 0xde4, 0x4e24, 0x0, 0xa, 0x20, 0x80, 0x2, 0x0, 0xee01}, {@in6=@mcast1, 0x4d3, 0x32}, @in=@loopback, {0x3, 0xaef, 0x9, 0xfffffffffffffffe, 0x8, 0x5, 0x7, 0x7e}, {0x8000, 0x80000001, 0x3, 0xffffffff7fffffff}, {0xff, 0x8, 0x2}, 0x70bd28, 0x3501, 0x2, 0x4, 0x7f, 0x8}, 0xd5}, [@lastused={0xc, 0xf, 0x7}, @lifetime_val={0x24, 0x9, {0xfffffffffffffc00, 0x50, 0x60, 0xfff}}, @migrate={0x9c, 0x11, [{@in=@rand_addr=0x64010101, @in=@loopback, @in=@broadcast, @in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x32, 0x2, 0x0, 0x34ff, 0xa, 0x2}, {@in=@multicast1, @in6=@mcast2, @in6=@private1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0xff, 0x1, 0x0, 0x3504, 0xa, 0x4}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x4000}, 0x20008010) 05:35:35 executing program 2: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffc000/0x4000)=nil) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3002, 0xe, 0xffffffffffffffff) [ 1515.334047][ T2595] loop4: detected capacity change from 0 to 184 [ 1515.340651][ T2596] loop3: detected capacity change from 0 to 512 [ 1515.350678][ T2597] loop1: detected capacity change from 0 to 264192 [ 1515.368819][ T2597] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:35 executing program 2: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000340)="e64c2203c10adc4743d3b3f602baaca0e31f129c0cfd4e7ec6c6ddc3e54f2bfbba0a4df1193cba0aabf221ab0b078dc758bfb49080c30531b9135b9d66c840e3dbfc92a403712a8b0e94637dd6be03eb6df4ad94f4f717df8feefd35492c61d8d4a3086d24", 0x65}], 0x1, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xff, 0x0, 0xff, 0x3, 0x0, 0x800, 0x828b1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000000}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xbf00, 0x6, 0x0, 0x48}, 0x0, 0x8, 0xffffffffffffffff, 0x3) dup3(r1, r3, 0x0) writev(r4, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 05:35:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000002fb0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:35 executing program 5 (fault-call:9 fault-nth:10): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:35 executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000000c0)={0xffffffffffffffff, 0x7, 0x0, 0x32f}) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, 0x4, 0xa, 0x201, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x2}, @NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}, @NFTA_CHAIN_FLAGS={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000004}, 0x40844) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000006, 0x200000006c832, 0xffffffffffffffff, 0x0) mprotect(&(0x7f00002d0000/0x1000)=nil, 0x1000, 0x2) mprotect(&(0x7f0000168000/0x3000)=nil, 0x3000, 0x2000002) mbind(&(0x7f000039f000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000000)=0xffffffffffffff00, 0x6, 0x4) [ 1515.411712][ T2596] EXT4-fs (loop3): fragment/cluster size (2097152) != block size (1024) 05:35:35 executing program 0: ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2286, 0x816e000) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@shmem={0xc, 0x1, {0xb}}, 0x340140) [ 1515.461937][ T2596] loop3: detected capacity change from 0 to 512 [ 1515.480511][ T2596] EXT4-fs (loop3): fragment/cluster size (2097152) != block size (1024) [ 1515.503446][ T2634] loop4: detected capacity change from 0 to 184 05:35:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8fffffdfd0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1515.506015][ T2618] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1515.541891][ T2618] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1515.557057][ T2639] FAULT_INJECTION: forcing a failure. [ 1515.557057][ T2639] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1515.570529][ T2639] CPU: 1 PID: 2639 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1515.579319][ T2639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1515.589390][ T2639] Call Trace: [ 1515.592671][ T2639] dump_stack+0x137/0x19d [ 1515.597113][ T2639] should_fail+0x23c/0x250 [ 1515.601536][ T2639] __alloc_pages+0x102/0x320 [ 1515.606135][ T2639] alloc_pages_vma+0x391/0x660 05:35:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000000c000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000001b000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:36 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000040)={0x1, 0x1000000000000000}) r1 = syz_open_dev$vcsu(&(0x7f0000000100), 0x8001, 0x20400) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000080)={0x89ed, 0x0, 0x0, 0x6, 0x0, "030000000000000080002b6700007eb700", 0x0, 0x5}) ioctl$TCSETSW2(r0, 0x5412, &(0x7f0000000000)={0x80ffffff, 0x0, 0x0, 0xfffffffd, 0x0, "b68f340fcf6da93110d5e970ff01000000b26c", 0x0, 0x40000000}) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6000, 0x7f) ioctl$TCXONC(r2, 0x540a, 0x1) [ 1515.610909][ T2639] ? unlock_page_memcg+0xc3/0xe0 [ 1515.615941][ T2639] ? page_remove_rmap+0x1de/0x230 [ 1515.620980][ T2639] wp_page_copy+0x14c/0x10c0 [ 1515.625591][ T2639] do_wp_page+0x5a8/0xba0 [ 1515.629962][ T2639] handle_mm_fault+0xb31/0x1a70 [ 1515.634822][ T2639] ? follow_page_mask+0xc2c/0x1040 [ 1515.639959][ T2639] __get_user_pages+0x947/0xee0 [ 1515.644901][ T2639] get_user_pages_unlocked+0x135/0x5f0 [ 1515.650472][ T2639] __gup_longterm_unlocked+0x47/0x110 [ 1515.655852][ T2639] internal_get_user_pages_fast+0xfab/0x1130 [ 1515.656642][ T2657] loop1: detected capacity change from 0 to 264192 [ 1515.661882][ T2639] get_user_pages_fast+0x5d/0x80 [ 1515.661903][ T2639] iov_iter_get_pages+0x1e9/0xcc0 [ 1515.668592][ T2656] loop3: detected capacity change from 0 to 512 [ 1515.673321][ T2639] ? kmem_cache_alloc+0x201/0x2f0 [ 1515.673346][ T2639] ? mempool_alloc_slab+0x16/0x20 [ 1515.684047][ T2656] EXT4-fs (loop3): fragment/cluster size (4194304) != block size (1024) [ 1515.685283][ T2639] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1515.685370][ T2639] ? kmem_cache_alloc+0x201/0x2f0 [ 1515.685387][ T2639] ? bio_alloc_bioset+0x27d/0x480 [ 1515.707007][ T2657] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1515.709103][ T2639] iomap_dio_bio_actor+0x673/0xb50 [ 1515.709131][ T2639] iomap_dio_actor+0x26e/0x3b0 [ 1515.739485][ T2639] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1515.745406][ T2639] iomap_apply+0x1e2/0x400 [ 1515.749830][ T2639] __iomap_dio_rw+0x5af/0xad0 [ 1515.754528][ T2639] ? __iomap_dio_rw+0xad0/0xad0 [ 1515.759380][ T2639] iomap_dio_rw+0x30/0x70 [ 1515.763723][ T2639] ext4_file_read_iter+0x21a/0x290 [ 1515.768885][ T2639] aio_read+0x1c1/0x280 [ 1515.773077][ T2639] ? kmem_cache_alloc+0x201/0x2f0 [ 1515.778109][ T2639] io_submit_one+0x7fb/0x1350 [ 1515.782788][ T2639] __se_sys_io_submit+0xf5/0x260 [ 1515.787735][ T2639] __x64_sys_io_submit+0x3f/0x50 [ 1515.792754][ T2639] do_syscall_64+0x4a/0x90 [ 1515.797263][ T2639] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1515.803188][ T2639] RIP: 0033:0x4665d9 [ 1515.807125][ T2639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.826739][ T2639] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1515.835290][ T2639] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1515.843268][ T2639] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1515.851265][ T2639] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 05:35:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/200, 0xc8) io_submit(0x0, 0x5, &(0x7f0000000c40)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x3, r0, &(0x7f0000000280)="ec1a2b9d0ca745f90a538a263258e5c9a0a6dd4e5facad3a19f05175d1d128ca3a560f9d2354183a804644d0a174cf77d105595d8a6a34203e0c3d55f9a16e5a6219d57daf2195e2fa4a5be32faeead126cd25f3badd92e9e448e77b3c65b27b8992f02f01e4582506c06771b58f371789a2bce6bf2024062aa8607c2f43520187d8e7c647c2315d1da8922c33f3e5bd61a72b53bd9e8839e225c5ad344595c8f4aeaa7c7d", 0xa5, 0x0, 0x0, 0x3}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x5, 0xffffffffffffffff, &(0x7f0000000480)="8512ba976775dcf23612476d58d59c7529651364d2b32ef62726912d70231a8930b9b1925b237c74ecec3be3efccb8dceb625188bb45bc2e206b5fb67f614ea37e1346561529959e6f8e20cc2d352575ffb7cb0fb6dcd7ceebf5519b54bee2b29e35c9444101fd2d2775840173021692f49981ac41687d93dfa03ce33b1231fb53d9c412e7892ec2e9f83fbbf67ac862d853cbbc2659543740fb0d983221226c6eaa2cd5770f2357a32133960a98ae7c0e77ff79944381f61e2ee611f3cf5d28f2ed25e6cac1c8ac34cbb209b2ad70ada40f093185795b99bf617f397c287fbd24a9f22e4b3ae817d0ac", 0xea, 0x1}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x8, 0x8000, r0, &(0x7f0000002340)="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", 0x1000, 0x0, 0x0, 0xfeb51d54a2a25537}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x13cb, r0, &(0x7f0000000a40)="c0fa6f0ff33f3489b9b2a634e734712334b51df898567167ac1a9b87c7c2d26dd29018b2cdf11c66c31e965912601a8a09e0f44f0cd827f2d104920ed7bd1cb0261abcc87bc793d31f56dfcc28794c5bc7c4cb2942faacd160e0968612b5aa104e5cdbeeeaa0fa1c7429a1b2feafdca364a27519d4ba64301b53d462b87e56f7f58d96377099941d8c3c099c69c743699a9222cdf2412b542e8cf69c26320000a1981e66bf81eb13b343ad7aceb6c388a22e341ead17f9158a6d9241d76b93d41d4945", 0xc3, 0x3f, 0x0, 0x1}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x2, 0x4, r0, &(0x7f0000000b40)="bd22c316c44cf58e4914a987e57045e1b22d02a0af701628fce042dbabadef47d88178f685f70fc9a23b4453e500b90d6cb92766a4cca48b8b4c81a94aec806d4886819f8b1773261879a3a4cb80905331c67b5752cb50f6d8fbd74fa75898186db42d54f7f5d7b18cbac87a9f9ed747ba6b44c3d747121b004d4091e672c0964ac64967fe96eaf146ee4a9923106a7fe3dffea3d22be955e7c96b7a22526e29b66c183ecc95c5b47d620c6aac48bd5c0df2566305b994a03e0309f9ce63cccb0902fe5e344a4221e0c6efab28b35d0f41acdc18c14e625d68e6750199ae4af987abaf", 0xe3, 0x2, 0x0, 0x1}]) sendto$inet(r0, 0x0, 0x0, 0x22004ffd, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xe00480f3, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x10, 0x0, 0xef013080, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x4, 0x3e4, [0x20000640, 0x0, 0x0, 0x20000670, 0x20000934], 0x0, &(0x7f0000000000), &(0x7f0000000c80)=ANY=[@ANYBLOB="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"]}, 0x518) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="240000001e0007031dfffd946f610500070003047d5b000077000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000380)={{{@in=@rand_addr=0x64010100, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x0, 0x4e20, 0x8, 0x2, 0x80, 0xa0, 0x32, 0x0, 0xffffffffffffffff}, {0xcd, 0x2, 0x8, 0x2, 0x9, 0x3f, 0x1000, 0x95}, {0x47}}, {{@in=@multicast1}, 0x0, @in6=@dev={0xfe, 0x80, '\x00', 0xd}, 0x0, 0x0, 0x0, 0x3}}, 0xe8) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x578) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967483641ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 05:35:36 executing program 2: r0 = open(&(0x7f0000000200)='./bus\x00', 0x607c2, 0x0) set_mempolicy(0x2, &(0x7f0000000100)=0x9, 0x3f) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r3, r2, 0x0) fallocate(r3, 0x20, 0x1, 0x6a3) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240), 0x260000, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r4, 0x8010671f, &(0x7f0000000280)={&(0x7f0000000440)=""/65, 0x41}) r5 = syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./bus\x00', 0x3ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="024806474e2f6560b98fc238e6716870fb8e812e9c0c8ad954a9f0f6fa14e069930923800f458e2c24c96524df2eb000fb02baa9c814a4ba93a76703d4ec08a4336838f02613f342eeb1b2a74db9d7af0ff2834d5523249531c9718eaa69a9dc0b29eb903dca6ba57151d2dfd02417b858e4f236e104e9bbc21e6609609726ec8688b8", 0x83, 0x1ff}], 0x1004, &(0x7f0000000380)=ANY=[@ANYBLOB="2f70726f632f766d73746174002c2c2f5d2c2c2f70726f632f766d73d2985e73dc93afda1084b5746174002ce8212c5b237d2c2a7d2e29405b2c5d2f2c2f70726f632f766d73746174002c666f776e65723d", @ANYRESDEC, @ANYBLOB="2c4e5e9561fb1470ec13b48a81e73aeed86870294ad2893b377000"/36]) mmap(&(0x7f0000228000/0x4000)=nil, 0x4000, 0x0, 0x8010, r5, 0xa3eb6000) sendfile(r0, r1, 0x0, 0x4000000000010046) r6 = openat2(r2, &(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)={0x446000, 0x41, 0x1}, 0x18) set_mempolicy(0x3, &(0x7f0000000340)=0x6, 0xb17) ioctl$PTP_ENABLE_PPS(r6, 0x40043d04, 0x1) 05:35:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000001c000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:36 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}, 0x0, 0x2, [{}, {{0x2, 0x4a22, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x190) r1 = fsmount(0xffffffffffffffff, 0x1, 0xf9) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x4e22, 0x403, @remote, 0x7fffffff}}, 0x0, 0x0, 0x3c, 0x0, "56a24013f8e27257080796749220d9a0178b2720abc305574b0b133656534348869b3828010001000000000035e6e50835de00006bfa3dc57eb82b047c5150db3f33ededcc2b68a5d58b069600"}, 0xd8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) r5 = signalfd4(r4, &(0x7f0000000040)={[0x7e7a]}, 0x8, 0x0) r6 = fsopen(&(0x7f0000000440)='exofs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r6, 0x3, &(0x7f0000000480)=']\x00', &(0x7f00000004c0)='./file0\x00', r4) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r0, &(0x7f0000000080)={0x4}) recvmmsg(r4, &(0x7f0000005840)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/199, 0xc7}, {&(0x7f0000000500)=""/31, 0x1f}, {&(0x7f0000000680)=""/174, 0xae}, {&(0x7f0000000740)=""/64, 0x40}, {&(0x7f0000000780)=""/57, 0x39}], 0x5, &(0x7f0000000840)=""/230, 0xe6}, 0x7}, {{&(0x7f0000000940)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000c00)=[{&(0x7f00000009c0)=""/139, 0x8b}, {&(0x7f0000000a80)=""/204, 0xcc}, {&(0x7f0000000b80)=""/35, 0x23}, {&(0x7f0000000bc0)=""/20, 0x14}], 0x4}, 0x8}, {{&(0x7f0000000c40)=@ipx, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000cc0)=""/212, 0xd4}, {&(0x7f0000000dc0)=""/30, 0x1e}, {&(0x7f0000000e00)=""/236, 0xec}], 0x3}, 0x40000}, {{&(0x7f0000000f40)=@nl=@proc, 0x80, &(0x7f0000001140)=[{&(0x7f0000000fc0)=""/10, 0xa}, {&(0x7f0000001000)=""/2, 0x2}, {&(0x7f0000001040)=""/98, 0x62}, {&(0x7f00000010c0)=""/95, 0x5f}], 0x4, &(0x7f0000001180)=""/2, 0x2}, 0xfffffffa}, {{&(0x7f00000011c0)=@nfc_llcp, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001240)=""/225, 0xe1}, {&(0x7f0000001340)=""/139, 0x8b}, {&(0x7f0000001400)=""/146, 0x92}, {&(0x7f00000014c0)=""/66, 0x42}, {&(0x7f0000001540)=""/180, 0xb4}, {&(0x7f0000001600)=""/144, 0x90}], 0x6, &(0x7f0000001740)=""/237, 0xed}, 0x47}, {{&(0x7f0000001840)=@un=@abs, 0x80, &(0x7f0000002b40)=[{&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f00000028c0)=""/116, 0x74}, {&(0x7f0000002940)=""/17, 0x11}, {&(0x7f0000002980)=""/100, 0x64}, {&(0x7f0000002a00)=""/94, 0x5e}, {&(0x7f0000002a80)=""/170, 0xaa}], 0x6, &(0x7f0000002bc0)=""/123, 0x7b}, 0x7fffffff}, {{&(0x7f0000002c40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000002d80)=[{&(0x7f0000002cc0)=""/143, 0x8f}], 0x1}, 0x2}, {{&(0x7f0000002dc0)=@alg, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002e40)=""/4096, 0x1000}, {&(0x7f0000003e40)=""/92, 0x5c}, {&(0x7f0000003ec0)=""/165, 0xa5}], 0x3, &(0x7f0000003fc0)=""/231, 0xe7}, 0x8}, {{&(0x7f00000040c0)=@rc, 0x80, &(0x7f0000005400)=[{&(0x7f0000004140)=""/209, 0xd1}, {&(0x7f0000004240)=""/40, 0x28}, {&(0x7f0000004280)=""/194, 0xc2}, {&(0x7f0000004380)=""/121, 0x79}, {&(0x7f0000004400)=""/4096, 0x1000}], 0x5, &(0x7f0000005480)=""/165, 0xa5}, 0x9}, {{&(0x7f0000005540)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000057c0)=[{&(0x7f00000055c0)=""/113, 0x71}, {&(0x7f0000005640)=""/84, 0x54}, {&(0x7f00000056c0)=""/73, 0x49}, {&(0x7f0000005740)=""/77, 0x4d}], 0x4, &(0x7f0000005800)=""/31, 0x1f}, 0x80}], 0xa, 0x100a2, &(0x7f0000005ac0)={0x0, 0x3938700}) setsockopt$inet_MCAST_MSFILTER(r7, 0x0, 0x30, &(0x7f0000005b00)={0x9d71, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1, 0x3, [{{0x2, 0x4e22, @local}}, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e24, @rand_addr=0x64010100}}]}, 0x210) getdents(r2, &(0x7f0000000280)=""/200, 0xc8) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000000)={0x2, 0xffff, 0x800, 0x80000001}) 05:35:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x3dc4, &(0x7f00000002c0), &(0x7f0000033000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00000007c0)=0x0, &(0x7f0000000080)=0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40041, 0x69) ioctl$sock_netdev_private(r5, 0x89fa, &(0x7f0000000180)="a785884c3d42191f629526cbf2f636dd524c4c55fb1474687492ed09b6e49cd4636df077cd2acc63a109e670e7e2839af1ad29640c9016842faf9b92d32ddc5a5fd15677ca8b3f964430682bca74279bf36948c3499166a5d779128a926ea8ce3fb093e7185e1ed57da366e3c3b595e32e588f81877e512933731f52e7bfe893a0123ab32e3a8923b473042381252966f46d92a5ba49f47d94f6c7b67283070b494ba5d284119726ab58e7acaec94cc60e949cfe8a95c755562568500644d9b0d6129e47") syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r4, 0x80, &(0x7f00000008c0)=@in={0x2, 0x0, @multicast2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r1, 0xbf, 0x0, 0x0, 0x0, 0x0) [ 1515.859302][ T2639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1515.867537][ T2639] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1515.899025][ T2648] loop4: detected capacity change from 0 to 184 [ 1515.916904][ T2656] loop3: detected capacity change from 0 to 512 [ 1515.939663][ T2656] EXT4-fs (loop3): fragment/cluster size (4194304) != block size (1024) [ 1515.954681][ T2687] loop1: detected capacity change from 0 to 264192 05:35:36 executing program 5 (fault-call:9 fault-nth:11): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:36 executing program 2: sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x3fb, 0x100, 0x70bd27, 0x25dfdbfd, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f00000016c0)={0x1, 0x5, @status={[0xffffffffffff5a46, 0x5, 0x1000, 0x1b36, 0x400000000000000, 0x80000001]}, [0x5ac, 0x7, 0x57e, 0x6, 0x7, 0x1f, 0x3, 0x200, 0x0, 0x3ff, 0x7, 0x3f, 0x1f, 0x978f, 0x6, 0x5, 0xee, 0xc44, 0x0, 0x7fffffff, 0x20, 0x9, 0xffffffffffff0001, 0x120000000000, 0x32, 0x100, 0x9, 0x9, 0x4, 0x7fffffff, 0xfda, 0x100, 0xfffffffffffffff7, 0x2400000000, 0x1ff, 0x80, 0x1000, 0x4, 0x4, 0x9, 0x2, 0x1, 0x0, 0x8001, 0xff, 0x9, 0x162, 0xff, 0x7f, 0x5a0, 0x101, 0x800, 0xc75, 0x2, 0x3, 0xa40, 0xeb04, 0x8, 0x3f, 0x81, 0x4, 0x7, 0x6, 0xe9f8]}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x7f, 0x2, 0x8, 0x1, 0x0, 0x1, 0x0, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf6e2, 0x2, @perf_config_ext={0x32b, 0xd33}, 0x8880, 0x8, 0x9, 0x2, 0x3e, 0x8, 0x20, 0x0, 0x41, 0x0, 0x7b0}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x8) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = fork() wait4(r0, 0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x0, 0x58, 0x4, 0x5, 0x5, 0x0, 0x7205, 0x3ff, 0x5}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) move_mount(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./file1\x00', 0x40) chdir(&(0x7f0000000000)='./file1\x00') chdir(&(0x7f0000000100)='./file2\x00') r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2a6) sendfile(r2, r3, 0x0, 0x1c500) write$P9_RFSYNC(r2, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) 05:35:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)={0x9c, 0x0, 0x1, 0x3, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x88, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x14, 0x4, @local}}}]}]}, 0x9c}}, 0x0) 05:35:36 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8fffffffe0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000000d000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000001d000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1515.964107][ T2687] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:36 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='nfs4\x00', 0x0, &(0x7f0000000440)='vD!\xa4\x17\x899\xec\xe2\xb9\xf1?i\x84t\xfa\x94\x8ewZ/\xf0\x92\xcb\xe5/4\x89\xf4\xdb\xdb`\xfc\a9\xa0\x8f\xb1\xe7r\x1e\xe46E\xb8\xe5\"\xb5oz\xe3\x83Ay\x9f\x11~+\xf5\xae\x14c\xcf3\x9cwX\xef\x80O\x14\xb9\xe0\x19\x85\xa3\x84\xa5m\x8aGjn_\x9fH\xc8G9T\xa2\x1f\x90&\x04\xb3&w\xa7G\\\br\xd20\xf5M\xa4\x96\xa3\x84\xbb\xbbn\xba\xc7\xf8\x12\t\xacs\f\xda=\x1c\x17\x80h\xc8\xb8\xc1\x7f-\xd4w\xa4\xb7\xf3\x8e/\x94\xdb\"\x93\xa7\xa46V\xbb\xf3fqr\xac\x11:\xd2\xe8\xf2\xd7\xf7\xe1F\xb1-?^\x1f\xa7\a\a8\xfe\x06\xf3\xce\xb3;\x11\x9d\"\x00'/197) [ 1516.040289][ T2705] loop3: detected capacity change from 0 to 512 [ 1516.051733][ T2705] EXT4-fs (loop3): fragment/cluster size (8388608) != block size (1024) [ 1516.061067][ T2711] loop4: detected capacity change from 0 to 184 [ 1516.066046][ T2715] loop1: detected capacity change from 0 to 264192 05:35:36 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800000fff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000000e000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1516.106776][ T2715] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1516.122187][ T2723] nfs4: Unknown parameter 'vD!¤‰9ìâ¹ñ?i„tú”ŽwZ/ð’Ëå/4‰ôÛÛ`ü9 ±çrä6E¸å"µozãƒAyŸ~+õ®cÏ3œwXï€O¹à…£„¥mŠGjn_ŸHÈG9T¢&³&w§G\rÒ0õM¤–£„»»nºÇø ¬s Ú' [ 1516.140603][ T2721] FAULT_INJECTION: forcing a failure. [ 1516.140603][ T2721] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1516.153851][ T2721] CPU: 1 PID: 2721 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1516.162521][ T2721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1516.172570][ T2721] Call Trace: [ 1516.175840][ T2721] dump_stack+0x137/0x19d [ 1516.180163][ T2721] should_fail+0x23c/0x250 [ 1516.184653][ T2721] __alloc_pages+0x102/0x320 [ 1516.189232][ T2721] alloc_pages_vma+0x391/0x660 [ 1516.193989][ T2721] ? unlock_page_memcg+0xc3/0xe0 [ 1516.198970][ T2721] ? page_remove_rmap+0x1de/0x230 [ 1516.204052][ T2721] wp_page_copy+0x14c/0x10c0 [ 1516.208664][ T2721] do_wp_page+0x5a8/0xba0 [ 1516.212979][ T2721] handle_mm_fault+0xb31/0x1a70 [ 1516.217821][ T2721] ? follow_page_mask+0xc2c/0x1040 [ 1516.222924][ T2721] __get_user_pages+0x947/0xee0 [ 1516.227778][ T2721] get_user_pages_unlocked+0x135/0x5f0 [ 1516.233221][ T2721] __gup_longterm_unlocked+0x47/0x110 [ 1516.238926][ T2721] internal_get_user_pages_fast+0xfab/0x1130 [ 1516.244914][ T2721] get_user_pages_fast+0x5d/0x80 [ 1516.249838][ T2721] iov_iter_get_pages+0x1e9/0xcc0 [ 1516.254845][ T2721] ? kmem_cache_alloc+0x201/0x2f0 [ 1516.259904][ T2721] ? mempool_alloc_slab+0x16/0x20 [ 1516.264948][ T2721] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1516.270307][ T2721] ? kmem_cache_alloc+0x201/0x2f0 [ 1516.275373][ T2721] ? bio_alloc_bioset+0x27d/0x480 [ 1516.280407][ T2721] iomap_dio_bio_actor+0x673/0xb50 [ 1516.285519][ T2721] iomap_dio_actor+0x26e/0x3b0 [ 1516.290286][ T2721] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1516.296077][ T2721] iomap_apply+0x1e2/0x400 [ 1516.300490][ T2721] __iomap_dio_rw+0x5af/0xad0 [ 1516.305183][ T2721] ? __iomap_dio_rw+0xad0/0xad0 [ 1516.310060][ T2721] iomap_dio_rw+0x30/0x70 [ 1516.314375][ T2721] ext4_file_read_iter+0x21a/0x290 [ 1516.319506][ T2721] aio_read+0x1c1/0x280 [ 1516.323658][ T2721] ? kmem_cache_alloc+0x201/0x2f0 [ 1516.328667][ T2721] io_submit_one+0x7fb/0x1350 [ 1516.333330][ T2721] __se_sys_io_submit+0xf5/0x260 [ 1516.338345][ T2721] __x64_sys_io_submit+0x3f/0x50 [ 1516.343357][ T2721] do_syscall_64+0x4a/0x90 [ 1516.347758][ T2721] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1516.353732][ T2721] RIP: 0033:0x4665d9 [ 1516.357609][ T2721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1516.377327][ T2721] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1516.385742][ T2721] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1516.393700][ T2721] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 05:35:36 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) r1 = gettid() tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x7, &(0x7f0000000040)="da0a41299105a47562c72073711feec21c99188ebd2c54ec2882e9a97353752d6e10f1e3142cda8e81cea69aa6a450a7a8b7579709ac69a9da770c13fc92e8b2a97795367bb30233b9bd30709f1d909f82ef8bc48279a97b03750101c40df49b5d856d77b20ccab0a0fa78009d0106e0cd330d40191615eb90a587b2114ebc6d831cd65bcaeba887e388045a42a684e7f79197836aa1c069851c62563917e7c4cf5954ebce32beb421efdc9495677fbbc8f9066601d318e75b80eca15d42735cefacbdce700925e0914a33aa8e5109483ff050fc0f400eaeea89b1a2") read(r0, &(0x7f0000000000)=""/34, 0x22) r2 = gettid() tkill(r2, 0x34) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x5) tkill(r3, 0x36) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) r4 = fork() wait4(r4, 0x0, 0x2, &(0x7f0000000140)) [ 1516.401654][ T2721] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1516.409621][ T2721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1516.417579][ T2721] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce000000fe000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce000000cd070000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1516.479845][ T2742] loop1: detected capacity change from 0 to 264192 [ 1516.491071][ T2742] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1516.494151][ T2739] loop4: detected capacity change from 0 to 184 [ 1516.510523][ T2741] loop3: detected capacity change from 0 to 512 [ 1516.526301][ T2741] EXT4-fs (loop3): fragment/cluster size (16777216) != block size (1024) 05:35:37 executing program 5 (fault-call:9 fault-nth:12): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1516.584378][ T2752] loop1: detected capacity change from 0 to 264192 [ 1516.591026][ T2741] loop3: detected capacity change from 0 to 512 [ 1516.615974][ T2741] EXT4-fs (loop3): fragment/cluster size (16777216) != block size (1024) [ 1516.624525][ T2752] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1516.688431][ T2767] FAULT_INJECTION: forcing a failure. [ 1516.688431][ T2767] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1516.701745][ T2767] CPU: 0 PID: 2767 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1516.710410][ T2767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1516.720462][ T2767] Call Trace: [ 1516.723743][ T2767] dump_stack+0x137/0x19d [ 1516.728242][ T2767] should_fail+0x23c/0x250 [ 1516.732856][ T2767] __alloc_pages+0x102/0x320 [ 1516.737480][ T2767] alloc_pages_vma+0x391/0x660 [ 1516.742266][ T2767] ? unlock_page_memcg+0xc3/0xe0 [ 1516.747193][ T2767] ? page_remove_rmap+0x1de/0x230 [ 1516.752471][ T2767] wp_page_copy+0x14c/0x10c0 [ 1516.757079][ T2767] do_wp_page+0x5a8/0xba0 [ 1516.761519][ T2767] handle_mm_fault+0xb31/0x1a70 [ 1516.766462][ T2767] ? follow_page_mask+0xc2c/0x1040 [ 1516.771668][ T2767] __get_user_pages+0x947/0xee0 [ 1516.776541][ T2767] get_user_pages_unlocked+0x135/0x5f0 [ 1516.781988][ T2767] ? flat_send_IPI_mask+0x42/0x70 [ 1516.787014][ T2767] __gup_longterm_unlocked+0x47/0x110 [ 1516.792436][ T2767] internal_get_user_pages_fast+0xfab/0x1130 [ 1516.798421][ T2767] get_user_pages_fast+0x5d/0x80 [ 1516.803355][ T2767] iov_iter_get_pages+0x1e9/0xcc0 [ 1516.808594][ T2767] ? kmem_cache_alloc+0x201/0x2f0 [ 1516.813632][ T2767] ? mempool_alloc_slab+0x16/0x20 [ 1516.818668][ T2767] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1516.824034][ T2767] ? kmem_cache_alloc+0x201/0x2f0 [ 1516.829058][ T2767] ? bio_alloc_bioset+0x27d/0x480 [ 1516.834186][ T2767] iomap_dio_bio_actor+0x673/0xb50 [ 1516.839290][ T2767] iomap_dio_actor+0x26e/0x3b0 [ 1516.844068][ T2767] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1516.849858][ T2767] iomap_apply+0x1e2/0x400 [ 1516.854356][ T2767] __iomap_dio_rw+0x5af/0xad0 [ 1516.859107][ T2767] ? __iomap_dio_rw+0xad0/0xad0 [ 1516.863950][ T2767] iomap_dio_rw+0x30/0x70 [ 1516.868275][ T2767] ext4_file_read_iter+0x21a/0x290 [ 1516.873419][ T2767] aio_read+0x1c1/0x280 [ 1516.877556][ T2767] ? kmem_cache_alloc+0x201/0x2f0 [ 1516.882624][ T2767] io_submit_one+0x7fb/0x1350 [ 1516.887403][ T2767] __se_sys_io_submit+0xf5/0x260 [ 1516.892324][ T2767] __x64_sys_io_submit+0x3f/0x50 [ 1516.897615][ T2767] do_syscall_64+0x4a/0x90 [ 1516.902014][ T2767] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1516.907977][ T2767] RIP: 0033:0x4665d9 [ 1516.911856][ T2767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:35:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce000000feff0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1516.931749][ T2767] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1516.940162][ T2767] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1516.948227][ T2767] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1516.956214][ T2767] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1516.964165][ T2767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1516.972117][ T2767] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000000f000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x208e24b) syz_io_uring_setup(0x0, 0x0, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000e, 0x12, r2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000000c0)=0x2) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) syz_io_uring_submit(r1, 0x0, &(0x7f0000001ac0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r2, 0x0, &(0x7f0000001a80)={&(0x7f0000000740)=@ll={0x11, 0x1c, 0x0, 0x1, 0x7, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x24}}, 0x80, &(0x7f0000000180)=[{&(0x7f00000007c0)="6c1e5eb76e5e53a3080b8c70efd1e400916074e53413ee06c82fa27849092df43d9572e8b4b9e4c3296e6098c4b7ba5a9302723586b8780c66f50fb371b594d5efa9698be91e5b46c9158332cfef10825ab9e8377f4b20d5d374a313c54afba55def1352f5d43b800cfbd1982651c685278cafb10b3dc3989d8f4739d36351eba81086d54a7b83eb8e9f27f15ccb2024a778a36733e383d25905cf168ecf61f572bec5c1e6de8db69f78661f8804e3d53c4888dd", 0xb4}, {&(0x7f0000000880)="f1a4cd3ec6e5bfb66d77743f9634eb5e2e15b3fa55d11daf4c1293f0935e457d15e1e195ff8c04944052b9e5d415e49016768f658dbc8e89753f051fa905ac70d93d7caf90205fc2acd531c53cd4c7db8ed2ee85b9c2a8283349e4ed997534cc3953d8f82a128e60333f05", 0x6b}, {&(0x7f0000000900)="0b94aedb13d20d8087927fd1c7a9ca304e52c71fa3b00f0c4f5b539a36dffe37f24cfce66f25a46395a4423685246fc2833ea1bad736d9ab2a83b8b634f868eb773ff8ea6c7cd816476d91793bde9033b258a5031a3c0553c851a1c17b057626bb0db7a509548ea8d8ab7d78a9af84a4ee7441a7cfa57f50e3f40fef76a1519289d3d5b9771afe1faf3c5064ac6b34467d08db67559980c4edff1d159ffeb264f73798f2", 0xa4}, {&(0x7f00000009c0)="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", 0x1000}], 0x4, &(0x7f00000019c0)=[{0xb0, 0x116, 0x7, "97f903ba7aa442552a0b54800d35fe2f505573617301b86139e5238a0b3e0bc2d90e1f508903a7528f378e6ba52d45d641c40553108b5a1ec154b823c14dc397b5703340d70f991ed1e273b1904ecab104331dd625b826b623243be7730b56cfd851c29b2af2a9509dbb4b4789a15ed786ea15f621ff611de42cd099955472ea57ab8a262dbac9999dc406af5f28da6ce24fea92eed40ee549"}], 0xb0}, 0x0, 0x7618f6a58a4badf4}, 0x1) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r4, r2, 0x0) preadv(r4, &(0x7f00000006c0)=[{&(0x7f00000000c0)}, {&(0x7f0000000200)=""/254, 0xfe}, {&(0x7f0000000140)=""/39, 0x27}, {&(0x7f0000000300)=""/104, 0x68}, {&(0x7f0000000380)=""/105, 0x69}, {&(0x7f0000000400)=""/254, 0xfe}, {&(0x7f0000000500)=""/231, 0xe7}, {&(0x7f0000000600)=""/134, 0x86}], 0x8, 0x1, 0x9) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x2) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/e1000e', 0x800, 0xc8) r6 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000001b00)) sendfile(r5, r6, &(0x7f0000000080)=0x101, 0x3) 05:35:37 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000300), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="54b9b885d52f4df6465fdf1af1171d079c368666", @ANYRES16=r1, @ANYBLOB="010000000000000000000100000004000480080001000000000008000200010000000400088028000c8014000b80080009000000000008000a00000000000c000580080009000000000004000b80"], 0x54}}, 0x0) 05:35:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8fffff7ff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8fffffbff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce000000feffffff010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1517.032484][ T2775] loop1: detected capacity change from 0 to 264192 [ 1517.039136][ T2777] loop4: detected capacity change from 0 to 184 [ 1517.057410][ T2775] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1517.072912][ T2787] loop3: detected capacity change from 0 to 512 05:35:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r1, r0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRES16=r1], 0xfd) creat(&(0x7f0000000080)='./file0\x00', 0x199) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/hidraw', 0x171b00, 0x17c) clone3(&(0x7f00000003c0)={0x200100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) 05:35:37 executing program 5 (fault-call:9 fault-nth:13): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1517.099222][ T2787] EXT4-fs (loop3): fragment/cluster size (33554432) != block size (1024) 05:35:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000010000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1517.184398][ T2803] loop1: detected capacity change from 0 to 264192 [ 1517.191110][ T2804] loop4: detected capacity change from 0 to 184 [ 1517.214103][ T2810] loop3: detected capacity change from 0 to 512 [ 1517.225253][ T2810] EXT4-fs (loop3): fragment/cluster size (67108864) != block size (1024) [ 1517.254803][ T2803] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1517.272028][ T2816] FAULT_INJECTION: forcing a failure. [ 1517.272028][ T2816] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1517.285319][ T2816] CPU: 0 PID: 2816 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1517.294143][ T2816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1517.304219][ T2816] Call Trace: [ 1517.307494][ T2816] dump_stack+0x137/0x19d [ 1517.311821][ T2816] should_fail+0x23c/0x250 [ 1517.316226][ T2816] __alloc_pages+0x102/0x320 [ 1517.320804][ T2816] alloc_pages_vma+0x391/0x660 [ 1517.325554][ T2816] ? unlock_page_memcg+0xc3/0xe0 [ 1517.330489][ T2816] ? page_remove_rmap+0x1de/0x230 [ 1517.335500][ T2816] wp_page_copy+0x14c/0x10c0 [ 1517.340107][ T2816] do_wp_page+0x5a8/0xba0 [ 1517.344473][ T2816] handle_mm_fault+0xb31/0x1a70 [ 1517.349312][ T2816] ? follow_page_mask+0xc2c/0x1040 [ 1517.354433][ T2816] __get_user_pages+0x947/0xee0 [ 1517.359321][ T2816] get_user_pages_unlocked+0x135/0x5f0 [ 1517.364878][ T2816] __gup_longterm_unlocked+0x47/0x110 [ 1517.370248][ T2816] internal_get_user_pages_fast+0xfab/0x1130 [ 1517.376254][ T2816] get_user_pages_fast+0x5d/0x80 [ 1517.381253][ T2816] iov_iter_get_pages+0x1e9/0xcc0 [ 1517.386296][ T2816] ? kmem_cache_alloc+0x201/0x2f0 [ 1517.391401][ T2816] ? mempool_alloc_slab+0x16/0x20 [ 1517.396425][ T2816] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1517.401787][ T2816] ? kmem_cache_alloc+0x201/0x2f0 [ 1517.406817][ T2816] ? bio_alloc_bioset+0x27d/0x480 [ 1517.411830][ T2816] iomap_dio_bio_actor+0x673/0xb50 [ 1517.417083][ T2816] iomap_dio_actor+0x26e/0x3b0 [ 1517.421832][ T2816] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1517.427753][ T2816] iomap_apply+0x1e2/0x400 [ 1517.432154][ T2816] __iomap_dio_rw+0x5af/0xad0 [ 1517.436817][ T2816] ? __iomap_dio_rw+0xad0/0xad0 [ 1517.441715][ T2816] iomap_dio_rw+0x30/0x70 [ 1517.446050][ T2816] ext4_file_read_iter+0x21a/0x290 [ 1517.451173][ T2816] aio_read+0x1c1/0x280 [ 1517.455316][ T2816] ? kmem_cache_alloc+0x201/0x2f0 [ 1517.460364][ T2816] io_submit_one+0x7fb/0x1350 [ 1517.465122][ T2816] __se_sys_io_submit+0xf5/0x260 [ 1517.470047][ T2816] __x64_sys_io_submit+0x3f/0x50 [ 1517.475023][ T2816] do_syscall_64+0x4a/0x90 [ 1517.479583][ T2816] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1517.485462][ T2816] RIP: 0033:0x4665d9 [ 1517.489339][ T2816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1517.508941][ T2816] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1517.517346][ T2816] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1517.525311][ T2816] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1517.533270][ T2816] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1517.541229][ T2816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 05:35:38 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8001fffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)='dmask', 0x5, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) removexattr(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="bf08000000008d0000"]) mount$9p_fd(0x0, &(0x7f0000000440)='./file1\x00', &(0x7f0000000480), 0x80808, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_uid}, {@debug={'debug', 0x3d, 0x1f}}], [{@fsname}, {@obj_role={'obj_role', 0x3d, '-o,%:%+'}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x38}}, {@euid_lt={'euid<', 0xee01}}]}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000400)=@known='com.apple.system.Security\x00') ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000340)) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, &(0x7f0000000300)={0x5, 0x50, '\x00', 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000140)='./file1\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="ee77fd51aa07d621f9527ee717867bd2ccb7f1b5cbf49880117c6f3f7c2b8ac214656cdf37256ffea88316f888a39e2ee40d692e519da4636d87cce214981c19fb97b0e510b1bf"]) 05:35:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000004000000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1517.549285][ T2816] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:38 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8fff7ffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1517.616352][ T2810] loop3: detected capacity change from 0 to 512 [ 1517.626001][ T2823] loop4: detected capacity change from 0 to 184 [ 1517.635819][ T2810] EXT4-fs (loop3): fragment/cluster size (67108864) != block size (1024) [ 1517.652382][ T2824] loop1: detected capacity change from 0 to 264192 05:35:38 executing program 2: sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x20000000) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="7c000000034305000000000000000000010000000c00a16cb79a7f340a42bb243ca553d60758420008000340000000000c000200fffffffc0000008100"/76], 0x3c}, 0x1, 0x0, 0x0, 0x41}, 0x8000) ptrace$cont(0x18, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x6, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffb, 0x0, @perf_config_ext={0x0, 0xf772}, 0x0, 0x8, 0xbb0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0x2, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(0x0, 0x28, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f", 0x19}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ptrace(0x4207, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0xb3b, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x3]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, {}, 0x0, {}, 0x3, 0xa, 0x7, 0x14, "1a56e16451b1e241bff1e21f2b0367a94e8ea9754dfaf1513acf9b6915b92e1c243de31bd38426265a5eb61ccc059d3ea8da4f06978af55734ad98c45e16f59b", "7bbd4db53f675df030fc478e3768e26712c477244bade7d9505b5f2264eb6513", [0x3ff, 0x7db2]}) 05:35:38 executing program 5 (fault-call:9 fault-nth:14): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000204000000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1517.688777][ T2824] EXT4-fs (loop1): bad geometry: first data block is 0 with a 1k block and cluster size 05:35:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000011000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:38 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4141, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x11) perf_event_open(&(0x7f000025c000)={0x4, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x81, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='./file0\x00') preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x89801) mmap$perf(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x3000002, 0x40032, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) preadv(r1, &(0x7f0000000300), 0x0, 0x8000, 0x6a) socket$inet(0x2, 0x5, 0x3f) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = fork() move_pages(r2, 0x0, &(0x7f0000000080), &(0x7f0000000100)=[0x0, 0x3, 0x7f, 0x0, 0x4], &(0x7f00000000c0), 0x6) mremap(&(0x7f00000a1000/0x1000)=nil, 0x1000, 0x4000, 0x7, &(0x7f0000d7c000/0x4000)=nil) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0xee00) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, &(0x7f00000001c0)=0x7f, 0xffff, 0x7) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mbind(&(0x7f0000f5b000/0x2000)=nil, 0x2000, 0x4000, 0x0, 0x2, 0x3) [ 1517.751180][ T2842] loop4: detected capacity change from 0 to 184 05:35:38 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8fffbffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1517.798476][ T2848] loop1: detected capacity change from 0 to 264192 [ 1517.814151][ T2854] FAULT_INJECTION: forcing a failure. [ 1517.814151][ T2854] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1517.827442][ T2854] CPU: 1 PID: 2854 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1517.836602][ T2854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1517.846871][ T2854] Call Trace: [ 1517.850149][ T2854] dump_stack+0x137/0x19d [ 1517.854487][ T2854] should_fail+0x23c/0x250 [ 1517.858904][ T2854] __alloc_pages+0x102/0x320 [ 1517.863494][ T2854] alloc_pages_vma+0x391/0x660 [ 1517.868327][ T2854] ? unlock_page_memcg+0xc3/0xe0 [ 1517.873262][ T2854] ? page_remove_rmap+0x1de/0x230 [ 1517.878305][ T2854] wp_page_copy+0x14c/0x10c0 [ 1517.882904][ T2854] do_wp_page+0x5a8/0xba0 [ 1517.887239][ T2854] handle_mm_fault+0xb31/0x1a70 [ 1517.892099][ T2854] ? follow_page_mask+0xc2c/0x1040 [ 1517.897218][ T2854] __get_user_pages+0x947/0xee0 [ 1517.902154][ T2854] get_user_pages_unlocked+0x135/0x5f0 [ 1517.907686][ T2854] __gup_longterm_unlocked+0x47/0x110 [ 1517.913061][ T2854] internal_get_user_pages_fast+0xfab/0x1130 [ 1517.919085][ T2854] get_user_pages_fast+0x5d/0x80 [ 1517.924111][ T2854] iov_iter_get_pages+0x1e9/0xcc0 [ 1517.929144][ T2854] ? kmem_cache_alloc+0x201/0x2f0 [ 1517.934278][ T2854] ? mempool_alloc_slab+0x16/0x20 [ 1517.939314][ T2854] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1517.944693][ T2854] ? kmem_cache_alloc+0x201/0x2f0 [ 1517.949719][ T2854] ? bio_alloc_bioset+0x27d/0x480 [ 1517.954816][ T2854] iomap_dio_bio_actor+0x673/0xb50 [ 1517.959925][ T2854] iomap_dio_actor+0x26e/0x3b0 [ 1517.964692][ T2854] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1517.970607][ T2854] iomap_apply+0x1e2/0x400 [ 1517.975106][ T2854] __iomap_dio_rw+0x5af/0xad0 [ 1517.979785][ T2854] ? __iomap_dio_rw+0xad0/0xad0 [ 1517.984724][ T2854] iomap_dio_rw+0x30/0x70 [ 1517.989053][ T2854] ext4_file_read_iter+0x21a/0x290 [ 1517.994198][ T2854] aio_read+0x1c1/0x280 [ 1517.998364][ T2854] ? kmem_cache_alloc+0x201/0x2f0 [ 1518.003511][ T2854] io_submit_one+0x7fb/0x1350 [ 1518.008243][ T2854] __se_sys_io_submit+0xf5/0x260 [ 1518.013194][ T2854] __x64_sys_io_submit+0x3f/0x50 [ 1518.018338][ T2854] do_syscall_64+0x4a/0x90 [ 1518.022763][ T2854] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1518.028700][ T2854] RIP: 0033:0x4665d9 [ 1518.032597][ T2854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1518.052382][ T2854] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1518.060817][ T2854] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1518.068790][ T2854] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1518.076762][ T2854] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1518.084730][ T2854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1518.092755][ T2854] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1518.106875][ T2848] EXT4-fs (loop1): bad geometry: first data block is 0 with a 1k block and cluster size 05:35:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0002c4000000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1518.153380][ T2866] loop4: detected capacity change from 0 to 184 [ 1518.182914][ T2868] loop3: detected capacity change from 0 to 512 05:35:38 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4141, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x11) perf_event_open(&(0x7f000025c000)={0x4, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x81, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='./file0\x00') preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x89801) mmap$perf(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x3000002, 0x40032, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) preadv(r1, &(0x7f0000000300), 0x0, 0x8000, 0x6a) socket$inet(0x2, 0x5, 0x3f) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = fork() move_pages(r2, 0x0, &(0x7f0000000080), &(0x7f0000000100)=[0x0, 0x3, 0x7f, 0x0, 0x4], &(0x7f00000000c0), 0x6) mremap(&(0x7f00000a1000/0x1000)=nil, 0x1000, 0x4000, 0x7, &(0x7f0000d7c000/0x4000)=nil) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0xee00) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, &(0x7f00000001c0)=0x7f, 0xffff, 0x7) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mbind(&(0x7f0000f5b000/0x2000)=nil, 0x2000, 0x4000, 0x0, 0x2, 0x3) 05:35:38 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8f9fdffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1518.211691][ T2868] EXT4-fs (loop3): fragment/cluster size (134217728) != block size (1024) [ 1518.250799][ T2883] loop1: detected capacity change from 0 to 264192 05:35:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f020000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1518.260159][ T2883] EXT4-fs (loop1): bad geometry: first data block is 0 with a 1k block and cluster size 05:35:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup(r0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000000c0)=0x4, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) sendto$inet(r0, &(0x7f0000000100)="60718f5ce0280ac8cfe6fb895d3a79debfc26e6520d17bf65c63b5e6534735b61514b89dda95532b330492508bb8ad17e57b0db8f5e5df803db16c44ba294ddc72f65a522a8dd07b648160fb8abf7df9122a9b6cc5d1d33a262e4eb080b6cbe07f4d93cbb4390d1637c89cc91311d68a910d1b54511a8f186ed945e9451bf37375a8d29bbffae33420f5829bfcb744eb49e9b0952d2cde8967146a42a4d0d83fb84d76a9e1366fa3619fcaf955b152a0550b0aaa483d625624527ad8ea35520906472eeb02ab4c3028793b08d99120bec78840ffb6c11599d25be4574c6ca73b17b2eca8b4f9763f392bebed23c379329db75fe4e20f1c", 0xf7, 0xa0, &(0x7f0000000040)={0x2, 0x4e22, @local}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r3, r2, 0x0) getdents(r2, &(0x7f0000000280)=""/200, 0xc8) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000200)={@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0x2bcf) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x37}}, 0x10) [ 1518.340224][ T2868] loop3: detected capacity change from 0 to 512 [ 1518.353207][ T2868] EXT4-fs (loop3): fragment/cluster size (134217728) != block size (1024) [ 1518.374580][ T2901] loop4: detected capacity change from 0 to 184 [ 1518.385624][ T2904] loop1: detected capacity change from 0 to 264192 05:35:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000012000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:38 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8fdfdffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1518.435597][ T2904] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1518.478414][ T2917] loop3: detected capacity change from 0 to 512 [ 1518.489900][ T2917] EXT4-fs (loop3): fragment/cluster size (268435456) != block size (1024) 05:35:39 executing program 5 (fault-call:9 fault-nth:15): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:39 executing program 2: mq_unlink(&(0x7f0000000180)='\x00') mq_unlink(&(0x7f00000002c0)='\x00') mq_unlink(&(0x7f0000000300)=':-}+(-\x00') set_mempolicy(0x2, &(0x7f0000000200)=0x468, 0x4) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x2000) mq_unlink(&(0x7f0000000240)='freezer.state\x00') socket$inet_tcp(0x2, 0x1, 0x0) mq_unlink(&(0x7f0000000340)='freezer.state\x00') mq_unlink(&(0x7f0000000280)='freezer.state\x00') r1 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) mq_unlink(&(0x7f0000000380)='freezer.state\x00') syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x6) read(r1, &(0x7f0000000000)=""/18, 0x12) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x2010, r1, 0x2b4d2000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) 05:35:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f030000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1518.542652][ T2923] loop4: detected capacity change from 0 to 184 [ 1518.559959][ T2917] loop3: detected capacity change from 0 to 512 05:35:39 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b87fffffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000014000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1518.585945][ T2917] EXT4-fs (loop3): fragment/cluster size (268435456) != block size (1024) 05:35:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x28, 0x0, 0x20, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @val={0xc, 0x99, {0x0, 0x10}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x24001040}, 0x0) [ 1518.649721][ T2936] loop1: detected capacity change from 0 to 264192 [ 1518.674781][ T2936] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1518.686845][ T2947] FAULT_INJECTION: forcing a failure. 05:35:39 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000180)=[{0x8000, 0x0, 0x0, 0x7fffff80}, {0x1, 0x40, 0x4b, 0x8}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="2000f8ff80dc8d06635f5e"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000140)={0xffffffffffffffff, 0x7, 0x9, 0x9}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r4, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8001}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7e}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x90}, 0x8000) r7 = gettid() tkill(r7, 0x31) [ 1518.686845][ T2947] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1518.700296][ T2947] CPU: 0 PID: 2947 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1518.708974][ T2947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1518.719118][ T2947] Call Trace: [ 1518.722430][ T2947] dump_stack+0x137/0x19d [ 1518.725259][ T2950] loop4: detected capacity change from 0 to 184 [ 1518.726888][ T2947] should_fail+0x23c/0x250 [ 1518.733460][ T2951] loop3: detected capacity change from 0 to 512 [ 1518.737612][ T2947] __alloc_pages+0x102/0x320 [ 1518.748519][ T2947] alloc_pages_vma+0x391/0x660 [ 1518.750378][ T2951] EXT4-fs (loop3): fragment/cluster size (1073741824) != block size (1024) [ 1518.753296][ T2947] ? unlock_page_memcg+0xc3/0xe0 [ 1518.753315][ T2947] ? page_remove_rmap+0x1de/0x230 [ 1518.753333][ T2947] wp_page_copy+0x14c/0x10c0 [ 1518.776590][ T2947] do_wp_page+0x5a8/0xba0 [ 1518.780948][ T2947] handle_mm_fault+0xb31/0x1a70 [ 1518.785893][ T2947] ? follow_page_mask+0xc2c/0x1040 [ 1518.791001][ T2947] __get_user_pages+0x947/0xee0 [ 1518.796074][ T2947] get_user_pages_unlocked+0x135/0x5f0 [ 1518.801693][ T2947] ? flat_send_IPI_mask+0x42/0x70 [ 1518.806708][ T2947] __gup_longterm_unlocked+0x47/0x110 [ 1518.812123][ T2947] internal_get_user_pages_fast+0xfab/0x1130 [ 1518.818091][ T2947] get_user_pages_fast+0x5d/0x80 [ 1518.823010][ T2947] iov_iter_get_pages+0x1e9/0xcc0 [ 1518.828037][ T2947] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1518.833394][ T2947] ? kmem_cache_alloc+0x201/0x2f0 [ 1518.838663][ T2947] ? bio_alloc_bioset+0x27d/0x480 [ 1518.843719][ T2947] iomap_dio_bio_actor+0x673/0xb50 [ 1518.848855][ T2947] iomap_dio_actor+0x26e/0x3b0 [ 1518.853600][ T2947] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1518.859406][ T2947] iomap_apply+0x1e2/0x400 [ 1518.863804][ T2947] __iomap_dio_rw+0x5af/0xad0 [ 1518.868461][ T2947] ? __iomap_dio_rw+0xad0/0xad0 [ 1518.873311][ T2947] iomap_dio_rw+0x30/0x70 [ 1518.877616][ T2947] ext4_file_read_iter+0x21a/0x290 [ 1518.882817][ T2947] aio_read+0x1c1/0x280 [ 1518.886957][ T2947] ? kmem_cache_alloc+0x201/0x2f0 [ 1518.892046][ T2947] io_submit_one+0x7fb/0x1350 [ 1518.896792][ T2947] __se_sys_io_submit+0xf5/0x260 [ 1518.901888][ T2947] __x64_sys_io_submit+0x3f/0x50 [ 1518.906865][ T2947] do_syscall_64+0x4a/0x90 [ 1518.911318][ T2947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1518.917194][ T2947] RIP: 0033:0x4665d9 [ 1518.921071][ T2947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1518.940869][ T2947] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1518.949261][ T2947] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1518.957411][ T2947] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1518.965358][ T2947] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1518.973424][ T2947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1518.981384][ T2947] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:39 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b88cffffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f040000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000040)=0x6, 0x4) bind$inet6(r2, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) setsockopt$sock_int(r3, 0x1, 0x2, &(0x7f0000000000)=0x20, 0x4) bind$inet6(r3, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r4, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r5, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x7f, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r6, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r6, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) [ 1519.007853][ T2958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2958 comm=syz-executor.2 05:35:39 executing program 2: r0 = socket(0x2c, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) unshare(0x44020000) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x4, 0xd0}, {0x3, 0x5, 0x800}, {0x4}, {0x2, 0x7}, {0x4, 0x0, 0x800}, {0x1, 0x0, 0x8691e5c79c6747d5}], 0x6, 0x0) semctl$SETVAL(0x0, 0x0, 0x8, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/200, 0xc8) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000000c0)=0x4, 0x4) r2 = semget$private(0x0, 0x4, 0x0) semtimedop(r2, &(0x7f0000000080)=[{0x0, 0x22}, {}], 0x2, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/176) setsockopt$sock_int(r0, 0x1, 0x5, 0x0, 0x0) semop(0x0, &(0x7f0000000040)=[{}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000000c0)) 05:35:39 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0xfffffffe}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff94ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffab2888d050d6b86e50bfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file0/file0\x00', 0x8a) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) umount2(&(0x7f0000000380)='./file0/file0\x00', 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800005, 0x12, r1, 0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000002540)=""/4112, 0x1010}, {&(0x7f0000000180)=""/85, 0x55}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/4096, 0x1000}], 0x4, 0xda3, 0x800000) symlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)='./file0/file0\x00') open(&(0x7f0000000400)='.\x00', 0x82000, 0x19) chdir(&(0x7f0000000080)='./file0/file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x400000, 0x18) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r3, r2, 0x0) getdents(r2, &(0x7f0000000280)=""/200, 0xc8) sendfile(r0, r2, &(0x7f00000003c0)=0x8, 0x5e32) symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') [ 1519.074583][ T2951] loop3: detected capacity change from 0 to 512 [ 1519.087128][ T2951] EXT4-fs (loop3): fragment/cluster size (1073741824) != block size (1024) [ 1519.106371][ T2981] loop1: detected capacity change from 0 to 264192 [ 1519.109952][ T2986] loop4: detected capacity change from 0 to 184 05:35:39 executing program 5 (fault-call:9 fault-nth:16): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:39 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8daffffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000022000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1519.145445][ T2981] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f050000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:39 executing program 0: close(0xffffffffffffffff) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000180)={0x0, 0x0, 0x4c8}) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r3, r2, 0x0) getdents(r2, &(0x7f0000000280)=""/200, 0xc8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r5, r4, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000380)=""/213, 0xd5) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)=@getpolicy={0x0, 0x15, 0x2, 0x70bd25, 0x25dfdbfb, {{@in6=@local, @in=@private=0xa010101, 0x4e24, 0x2, 0x4e23, 0x0, 0x2, 0x20, 0x0, 0x67, 0x0, 0xee00}, 0x6e6bbd}, [@lifetime_val={0x0, 0x9, {0x5, 0x5, 0x0, 0x1}}, @srcaddr={0x0, 0xd, @in6=@empty}, @etimer_thresh={0x0, 0xc, 0x73e}, @srcaddr={0x0, 0xd, @in=@broadcast}, @tmpl={0x0, 0x5, [{{@in6=@empty, 0x4d4, 0x32}, 0x2, @in=@local, 0x0, 0x3, 0x3, 0x8, 0x8, 0x7fff, 0x3ff}, {{@in6=@ipv4={'\x00', '\xff\xff', @empty}, 0x4d5, 0x2b}, 0x2, @in=@private=0xa010102, 0x3501, 0x2, 0x1, 0xca, 0x6, 0x1}, {{@in6=@remote, 0x4d3, 0xff}, 0xa, @in=@private=0xa010100, 0x3502, 0x0, 0x0, 0x4, 0x8000, 0x5, 0x7ff}, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x4d6, 0x32}, 0xa, @in=@rand_addr=0x64010101, 0x3506, 0x0, 0x3, 0x7f, 0x2, 0x1}, {{@in=@multicast1, 0x4d4, 0x3c}, 0xa3afa32d170a3270, @in=@remote, 0x0, 0x1, 0x2, 0x6, 0x1ff, 0x1, 0x200}]}, @extra_flags, @proto={0x0, 0x19, 0x17}, @encap={0x0, 0x4, {0xffffffffffffffff, 0x4e21, 0x4e20, @in=@local}}, @coaddr={0x0, 0xe, @in=@rand_addr=0x64010102}, @policy={0x0, 0x7, {{@in6=@empty, @in6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1f}}, 0x4e20, 0x8, 0x4e22, 0x0, 0x2, 0x80, 0x80, 0x11, 0x0, 0xffffffffffffffff}, {0x7, 0x1000, 0x4, 0x1, 0xffff, 0xfff, 0x2, 0x6}, {0x1, 0x101, 0x9, 0xfff}, 0x6, 0x0, 0x1, 0x1, 0x1, 0x3}}]}, 0xffffffffffffff65}, 0x1, 0x0, 0x0, 0x4000080}, 0x10) sendmsg$nl_generic(r4, 0x0, 0x4044000) [ 1519.225791][ T3015] loop3: detected capacity change from 0 to 512 [ 1519.242399][ T3015] EXT4-fs (loop3): Invalid log cluster size: 34 [ 1519.270056][ T3026] loop4: detected capacity change from 0 to 184 [ 1519.277822][ T3025] FAULT_INJECTION: forcing a failure. [ 1519.277822][ T3025] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1519.278490][ T3029] loop1: detected capacity change from 0 to 264192 [ 1519.291081][ T3025] CPU: 1 PID: 3025 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1519.306422][ T3025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1519.316596][ T3025] Call Trace: [ 1519.320004][ T3025] dump_stack+0x137/0x19d [ 1519.324333][ T3025] should_fail+0x23c/0x250 [ 1519.328736][ T3025] __alloc_pages+0x102/0x320 [ 1519.333309][ T3025] alloc_pages_vma+0x391/0x660 [ 1519.338109][ T3025] ? unlock_page_memcg+0xc3/0xe0 [ 1519.343033][ T3025] ? page_remove_rmap+0x1de/0x230 [ 1519.348040][ T3025] wp_page_copy+0x14c/0x10c0 [ 1519.352635][ T3025] do_wp_page+0x5a8/0xba0 [ 1519.356991][ T3025] handle_mm_fault+0xb31/0x1a70 [ 1519.361856][ T3025] ? follow_page_mask+0xc2c/0x1040 [ 1519.366948][ T3025] __get_user_pages+0x947/0xee0 [ 1519.371891][ T3025] get_user_pages_unlocked+0x135/0x5f0 [ 1519.377485][ T3025] __gup_longterm_unlocked+0x47/0x110 [ 1519.382845][ T3025] internal_get_user_pages_fast+0xfab/0x1130 [ 1519.388961][ T3025] get_user_pages_fast+0x5d/0x80 [ 1519.393895][ T3025] iov_iter_get_pages+0x1e9/0xcc0 [ 1519.398926][ T3025] ? kmem_cache_alloc+0x201/0x2f0 [ 1519.403948][ T3025] ? mempool_alloc_slab+0x16/0x20 [ 1519.408961][ T3025] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1519.414318][ T3025] ? kmem_cache_alloc+0x201/0x2f0 [ 1519.419338][ T3025] ? bio_alloc_bioset+0x27d/0x480 [ 1519.424357][ T3025] iomap_dio_bio_actor+0x673/0xb50 [ 1519.429457][ T3025] iomap_dio_actor+0x26e/0x3b0 [ 1519.434205][ T3025] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1519.440016][ T3025] iomap_apply+0x1e2/0x400 [ 1519.444540][ T3025] __iomap_dio_rw+0x5af/0xad0 [ 1519.449306][ T3025] ? __iomap_dio_rw+0xad0/0xad0 [ 1519.454144][ T3025] iomap_dio_rw+0x30/0x70 [ 1519.458549][ T3025] ext4_file_read_iter+0x21a/0x290 [ 1519.463691][ T3025] aio_read+0x1c1/0x280 [ 1519.467882][ T3025] ? kmem_cache_alloc+0x201/0x2f0 [ 1519.472890][ T3025] io_submit_one+0x7fb/0x1350 [ 1519.477551][ T3025] __se_sys_io_submit+0xf5/0x260 [ 1519.482546][ T3025] __x64_sys_io_submit+0x3f/0x50 [ 1519.487473][ T3025] do_syscall_64+0x4a/0x90 [ 1519.491959][ T3025] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1519.497932][ T3025] RIP: 0033:0x4665d9 [ 1519.501809][ T3025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1519.521584][ T3025] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1519.533059][ T3025] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1519.541257][ T3025] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1519.549230][ T3025] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1519.557185][ T3025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 05:35:40 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8f0ffffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1519.565140][ T3025] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1519.582545][ T3029] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1519.596283][ T3036] PM: suspend entry (deep) [ 1519.621148][ T3036] Filesystems sync: 0.020 seconds [ 1519.630653][ T3036] Freezing user space processes ... [ 1519.631662][ T3015] loop3: detected capacity change from 0 to 512 [ 1519.660744][ T3036] (elapsed 0.030 seconds) done. [ 1519.665801][ T3036] OOM killer disabled. [ 1519.669839][ T3036] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1519.679273][ T3036] printk: Suspending console(s) (use no_console_suspend to debug) 05:35:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f060000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1519.724368][T32163] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1520.260709][ T3036] ACPI: Preparing to enter system sleep state S3 [ 1520.260897][ T3036] PM: Saving platform NVS memory [ 1520.260901][ T3036] Disabling non-boot CPUs ... [ 1520.264076][ T3036] smpboot: CPU 1 is now offline [ 1520.267102][ T3036] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 1520.267183][ T3036] ACPI: Low-level resume complete [ 1520.267280][ T3036] PM: Restoring platform NVS memory [ 1520.267290][ T3036] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 1520.277669][ T3036] Enabling non-boot CPUs ... [ 1520.277825][ T3036] x86: Booting SMP configuration: [ 1520.277828][ T3036] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 1520.277993][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 1520.279046][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 1520.280426][ T3036] CPU1 is up [ 1520.280816][ T3036] ACPI: Waking up from system sleep state S3 [ 1520.413446][ T3036] OOM killer enabled. [ 1520.414219][ T3036] Restarting tasks ... done. [ 1520.420009][ T3036] PM: suspend exit 05:35:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0xc0, 0x0, 0x0, @time={0xffffffff, 0x7}, {}, {}, @queue={0x1b}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 05:35:40 executing program 2: r0 = socket(0x2c, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) unshare(0x44020000) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x4, 0xd0}, {0x3, 0x5, 0x800}, {0x4}, {0x2, 0x7}, {0x4, 0x0, 0x800}, {0x1, 0x0, 0x8691e5c79c6747d5}], 0x6, 0x0) semctl$SETVAL(0x0, 0x0, 0x8, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/200, 0xc8) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000000c0)=0x4, 0x4) r2 = semget$private(0x0, 0x4, 0x0) semtimedop(r2, &(0x7f0000000080)=[{0x0, 0x22}, {}], 0x2, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/176) setsockopt$sock_int(r0, 0x1, 0x5, 0x0, 0x0) semop(0x0, &(0x7f0000000040)=[{}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000000c0)) [ 1520.437845][ T3051] loop1: detected capacity change from 0 to 264192 [ 1520.441379][ T3051] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1520.472622][ T3049] loop4: detected capacity change from 0 to 184 05:35:40 executing program 0: sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={0xfffffffffffffffd}, 0x1, 0x0, 0x0, 0x8000000}, 0x40001) r0 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/exe\x00', 0x400100, 0x30) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x110, r0, 0xf7ffe000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r1, r0, 0x0) getdents(r0, &(0x7f0000000280)=""/200, 0xc8) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="fc000000", @ANYRES16=0x0, @ANYBLOB="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"], 0xfc}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/power/pm_trace_dev_match', 0x40, 0x22) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680), 0x18140, 0x0) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x28, 0x0, 0xffebee680d1b1ba3, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x28}}, 0x8000) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='projid_map\x00') pread64(r4, &(0x7f00000001c0)=""/199, 0xc7, 0x21) 05:35:40 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8f6ffffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1520.488288][ T3015] EXT4-fs (loop3): Invalid log cluster size: 34 05:35:41 executing program 5 (fault-call:9 fault-nth:17): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f070000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000025000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:41 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8f0ffffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:41 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8feffffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:41 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8f0ffffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1520.580197][ T3092] loop1: detected capacity change from 0 to 264192 [ 1520.583725][ T3091] loop4: detected capacity change from 0 to 184 [ 1520.589354][ T3092] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f080000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:41 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8f0ffffff0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1520.645286][ T3104] FAULT_INJECTION: forcing a failure. [ 1520.645286][ T3104] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1520.649798][ T3104] CPU: 0 PID: 3104 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1520.652812][ T3104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1520.656138][ T3104] Call Trace: [ 1520.657453][ T3104] dump_stack+0x137/0x19d [ 1520.659130][ T3104] should_fail+0x23c/0x250 [ 1520.660920][ T3104] __alloc_pages+0x102/0x320 [ 1520.662292][ T3104] alloc_pages_vma+0x391/0x660 [ 1520.664053][ T3104] ? unlock_page_memcg+0xc3/0xe0 [ 1520.665100][ T3104] ? page_remove_rmap+0x1de/0x230 [ 1520.666928][ T3104] wp_page_copy+0x14c/0x10c0 [ 1520.668722][ T3104] do_wp_page+0x5a8/0xba0 [ 1520.670639][ T3104] handle_mm_fault+0xb31/0x1a70 [ 1520.672291][ T3104] ? follow_page_mask+0xc2c/0x1040 [ 1520.673973][ T3104] __get_user_pages+0x947/0xee0 [ 1520.675320][ T3104] get_user_pages_unlocked+0x135/0x5f0 [ 1520.676736][ T3104] __gup_longterm_unlocked+0x47/0x110 [ 1520.678500][ T3104] internal_get_user_pages_fast+0xfab/0x1130 [ 1520.680135][ T3104] get_user_pages_fast+0x5d/0x80 [ 1520.681493][ T3104] iov_iter_get_pages+0x1e9/0xcc0 [ 1520.683026][ T3104] ? kmem_cache_alloc+0x201/0x2f0 [ 1520.685171][ T3104] ? mempool_alloc_slab+0x16/0x20 [ 1520.686793][ T3104] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1520.688613][ T3104] ? kmem_cache_alloc+0x201/0x2f0 [ 1520.690091][ T3104] ? bio_alloc_bioset+0x27d/0x480 [ 1520.691764][ T3104] iomap_dio_bio_actor+0x673/0xb50 [ 1520.693245][ T3104] iomap_dio_actor+0x26e/0x3b0 [ 1520.694962][ T3104] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1520.696298][ T3104] iomap_apply+0x1e2/0x400 [ 1520.697918][ T3104] __iomap_dio_rw+0x5af/0xad0 [ 1520.698991][ T3104] ? __iomap_dio_rw+0xad0/0xad0 [ 1520.699717][ T3110] loop3: detected capacity change from 0 to 512 [ 1520.700796][ T3104] iomap_dio_rw+0x30/0x70 [ 1520.703525][ T3104] ext4_file_read_iter+0x21a/0x290 [ 1520.705062][ T3104] aio_read+0x1c1/0x280 [ 1520.706248][ T3104] ? kmem_cache_alloc+0x201/0x2f0 [ 1520.707987][ T3104] io_submit_one+0x7fb/0x1350 [ 1520.709624][ T3104] __se_sys_io_submit+0xf5/0x260 [ 1520.711284][ T3104] __x64_sys_io_submit+0x3f/0x50 [ 1520.712811][ T3104] do_syscall_64+0x4a/0x90 [ 1520.714094][ T3104] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1520.716456][ T3104] RIP: 0033:0x4665d9 [ 1520.717581][ T3104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1520.722228][ T3104] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1520.724227][ T3104] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1520.726294][ T3104] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1520.727966][ T3104] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1520.729885][ T3104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1520.731488][ T3104] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prlimit64(0xffffffffffffffff, 0x9, &(0x7f0000000040)={0x4efa6f58, 0x1c1}, &(0x7f00000000c0)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000080)={0xd06, 0xb3}) mmap(&(0x7f000030f000/0x1000)=nil, 0x1000, 0x0, 0x100010, 0xffffffffffffffff, 0xd4a6a000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) [ 1520.749094][ T3115] loop1: detected capacity change from 0 to 264192 [ 1520.754552][ T3121] loop4: detected capacity change from 0 to 184 [ 1520.754815][ T3110] EXT4-fs (loop3): Invalid log cluster size: 37 [ 1520.759804][ T3115] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1520.788785][ T3110] loop3: detected capacity change from 0 to 512 [ 1520.791230][ T3110] EXT4-fs (loop3): Invalid log cluster size: 37 05:35:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001240), 0x0, &(0x7f00000012c0)={[{@sb, 0x9}]}) creat(&(0x7f0000000000)='./file0\x00', 0x82) 05:35:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000002e000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:41 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000200000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f090000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:41 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000800)=[{0x0, 0x0, 0x4d8}, {&(0x7f0000000540)="fe69910e787b3aa5be53c5fc04ae776d70fa", 0x12, 0x4}], 0x0, &(0x7f0000000080)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r1, r0, 0x0) getdents(r0, &(0x7f0000000280)=""/200, 0xc8) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000000)='#\x00', &(0x7f00000000c0)='./file0\x00', r0) 05:35:41 executing program 5 (fault-call:9 fault-nth:18): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:41 executing program 0: io_setup(0x6, &(0x7f0000000240)=0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e40)=ANY=[], 0x1378) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r5, r4, 0x0) getdents(r4, &(0x7f0000000280)=""/200, 0xc8) ioctl$BLKRAGET(r4, 0x1263, &(0x7f0000000080)) io_submit(r0, 0x2, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000600)="9b", 0x1}, &(0x7f00000005c0)={0x0, 0x0, 0x2, 0x5, 0x0, r3, 0x0}]) 05:35:41 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000300000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="00000000d093f90300000000000000", 0xf, 0x2b4c}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000001c0)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x100081, &(0x7f00000001c0)=ANY=[]) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2286, 0x816d000) mkdir(&(0x7f0000000080)='./file0\x00', 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x300, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000380)=0x200800000000000) splice(r0, &(0x7f0000000180)=0x4, r1, &(0x7f0000000280)=0x1, 0x1, 0x0) [ 1521.340404][ T3142] loop4: detected capacity change from 0 to 184 [ 1521.354448][ T3147] loop3: detected capacity change from 0 to 512 [ 1521.356904][ T3147] EXT4-fs (loop3): Invalid log cluster size: 46 [ 1521.365277][ T3148] loop1: detected capacity change from 0 to 264192 [ 1521.412050][ T3148] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1521.420656][ T3147] loop3: detected capacity change from 0 to 512 [ 1521.433035][ T3147] EXT4-fs (loop3): Invalid log cluster size: 46 [ 1521.439369][ T3176] FAULT_INJECTION: forcing a failure. [ 1521.439369][ T3176] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1521.441507][ T3176] CPU: 0 PID: 3176 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1521.442968][ T3176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1521.444659][ T3176] Call Trace: [ 1521.445264][ T3176] dump_stack+0x137/0x19d [ 1521.445986][ T3176] should_fail+0x23c/0x250 [ 1521.446975][ T3176] __alloc_pages+0x102/0x320 [ 1521.447743][ T3176] alloc_pages_vma+0x391/0x660 [ 1521.448721][ T3176] ? unlock_page_memcg+0xc3/0xe0 [ 1521.449620][ T3176] ? page_remove_rmap+0x1de/0x230 [ 1521.450559][ T3176] wp_page_copy+0x14c/0x10c0 [ 1521.451338][ T3176] do_wp_page+0x5a8/0xba0 [ 1521.452119][ T3176] handle_mm_fault+0xb31/0x1a70 [ 1521.452936][ T3176] ? follow_page_mask+0xc2c/0x1040 [ 1521.453766][ T3176] __get_user_pages+0x947/0xee0 [ 1521.454536][ T3176] get_user_pages_unlocked+0x135/0x5f0 [ 1521.455553][ T3176] __gup_longterm_unlocked+0x47/0x110 [ 1521.456575][ T3176] internal_get_user_pages_fast+0xfab/0x1130 [ 1521.457863][ T3176] get_user_pages_fast+0x5d/0x80 [ 1521.458875][ T3176] iov_iter_get_pages+0x1e9/0xcc0 [ 1521.459757][ T3176] ? kmem_cache_alloc+0x201/0x2f0 [ 1521.460559][ T3176] ? mempool_alloc_slab+0x16/0x20 05:35:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000048000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:41 executing program 2: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0xa}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x40080c1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x7, 0x201, 0x0, 0x0, {0x3, 0x0, 0x2}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3ff}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000890}, 0x24008004) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, 0x0, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x12362a0a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x8880}, 0x4008880) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_netfilter(r0, &(0x7f0000003940)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000003900)={&(0x7f0000000400)={0x34f0, 0x8, 0xb, 0x5, 0x70bd2d, 0x25dfdbfe, {0x1, 0x0, 0x8}, [@nested={0x1261, 0x1f, 0x0, 0x1, [@typed={0x8, 0x50, 0x0, 0x0, @fd=r2}, @generic="3bdd1bd910", @typed={0x4, 0x35}, @generic="6677e25a0981ed811e925ccdbe4373b8f79758b284b3d3c6a2a8a4c050263e1c157f42a07f6b7ecafcf8c535c6c563bb26e9cd98340906583cc5509e87f0743057fccaa7ff444f83de328112e7f8117b678e13fd27ee32bfd0c336b5c025374f571ea5fa416e37adc23243d79c69a822504ee889f33bb950bf24700583966a9886b56a10bf95046bdf5ed02716ad248538b116bcf24ffccdf8348109c08485c211c81fa4d649145ca9d8b0b62ec74664a79db42db6ebff1d10010694d69908faf7bc7a358910f2e1fe6b019a00cd9182f30e76345916860ae0eb6518459f6019f18a71bfbe2397d8cb6e83f212b6", @typed={0x8, 0x4c, 0x0, 0x0, @uid=0xee00}, @generic="7737895ff758a25fa02940f663d97f70e1187e12532b4db966a408f5a551fc721f75d3f02bf9989e5da1cd6f9c1e168214c47fddf99336ec63a9b0234ce1c9bb797bcfa0c044c43f2c7fb118ca94588639616b35d9a46722ea38786dbead284c577f005e97a12db5ddca93339af49d3edd6548bb8c711fee2d9f45d5433a0fac34b10cf535ca7f7967600bc5fbcd017d901626f9ff993644ade523e6aae322fdc517", @generic="cc747c55632fd70d71a4cd31abba451965970d705116e0cf4fb82ed30dca5a80c4b6ff81462be96a13018420529c928212f8e7590309b366d38994255b69d7ddb197e8450ee96b413c03828388151564c2de3623d7b25487b0d4e3fefcecc7f7d0632ee6efc0b5800e539a5d3e212060b30badf4b1e33963c9fb17569c3778eef9a4cfdcbf4fc02b936bab961a134d062518991ba9bfd40f7dafe135ce7184e2347051c5742f16a85bfabd497703450e0f2f7746f390b206300c3ae043e259b7f837c3f0a87ceb26b54580ffdb33d3253a49d2752ef1d24faf73dfdf5dd0c686896ae523f464a8906923dd4468ba124e7190cf18ee5180f553cacc258f5a767dddccb75694dd3562127136fbec05e5424890aa311688672665904ac8731af1f2db98dbe40cbabe031f9ea0b7c64983aa40e8260504dd9682f0c86c95e0e7a0fd6271c90f70b12d389e849f5018ab65a4d5e518f205926e2e5304232759d12a720d9a8eec529ef8b82e4e8810b4e7ebe408d26ac3bc88c9b077cacecfe64e13015f1f0d48f57f74bc56d7714cb0b3bd83cfe40ae8215fb0da1c1ddd6a543eab25d1939c8b2e60c63ff6635dc9e09cced04dc37524a1ffd62b4cfe72f5d2d6fb9eb16ecfa086e9f38b85a0ed525f55368404b19e67f89e213c222865f5d2cc5ecdbed9a773439e8ef1663288a35e3ac95abc75cd8ed417b18a59249d5814087a5712b1bc4fca061b154ed9032d90c5341ae400b6f0ce029be38a5fc9b6fb4b9d866ffd6d75c44a235bc4a36eb0102ea76312c9c57a2ae1fef812ccd252c4bc7e4e29ba4f8711cad864836e5882bcd9e63a33a61eaf33565b105b9c49b7039b233219513b7b21dca0e0d22136cee19eeb8f091a0ae003326e48705c2196da0f68b09b0853b1eea6f2dcb2fceb206c78d126fa47791151a8e54845ebfcccb587906e1ab82a18d18da1ecdd9fa166806aa26d0408b7733d82e77713d96259b6a7949f347ba964e4577fe57ee65bb016f337aeaa5f638184c04dbc869df78989d8442f29d38d5eb7b8c9b5a8cdbf80091fd383e657f4503218ae0ba048685615e21dfeca0e3b41beeac00d85176d145c5a17898689f7afdf7c0d4c2188ba4710e97c2c52a8f05f6cba2851290b5ea5e9cf70d8d041739c67969ad3cfa382cc81d7b430cdf7ecb9dfd371671cef113b0cd70af0def9d23ed892c02c2e4f93e8dd3256c406ebfdb38c69b86e82929736bde8dd6bc2c3835104880305711de9a9e9d391c627e4ff169bc2368ee71114e8df5eb9a898c10e588e8529e2a51e92cc070c763497c456e9c27fe184cce53c15771b2c665332ab30aa40bbf4f101c7fa38aadcb00893f50912363b16c59bea1641a18c9c719e3e66ecae08f7af4cb641ff29f496cdb7a75801f97ca493f7e9a83c475b141433bbafbd6792e6d3863813beb545a51782e323b0f957a46ffd1148f2e3b36ac14032dd4194150c0bf70c40eb57f8c8f8562a7d99d20893ed0fdb199c466e81def10fe9fe8df74a7a8e013071489c2fb277b5b63af58800055847e0074b3170a69b86c1d1905dcb8cba482543872e1ca19b489c45f3a70e06327d23ae114d3bc4bddbcbb6284d43cd4b4993815b6f4c683039479b27e4c8a8dfcdfad79037a38fed5e29f799bb485aba63d8a45eade362e848202366e9ac50fea04ea5ee46aadab6738a401e8f3c20169d3fb09a4d45b88eaecc0d4b208e1627cfa899233ae5cb1373f83c807fab73e632c526a95127a4c54f2d0cde8abaf49b6d22bad04fefdd46c9f900e641c28f90c49f30cdb576cc3e4b8d3d5e53708674ecb87d612349adcef621a697706b7ed156c7f08682e7e66ba51634c17994f367a723332206a2275bd8ae3de68f8f30e49865f2e17698546c4fc7a1c8429f18390e0b4f45cc8287a7c8e7cee90128486dae5dc32449fc7fe1dd44ab929ee2e2f9cea57f5b11b5a6994b2719523fc897c0798d0d2a3e9fe3b51d4786de7a764e2bf13363f2343f8ddbcca1de36fab46c2bac4ed28cc0059a7ca73dfd6900d7386bf56fb0ae4f8cdc342621b2e39318fce3e67d81fcb34d95d76900f3f98d12cfb84c5b288d060f093be0b255115092acffd1b97c2ae962cacb290eba730f66bc87ce1124df51eae9b31dddb235c130d98767752f3105e7b434308c78e16b0da8cba53cbb5c3409a8786ef6cdf85344714d6e25635a122bdca2d80957e1ae350669e897697d23f48524d192c53db929e1aaa9a64c28b9d35acfb3d9a7ba8a23871a8cd5ac4df58acb0f1b0c2e34af1525504dcdc094eae3056aca78e1268d70255ab6a040778f0b3db1be1ed9c19eaad9ef3abafd7823090cd016e4fa21e62cd772da16d47bab1d90f39e1bd57d29f4054f5c627bff21e6b7429207966636000cb40cb39903fc66a0203d79ce5a358d91819138f6dfcbf02724d16c1459f2994b7a07948fce38770a70a31f29413c5a5e184bceb798d96e3f43837cd93ad9f97279faa949b4ce794f28f521a875bb69202060726fd2c2b4d232d340449ce2112e79d60d6476dbdf9d27bf70ab081e8c24460b55d708a2ec9857447b42ee87696c41f608489d40dd3e509b1589d78d211c382e0e40bba5c8b9d551de714ff8aec54fcd64779c18961a23c8b4c0e87c1ab34bbabda361c3c2c8179d586b81a5358a1209cb2fe3de97b2fc8b701051910c427b22a727c35e7677e2c8f3e05356921181126edc031a4b64e47e54cb8ab0171170d7ccf84a130089dfba40e3181c412e135aaba84782a88d7f2a61f0978e7f6dba11cfd8e3007b487d65e90b6d3d17876027109308957289734ceabf5421895ac40714bfce6e1b2d27b829fea3b78a864f4baec0ebd7674a0ce462b2d4ee45251ec8cc350ab969f6f766f28ba94df4d5158f1021bf5e9ee9f9538524d8b4dff515f7570a17c371b70628b369381aed4470a134e2dd18ac2878099a8d928033693dfa733332ff0aa8685e5688993d4aa8ea4a53ee92a58e7bd6b304143280d1352cc4fd957c83cccb4aaf40962bf625e65988751ad76b6c3a370e6a51bec61783f8376c25410fba3a8b05e352be8798752a138c244ab7e49a49748d31997c383dbb275f9695d7751a17be260f56ad37319e46841aedd4df10a4ece875922e42927be11a40922b881258f80b887e08b4da245b514667ef3e2d079c3eabaa171707c11b2489b711a142a057470ca580f9fc34dbdb906aecfe0ecb428ea62798bcdae2b2c6aee1d28ea9dd147bc9e9d4faf931d162d03271598a3470354cc036df76664e86efedaf86c3ba6667de1771ff59fcaa8725428fcde25b2651f4a6927805903e58ccbc4c58f0abf5e3d4668cf3ad63e7442701ac4f339d8a07cc44035e6a085dba25b14778c14e17f7a0f744ae4a0b3a2873715c20f48aba5a48b4b81a6bf2ae5f7ebcc403c47fb35159d82832587901800a661e4d0ad6a18fbadfdfa3d1a4395447c91370baec27e5dd294842870a1f9efbaf2cf198e2cc7e0f8c706183ec5be9e5ddb09df7adfd576a1ac8b8559c4610fe1f2add849ec9085d198a4a2ffdcb8314a5dd6620f5fb7c91013c2998192ff828a4037586c1f523d2bcbc926ad400d326a46b75dec80b26a6c369c6d0348e5a0e318a600ed43e0413576942b50a01a945d0aebad7ef1e7ba28ad8bd409d77e28e845f39f910a525bb00a1cbc460116956935ebcf59a8424f5ab3118c8513fff44a4239664d50da8b7c2acb111752f1d4fe06ba2469a8f16b01939d874f9197e798350307214d43bcf55d639c44263444036e213271d3d249263a2fc8b0c26913c9669ec7ccd1a40e4da0c917053ec34b20a70c7b6692c2a28f829888e1bf827e6ed588e466df03c185dfa7d6f4b07b41a7f7cf83b482362aa05b157ba0b6275c1514aebd406174e1630314bb18d086b510dda656989811bc7e5b200754389efcecb8a78b095832c160e3a79e4bf79c68eff191d8d44e705797ff4ee30b0581bc1fb847b1acbb180b9d506fc41b14fcfec39ba9cb806dfc6821c0c4466115c4811350fdbc1732dc925baa1df7e5bc1019aa026a2da5157b1cb3cfa9d00a03ca1d442926c8837292b4c8e680bfb7a17eee01633cd747850d6918cbda6e2e2d7ff4fc039f5d7b6cfdcd6e6f8af3fc380096b290913ebd87cb25341552f356eca8887cf04c46e4d6f32cb25dca88dca65f34e88ee599871b1eea670cdb9f5579813365f59a4644170f86e2b579491ebd61dd82e6519dd5d6591335c0b4589a9747a2576a07082f6a36c1762201c49696ae03286540e6b875871273e628ac5b20d13d2705be43b0a193cfba78983a5ae97d0b9e13b4464d77b60555e50c184045d7576baf1b2005ac3f791eae177db8b9a3ef971987c2817231b9b828e5b9888c14dee17163f3b820e3de00d663c41319471edef9b30d1bcf0becb62e439f9ae53eaa59d16ad63d074296e87ce6471017363463fb87135945ed0eeb554394089d4251f6a7741a1b37d642efbce73b0e38c1dd0fe7a11e4f5317166aea3384cb7a50f8dcb63032390fd38b3f40c1a9047d7201ce58cf95ff37264defc3ea4f9ccc9a997711f532fa51a69b15321de2f2574e7f3a1029f3ef4572112a704cc8eaa694fa1295ed72eb19935e70995d087eceeb4b1088ac78dc01b36cfba5fac296ffba7779b73d1dc85c73c4b33d0d3deb1e7c01d4237114e67344134252f179f9dd67ebd117082b1551493bd4fdcbf0d8cb878f4f2b22dfa23bc6dfc42419c833d015c8f435d6c834065394ccccd3fe8a1f4135bc87c80c8bd9dd623920edc7fca21633d78674bc554e807cd05dcc9f87375e1eabebba3f24bd5eea96376ff14c91c355ecabad23de71418a5f5b296ea8f58c15eda073047817a00803a3f34840d2b9d52dfda3c8512bf572c078e22940eb83fafb46d3e547b42c975ad910cbacde8ac63af521431881ebef246083a1e11baaac0ca3f93cc7f7cabf56ff904c10724c4a82d96d9560ed02d070a56438f0eb3d579ab3c49b0aa64ec763d39cb3e52747584b6cdf915fcf3e65bab62ec778f63492f65f50b438e746eac18edc62a76c51d1f76e79c52bf60a36d8cb9c00275bbafac232b4ee016e747efc99465698207deef946235239d8fd4d01d5f8b06ed1d33e2e452c8f4dbb18d78af5792f2f6b4c683b6adb78ae1f9997dac16b48a169bda4578bccc2341b43e661dc760cd56e8eb9cdb70bbfdb54267d98bdb518baf0715a7f646e3ea6003b09a33504a1eacdd47d9751943b256bf5a0de7768065197e198cee0fabf875d18bb9104188d1e7f85dddc661d10ec8a4b1504311030d2e302eeb1b2087a88f590d74477f48c3f336da15370be04649e4aba7c3e3a9e84d24f5c2233f7bcf887f36dcab43a3fb351e41a1dcae60daaee317e08357c9121672915b10af2cec8861d1e39a505cb94039fabb4fb924b15df726c1cef61ceb9f5eb9be21162690a9e0724a7158476b6cc55dd80afb59ff7a4cce5185991c515737b8e7795cf0f63fd35f8e30ca89fa029494cf56b52f4ebc17fcc049823544d9b6d109bac8fc1fbf232ebeadc3b551619458ecb5fb6e2238d5728d42ddd5ec86cfdcdd4f086bdfba233faa1b275e8e8c0b97580463ca23509a4f7c677339eb12bf380f55f6e200502ce2ed1cc3f54b867dbb91f33ad500e17d9e9196d93afb46c9e21c986a531de4b74e14c74326cc2a638ef9a6ed5e6fbda8fe0326de6ad71cb595b41d685361c04964e6e6f767b714ea77d59c5fc48d8fdfab3e6bced7b1b375cef60e1a03", @typed={0xb1, 0x8a, 0x0, 0x0, @binary="25e1b50b465418ebd46e6d73ebf9c5fae285a42e08ec95bad3b823106306e754fb6c3461d7e87da1b5e7561e423f081454ab046367c20b8a50d76fc6cdbc6eb47372ede9252f0bf01d41185d4cc4fac562f8bdc22bc414ae0fadab0af6d648f0571abb806290ba776dc52b0d10407c1703dc85097fc53b22a84658f364bf7140852c096f8ef45d0aa62e4cacc0ee7babcd58a5d4dd13fed4fa652f9fd843eebd0d80c4f9e9aa8e03d04e0ce661"}]}, @nested={0x10ce, 0x1f, 0x0, 0x1, [@generic="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", @typed={0xc7, 0x32, 0x0, 0x0, @binary="7df4a383c7d38dfdbedffada4e3f7c6bf695e4cdc49eeff542eb791a451b0c1c4cab1809b1ad4806487773370881e038606b940802516a9ee62c878e368f7f3275c68409fa852abfc21cf5222c5f5eb6f944077ed3fbcf63ec2c25352c836d3378c5e724b9123946e17f443058a46ad974ee181eefe719f432a6bce68a4a9a52ac5d57ff7e8a35d204dc6ce507b6998933c6fe88172f73abef5a9de8ed5dc068271a10ccde5c2839c7d966bf351ec7fbec81e8a106a71d1639bf8e5d7d3f1897d18846"}, @generic='*A']}, @typed={0x9, 0x29, 0x0, 0x0, @str='syz0\x00'}, @generic="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", @nested={0x199, 0x65, 0x0, 0x1, [@generic="0e470fd9cb1375001f639107fa4bf651fa11b626c64a45158b641a23c34ea9dfbbc334e9d705af24cc75f18407cf8c6ea52c182b18bc4f040568cbf46925b22cc3d8", @typed={0x71, 0x26, 0x0, 0x0, @binary="91db3619e38b444d8ce16d54c97a92c0814caf7faf6069ea3ee1e695fb93d6f4f6a9cc52d7dc722cfa62af051f38252d95fd0882a9edfe92bc0b60a24e44a7908ff226a8dd088b4e132a703834b2515c9572f919ff8640f0f8051338602d65c07a346b7631fccb35e3afd14bb1"}, @generic="7bbee7923ab3dd946e9537bbd9029c19731a478e015ce2e66111f0560f45edef071d8fa4fac167fc7148ef0b970eff1ebbec722e933778ae54004a5df6a01bb4c9c202373cb8a7ecfd481dbd0ba52e83d2fc7495b73984c537bef8bc59ffca61d13f7aa39e4cbac4132f8f99f711d805aa27ce9b2cb7aa345ccbac7a3940a8255f10a109b83c76769bf1e6b8f8557b2ba1fddc9396f2d3297fc3126eee802aa13a1b1b8aff0e971aa1e960f98e6f56db6689848bf715f8caff5143a6d84fd1259d24f1e14db3f96b4441be944eb7991b9b62cdcd253bc0132416ec65234f39"]}]}, 0x34f0}, 0x1, 0x0, 0x0, 0x20000081}, 0x4040) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000004ec0)={&(0x7f0000003980)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000004e80)={&(0x7f00000039c0)={0x14a0, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_EEE_MODES_OURS={0xf8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x80, 0x4, "b6967bcc89b3a31f433044a30f1ffb15d4921ec021d4884b0a3a66439d8656d3bf7d9b63f5984f3c58c8da39d5db37ab4a5eb5b23759c3eb060441a96c21b39e45a9f620eda0221538824f78fa01f89b3c75b1025782aa77bca047b267fbb6767dbb7ceb51d7985da936485a052b479108f7e909f40cd7618f23be3a"}, @ETHTOOL_A_BITSET_MASK={0x6b, 0x5, "d348e254196939767c9c4cd242504a54aca5060384bcdc18369729bd6d62fdc51d977443c8ada8dc3fcac93d1cf90903fe71ac0db3fe746ac5de740e3a334c50dcc0d5f759f6fe8652da450a2f598c62a6e124b910d0d8a8d548490e86467c78556ad5c20439e3"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}]}, @ETHTOOL_A_EEE_MODES_OURS={0x1384, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xed, 0x4, "b52da2a8a3daccbb52db406a1ed5d48f337e2308a727cfaf7fdb1039913d4a442a5010f31be7ca7fed8695028075b1984069bc398290c94d15b6dd0755384499206716ea88dfcc4ae9f233c58820775cf1fa2210802c0b071044b0670228896d089efbb90238e7faf16319b976db5b3325958eedef2c0f7d36afcd38795d000b5c3c67ff39f5f43127b2177c9012f6bbae7dc3f0e36f9f92419fad19339b48bc16f0708e0b0e67db34a0fb9594e2c35d65c4ea250c3122e943ef7c0956cd3c506cd2f55970809ef05765060879a00bc2ba07a42d0775cf9fd344e5d921a0c16ef6cf093ef1a7048f41"}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xd7, 0x5, "51a1be9db6a71920f84086aefead6a305cc8cebcb79aa6ce8382dfa8ea0e4738a3e6e50cd436550aadb6ea35794696bf6e2db8559f9ece7acbf0f3300add455f31d58d214bca6446e9ef14a74c17fdbf978bb438c2d9e72a2b21e9c7140a3debbd13de1fe03660fb30f46ee41d71415c43253811512075d86684574d850bca86191d9282f5a2a296ea59089d25fb31fe6e143feefeb453f81123636dacc69c43c8fb095c77e8cddebd4be2957dd6f3157bde736daebe4eac334748680abe9cbe7df70108bbf660ab2ddb5f610ee02ffa7e663d"}, @ETHTOOL_A_BITSET_VALUE={0xaf, 0x4, "318a885a305af39d57b5c1589910e1cd41d49511f0680cfefd0b798608a6f466e6ba68237cdb122dc68427231978dd2fc5e13d4d4c6131362cb82b6260d7732b8dab234087bd42f392208b123f9dafc517c6c7a8197ae92ab23ddab7a0a7f8eb7a80acb97cae2237868d2e6fa996ec51da8fe2d20c5af8a056063818ed55382baf6045af74ae1952f36602bcdc0b9c0146a5f2185cee53c06593ba61f32d9cda86ca4ddfcbaac5e46bf438"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_MASK={0x66, 0x5, "7dd87b485633cf1be23e5cc5a6dc0c0f9e82027a5d27ae245047d7c1d5504d15d999960c2bfcc94aa66d7cdc8960193a260a93d6c2327e2ed65654c321907b371438a307352a55b97d478752fc53c126c8f866290ef08ba255ecd2dabc5e1e89d024"}, @ETHTOOL_A_BITSET_VALUE={0x93, 0x4, "2279e1975ae8cd7bc4e71063a5a3980c352dc0a3cdeb8ca5c95a0c240c53e06aedeffd827ce0d7e4338d3902a176d3f272123e70b52aca4b31fc79f955b0b43abd80dcee48221bf2efda61d0b948cdcc99b96b4e562ff64da56192b48e85616617709082e0ab9a5ff4bce0310e4e79b25d5ff31aa40ae121af1d9c63ab8f1fe0ee90015f949239a67168f1b7fdda53"}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x3}]}, 0x14a0}}, 0x240000b4) r3 = accept4$packet(r1, &(0x7f0000004f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004f40)=0x14, 0x800) recvmsg(r3, &(0x7f0000005240)={&(0x7f0000004f80)=@caif=@dbg, 0x80, &(0x7f0000005140)=[{&(0x7f0000005000)=""/14, 0xe}, {&(0x7f0000005040)=""/219, 0xdb}], 0x2, &(0x7f0000005180)=""/132, 0x84}, 0x20) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000052c0), 0xffffffffffffffff) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000005380)={&(0x7f0000005280)={0x10, 0x0, 0x0, 0x2148000}, 0xc, &(0x7f0000005340)={&(0x7f0000005300)={0x14, r4, 0x400, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000005400), r2) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f00000054c0)={&(0x7f00000053c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000005480)={&(0x7f0000005440)={0x20, r5, 0x1, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_RINGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004c000}, 0x20040000) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000055c0)={&(0x7f0000005500)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000005580)={&(0x7f0000005540)={0x2c, 0x0, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x27}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4080}, 0x24000020) r6 = openat2(r1, &(0x7f0000005600)='./file0\x00', &(0x7f0000005640)={0x515180, 0x10a, 0x1}, 0x18) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000056c0), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r6, &(0x7f0000005780)={&(0x7f0000005680)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000005740)={&(0x7f0000005700)={0x2c, r7, 0x1, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'vcan0\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4841) sendmsg$IEEE802154_LLSEC_ADD_KEY(0xffffffffffffffff, &(0x7f0000005880)={&(0x7f00000057c0), 0xc, &(0x7f0000005840)={&(0x7f0000005800)={0x1c, 0x0, 0x202, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc01}, 0x24000804) 05:35:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0a0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:41 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000004000)={{r0}, 0x0, 0x12, @unused=[0x9, 0x714c], @devid}) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}, {&(0x7f0000001440)=""/206, 0xce}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000002000)=""/4096, 0x1000}, {0x0}, {0x0}], 0x7}, 0xbed}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000003000)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0x110, r0, 0xb8156000) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='syzkaller\x00', 0xffffffffffffffff) clone(0x80800600, &(0x7f00000002c0)="81a88b4d522cc07bd00cb7f7e742fba91f40cb5d75", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc1009d252ffdafceee9a3312d9309e86c78533a7cdaaebc0049c86c9f100791a9937222b35510c71ff9a81a0cc1edcba343b7cdc4705abb1f5a31e782ee57abd4314dcb922545184135748800becfd5364d30ac455041c9ea567d06041b2c4039afdd13c6f9b55fc35535f630b8810ae63d3be233ba292e781e3fe6098") add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) [ 1521.461403][ T3176] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1521.462409][ T3176] ? kmem_cache_alloc+0x201/0x2f0 [ 1521.463338][ T3176] ? bio_alloc_bioset+0x27d/0x480 [ 1521.464105][ T3176] iomap_dio_bio_actor+0x673/0xb50 [ 1521.465079][ T3176] iomap_dio_actor+0x26e/0x3b0 [ 1521.465908][ T3176] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1521.467049][ T3176] iomap_apply+0x1e2/0x400 [ 1521.467748][ T3176] __iomap_dio_rw+0x5af/0xad0 [ 1521.468575][ T3176] ? __iomap_dio_rw+0xad0/0xad0 [ 1521.469319][ T3176] iomap_dio_rw+0x30/0x70 [ 1521.470126][ T3176] ext4_file_read_iter+0x21a/0x290 [ 1521.471031][ T3176] aio_read+0x1c1/0x280 [ 1521.471934][ T3176] ? kmem_cache_alloc+0x201/0x2f0 [ 1521.472732][ T3176] io_submit_one+0x7fb/0x1350 [ 1521.473539][ T3176] __se_sys_io_submit+0xf5/0x260 [ 1521.474434][ T3176] __x64_sys_io_submit+0x3f/0x50 [ 1521.475258][ T3176] do_syscall_64+0x4a/0x90 [ 1521.476185][ T3176] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1521.477217][ T3176] RIP: 0033:0x4665d9 [ 1521.477884][ T3176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1521.483355][ T3176] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1521.485288][ T3176] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1521.486886][ T3176] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1521.488258][ T3176] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1521.489424][ T3176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1521.490710][ T3176] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1521.510661][ T3175] loop4: detected capacity change from 0 to 184 05:35:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000400000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0b0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1521.549394][ T3188] loop1: detected capacity change from 0 to 264192 [ 1521.550478][ T3192] loop3: detected capacity change from 0 to 512 [ 1521.556045][ T3188] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1521.569219][ T3192] EXT4-fs (loop3): Invalid log cluster size: 72 05:35:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000004c000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1521.603519][ T3206] loop4: detected capacity change from 0 to 184 05:35:42 executing program 5 (fault-call:9 fault-nth:19): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000060000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000500000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000004000)={{r0}, 0x0, 0x12, @unused=[0x9, 0x714c], @devid}) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}, {&(0x7f0000001440)=""/206, 0xce}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000002000)=""/4096, 0x1000}, {0x0}, {0x0}], 0x7}, 0xbed}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000003000)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0x110, r0, 0xb8156000) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='syzkaller\x00', 0xffffffffffffffff) clone(0x80800600, &(0x7f00000002c0)="81a88b4d522cc07bd00cb7f7e742fba91f40cb5d75", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc1009d252ffdafceee9a3312d9309e86c78533a7cdaaebc0049c86c9f100791a9937222b35510c71ff9a81a0cc1edcba343b7cdc4705abb1f5a31e782ee57abd4314dcb922545184135748800becfd5364d30ac455041c9ea567d06041b2c4039afdd13c6f9b55fc35535f630b8810ae63d3be233ba292e781e3fe6098") add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) [ 1521.635379][ T3218] loop3: detected capacity change from 0 to 512 [ 1521.641819][ T3218] EXT4-fs (loop3): Invalid log cluster size: 76 05:35:42 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x7f, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x4000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xf}, 0x0, 0x0, 0x9, 0x0, 0x40000000, 0x8, 0x20, 0x0, 0x7, 0x0, 0x8}, r0, 0x8, 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a543) mmap(&(0x7f0000fef000/0x10000)=nil, 0x10000, 0x100000b, 0x810, 0xffffffffffffffff, 0x8e864000) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(r2, 0x0, 0x2c, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/200, 0xc8) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0xac70, {{0x2, 0x4e21, @remote}}}, 0x88) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r6 = dup2(r4, r4) sendfile(r6, r3, 0x0, 0xffffffff) 05:35:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000004000)={{r0}, 0x0, 0x12, @unused=[0x9, 0x714c], @devid}) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}, {&(0x7f0000001440)=""/206, 0xce}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000002000)=""/4096, 0x1000}, {0x0}, {0x0}], 0x7}, 0xbed}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000003000)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0x110, r0, 0xb8156000) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='syzkaller\x00', 0xffffffffffffffff) clone(0x80800600, &(0x7f00000002c0)="81a88b4d522cc07bd00cb7f7e742fba91f40cb5d75", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc1009d252ffdafceee9a3312d9309e86c78533a7cdaaebc0049c86c9f100791a9937222b35510c71ff9a81a0cc1edcba343b7cdc4705abb1f5a31e782ee57abd4314dcb922545184135748800becfd5364d30ac455041c9ea567d06041b2c4039afdd13c6f9b55fc35535f630b8810ae63d3be233ba292e781e3fe6098") add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) [ 1521.686877][ T3226] loop1: detected capacity change from 0 to 264192 [ 1521.689249][ T3226] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1521.712352][ T3228] loop3: detected capacity change from 0 to 512 05:35:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0c0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1521.739565][ T3228] EXT4-fs (loop3): Invalid log cluster size: 96 [ 1521.743208][ T3244] loop4: detected capacity change from 0 to 184 05:35:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000600000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1521.765102][ T3228] loop3: detected capacity change from 0 to 512 [ 1521.783652][ T3228] EXT4-fs (loop3): Invalid log cluster size: 96 [ 1521.788568][ T3231] FAULT_INJECTION: forcing a failure. [ 1521.788568][ T3231] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1521.791246][ T3231] CPU: 1 PID: 3231 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1521.793191][ T3231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1521.794810][ T3231] Call Trace: [ 1521.795454][ T3231] dump_stack+0x137/0x19d [ 1521.796281][ T3231] should_fail+0x23c/0x250 [ 1521.797200][ T3231] __alloc_pages+0x102/0x320 [ 1521.798110][ T3231] alloc_pages_vma+0x391/0x660 [ 1521.798862][ T3231] ? unlock_page_memcg+0xc3/0xe0 [ 1521.799854][ T3231] ? page_remove_rmap+0x1de/0x230 [ 1521.800577][ T3231] wp_page_copy+0x14c/0x10c0 [ 1521.801428][ T3231] ? kcsan_setup_watchpoint+0x213/0x380 [ 1521.802372][ T3231] do_wp_page+0x5a8/0xba0 [ 1521.803192][ T3231] handle_mm_fault+0xb31/0x1a70 [ 1521.804197][ T3231] ? follow_page_mask+0xc2c/0x1040 [ 1521.805212][ T3231] __get_user_pages+0x947/0xee0 [ 1521.806023][ T3231] get_user_pages_unlocked+0x135/0x5f0 [ 1521.806936][ T3231] __gup_longterm_unlocked+0x47/0x110 [ 1521.807959][ T3231] internal_get_user_pages_fast+0xfab/0x1130 [ 1521.809369][ T3231] get_user_pages_fast+0x5d/0x80 [ 1521.810347][ T3231] iov_iter_get_pages+0x1e9/0xcc0 [ 1521.811233][ T3231] ? kmem_cache_alloc+0x201/0x2f0 [ 1521.812182][ T3231] ? mempool_alloc_slab+0x16/0x20 [ 1521.813088][ T3231] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1521.813954][ T3231] ? kmem_cache_alloc+0x201/0x2f0 05:35:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000004000)={{r0}, 0x0, 0x12, @unused=[0x9, 0x714c], @devid}) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}, {&(0x7f0000001440)=""/206, 0xce}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000002000)=""/4096, 0x1000}, {0x0}, {0x0}], 0x7}, 0xbed}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000003000)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0x110, r0, 0xb8156000) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='syzkaller\x00', 0xffffffffffffffff) clone(0x80800600, &(0x7f00000002c0)="81a88b4d522cc07bd00cb7f7e742fba91f40cb5d75", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc1009d252ffdafceee9a3312d9309e86c78533a7cdaaebc0049c86c9f100791a9937222b35510c71ff9a81a0cc1edcba343b7cdc4705abb1f5a31e782ee57abd4314dcb922545184135748800becfd5364d30ac455041c9ea567d06041b2c4039afdd13c6f9b55fc35535f630b8810ae63d3be233ba292e781e3fe6098") add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) 05:35:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000004000)={{r0}, 0x0, 0x12, @unused=[0x9, 0x714c], @devid}) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}, {&(0x7f0000001440)=""/206, 0xce}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000002000)=""/4096, 0x1000}, {0x0}, {0x0}], 0x7}, 0xbed}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000003000)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0x110, r0, 0xb8156000) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='syzkaller\x00', 0xffffffffffffffff) clone(0x80800600, &(0x7f00000002c0)="81a88b4d522cc07bd00cb7f7e742fba91f40cb5d75", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc1009d252ffdafceee9a3312d9309e86c78533a7cdaaebc0049c86c9f100791a9937222b35510c71ff9a81a0cc1edcba343b7cdc4705abb1f5a31e782ee57abd4314dcb922545184135748800becfd5364d30ac455041c9ea567d06041b2c4039afdd13c6f9b55fc35535f630b8810ae63d3be233ba292e781e3fe6098") [ 1521.814817][ T3231] ? bio_alloc_bioset+0x27d/0x480 [ 1521.815805][ T3231] iomap_dio_bio_actor+0x673/0xb50 [ 1521.816925][ T3231] iomap_dio_actor+0x26e/0x3b0 [ 1521.817931][ T3231] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1521.819118][ T3231] iomap_apply+0x1e2/0x400 [ 1521.819931][ T3231] __iomap_dio_rw+0x5af/0xad0 [ 1521.820880][ T3231] ? __iomap_dio_rw+0xad0/0xad0 [ 1521.821784][ T3231] iomap_dio_rw+0x30/0x70 [ 1521.822606][ T3231] ext4_file_read_iter+0x21a/0x290 [ 1521.823454][ T3231] aio_read+0x1c1/0x280 [ 1521.824154][ T3231] ? kmem_cache_alloc+0x201/0x2f0 [ 1521.824978][ T3231] io_submit_one+0x7fb/0x1350 [ 1521.825969][ T3231] __se_sys_io_submit+0xf5/0x260 [ 1521.826806][ T3231] __x64_sys_io_submit+0x3f/0x50 [ 1521.827641][ T3231] do_syscall_64+0x4a/0x90 [ 1521.828356][ T3231] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1521.829294][ T3231] RIP: 0033:0x4665d9 [ 1521.830182][ T3231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1521.833464][ T3231] RSP: 002b:00007f8cb2725188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1521.835238][ T3231] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1521.836639][ T3231] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1521.838109][ T3231] RBP: 00007f8cb27251d0 R08: 0000000000000000 R09: 0000000000000000 [ 1521.839347][ T3231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1521.840810][ T3231] R13: 00007ffd2fe767ef R14: 00007f8cb2725300 R15: 0000000000022000 [ 1521.854087][ T3261] loop1: detected capacity change from 0 to 264192 [ 1521.856384][ T3261] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000068000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0d0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1521.892636][ T3276] loop4: detected capacity change from 0 to 184 [ 1521.932957][ T3284] loop3: detected capacity change from 0 to 512 [ 1521.945182][ T3284] EXT4-fs (loop3): Invalid log cluster size: 104 [ 1521.964309][ T3290] loop1: detected capacity change from 0 to 264192 [ 1521.967681][ T3290] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:42 executing program 5 (fault-call:9 fault-nth:20): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000700000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000004000)={{r0}, 0x0, 0x12, @unused=[0x9, 0x714c], @devid}) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}, {&(0x7f0000001440)=""/206, 0xce}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000002000)=""/4096, 0x1000}, {0x0}, {0x0}], 0x7}, 0xbed}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000003000)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0x110, r0, 0xb8156000) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='syzkaller\x00', 0xffffffffffffffff) 05:35:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0e0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1521.982572][ T3284] loop3: detected capacity change from 0 to 512 [ 1521.985138][ T3284] EXT4-fs (loop3): Invalid log cluster size: 104 [ 1522.044103][ T3307] loop4: detected capacity change from 0 to 184 [ 1522.049043][ T3308] loop1: detected capacity change from 0 to 264192 [ 1522.051882][ T3308] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1522.115285][ T3323] FAULT_INJECTION: forcing a failure. [ 1522.115285][ T3323] name failslab, interval 1, probability 0, space 0, times 0 [ 1522.117435][ T3323] CPU: 0 PID: 3323 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1522.119122][ T3323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1522.121058][ T3323] Call Trace: [ 1522.121733][ T3323] dump_stack+0x137/0x19d [ 1522.122469][ T3323] should_fail+0x23c/0x250 [ 1522.123267][ T3323] ? mempool_alloc_slab+0x16/0x20 [ 1522.124061][ T3323] __should_failslab+0x81/0x90 [ 1522.124847][ T3323] should_failslab+0x5/0x20 [ 1522.125573][ T3323] kmem_cache_alloc+0x46/0x2f0 [ 1522.126336][ T3323] mempool_alloc_slab+0x16/0x20 [ 1522.127212][ T3323] ? mempool_free+0x130/0x130 [ 1522.127945][ T3323] mempool_alloc+0x8c/0x300 [ 1522.128732][ T3323] ? percpu_counter_add_batch+0x69/0xd0 [ 1522.129697][ T3323] ? iov_iter_npages+0x211/0xa00 [ 1522.130478][ T3323] ? ext4_es_lookup_extent+0x36b/0x490 [ 1522.131413][ T3323] bio_alloc_bioset+0xcc/0x480 [ 1522.132446][ T3323] iomap_dio_bio_actor+0x511/0xb50 [ 1522.133211][ T3323] iomap_dio_actor+0x26e/0x3b0 [ 1522.133951][ T3323] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1522.134795][ T3323] iomap_apply+0x1e2/0x400 [ 1522.135469][ T3323] __iomap_dio_rw+0x5af/0xad0 [ 1522.136296][ T3323] ? __iomap_dio_rw+0xad0/0xad0 [ 1522.137021][ T3323] iomap_dio_rw+0x30/0x70 [ 1522.137667][ T3323] ext4_file_read_iter+0x21a/0x290 [ 1522.138762][ T3323] aio_read+0x1c1/0x280 [ 1522.139390][ T3323] ? kmem_cache_alloc+0x201/0x2f0 [ 1522.140175][ T3323] io_submit_one+0x7fb/0x1350 [ 1522.140847][ T3323] __se_sys_io_submit+0xf5/0x260 [ 1522.141654][ T3323] __x64_sys_io_submit+0x3f/0x50 [ 1522.142409][ T3323] do_syscall_64+0x4a/0x90 [ 1522.143074][ T3323] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1522.144055][ T3323] RIP: 0033:0x4665d9 [ 1522.144697][ T3323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1522.148020][ T3323] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1522.149255][ T3323] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1522.150423][ T3323] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1522.151684][ T3323] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1522.152777][ T3323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1522.154169][ T3323] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000004000)={{r0}, 0x0, 0x12, @unused=[0x9, 0x714c], @devid}) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}, {&(0x7f0000001440)=""/206, 0xce}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000002000)=""/4096, 0x1000}, {0x0}, {0x0}], 0x7}, 0xbed}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000003000)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0x110, r0, 0xb8156000) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='syzkaller\x00', 0xffffffffffffffff) clone(0x80800600, &(0x7f00000002c0)="81a88b4d522cc07bd00cb7f7e742fba91f40cb5d75", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc1009d252ffdafceee9a3312d9309e86c78533a7cdaaebc0049c86c9f100791a9937222b35510c71ff9a81a0cc1edcba343b7cdc4705abb1f5a31e782ee57abd4314dcb922545184135748800becfd5364d30ac455041c9ea567d06041b2c4039afdd13c6f9b55fc35535f630b8810ae63d3be233ba292e781e3fe6098") 05:35:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000006c000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000004000)={{r0}, 0x0, 0x12, @unused=[0x9, 0x714c], @devid}) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}, {&(0x7f0000001440)=""/206, 0xce}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000002000)=""/4096, 0x1000}, {0x0}, {0x0}], 0x7}, 0xbed}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000003000)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0x110, r0, 0xb8156000) 05:35:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000800000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0f0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:43 executing program 5 (fault-call:9 fault-nth:21): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000004000)={{r0}, 0x0, 0x12, @unused=[0x9, 0x714c], @devid}) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}, {&(0x7f0000001440)=""/206, 0xce}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000002000)=""/4096, 0x1000}, {0x0}, {0x0}], 0x7}, 0xbed}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000003000)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000900000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1522.551550][ T3330] loop1: detected capacity change from 0 to 264192 [ 1522.564316][ T3330] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1522.574006][ T3334] loop4: detected capacity change from 0 to 184 [ 1522.591376][ T3342] loop3: detected capacity change from 0 to 512 [ 1522.594592][ T3342] EXT4-fs (loop3): Invalid log cluster size: 108 05:35:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f100000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1522.626372][ T3352] FAULT_INJECTION: forcing a failure. [ 1522.626372][ T3352] name failslab, interval 1, probability 0, space 0, times 0 [ 1522.628738][ T3352] CPU: 0 PID: 3352 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1522.630284][ T3352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1522.631934][ T3352] Call Trace: [ 1522.632502][ T3352] dump_stack+0x137/0x19d [ 1522.633726][ T3352] should_fail+0x23c/0x250 [ 1522.634580][ T3352] ? bio_alloc_bioset+0x27d/0x480 [ 1522.635505][ T3352] __should_failslab+0x81/0x90 [ 1522.636384][ T3352] should_failslab+0x5/0x20 [ 1522.637079][ T3352] kmem_cache_alloc+0x46/0x2f0 [ 1522.637882][ T3352] ? iov_iter_npages+0x211/0xa00 [ 1522.638944][ T3352] ? ext4_es_lookup_extent+0x36b/0x490 [ 1522.639943][ T3352] bio_alloc_bioset+0x27d/0x480 [ 1522.640792][ T3352] iomap_dio_bio_actor+0x511/0xb50 [ 1522.641595][ T3352] iomap_dio_actor+0x26e/0x3b0 [ 1522.642542][ T3352] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1522.643622][ T3352] iomap_apply+0x1e2/0x400 [ 1522.644324][ T3352] __iomap_dio_rw+0x5af/0xad0 [ 1522.645218][ T3352] ? __iomap_dio_rw+0xad0/0xad0 [ 1522.646185][ T3352] iomap_dio_rw+0x30/0x70 [ 1522.647194][ T3352] ext4_file_read_iter+0x21a/0x290 [ 1522.648023][ T3352] aio_read+0x1c1/0x280 [ 1522.648720][ T3352] ? kmem_cache_alloc+0x201/0x2f0 [ 1522.649831][ T3352] io_submit_one+0x7fb/0x1350 [ 1522.650579][ T3352] __se_sys_io_submit+0xf5/0x260 [ 1522.651400][ T3352] __x64_sys_io_submit+0x3f/0x50 [ 1522.652189][ T3352] do_syscall_64+0x4a/0x90 [ 1522.653059][ T3352] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1522.654100][ T3352] RIP: 0033:0x4665d9 [ 1522.654774][ T3352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1522.658195][ T3352] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1522.659984][ T3352] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1522.661569][ T3352] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1522.662758][ T3352] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1522.664191][ T3352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1522.665565][ T3352] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000004000)={{r0}, 0x0, 0x12, @unused=[0x9, 0x714c], @devid}) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}, {&(0x7f0000001440)=""/206, 0xce}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000002000)=""/4096, 0x1000}, {0x0}, {0x0}], 0x7}, 0xbed}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000003000)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000074000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1522.680543][ T3342] loop3: detected capacity change from 0 to 512 [ 1522.684780][ T3342] EXT4-fs (loop3): Invalid log cluster size: 108 05:35:43 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000400)='system_u:object_r:mtrr_device_t:s0\x00', 0x23) r1 = socket$nl_audit(0x10, 0x3, 0x9) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b) sendmsg$AUDIT_USER_TTY(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x10}, 0x10}}, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/41, 0x29}], 0x1, 0x5, 0xffffff80) [ 1522.741593][ T3362] loop1: detected capacity change from 0 to 264192 [ 1522.749385][ T3362] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1522.760562][ T3372] loop4: detected capacity change from 0 to 184 05:35:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f110000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000a00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000004000)={{r0}, 0x0, 0x12, @unused=[0x9, 0x714c], @devid}) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}, {&(0x7f0000001440)=""/206, 0xce}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000002000)=""/4096, 0x1000}, {0x0}, {0x0}], 0x7}, 0xbed}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000003000)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:43 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000140), 0x795a, 0x0) setsockopt$sock_int(r0, 0x1, 0x27, &(0x7f0000000180)=0x20, 0x4) set_mempolicy(0x1, &(0x7f0000000000)=0x3f, 0x1ff) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) set_mempolicy(0x1, &(0x7f0000000100)=0x9, 0x7) ioctl$KDFONTOP_SET(r1, 0x4bfa, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000040)=""/171) [ 1522.787311][ T3377] loop3: detected capacity change from 0 to 512 [ 1522.790735][ T3377] EXT4-fs (loop3): Invalid log cluster size: 116 05:35:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000004000)={{r0}, 0x0, 0x12, @unused=[0x9, 0x714c], @devid}) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}, {&(0x7f0000001440)=""/206, 0xce}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000002000)=""/4096, 0x1000}, {0x0}, {0x0}], 0x7}, 0xbed}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000003000)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:43 executing program 5 (fault-call:9 fault-nth:22): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000007a000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1522.834453][ T3377] loop3: detected capacity change from 0 to 512 [ 1522.839472][ T3377] EXT4-fs (loop3): Invalid log cluster size: 116 [ 1522.874350][ T3399] loop1: detected capacity change from 0 to 264192 05:35:43 executing program 2: unshare(0x20000) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) acct(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) unshare(0x100) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100), 0x0, 0x0, 0xaaaaaaaaaaaac57, &(0x7f0000000540), 0x0, 0x0) acct(&(0x7f00000000c0)='./file0\x00') 05:35:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000004000)={{r0}, 0x0, 0x12, @unused=[0x9, 0x714c], @devid}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1522.883657][ T3399] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f120000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000b00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000004020000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x20004080) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1522.933555][ T3412] loop4: detected capacity change from 0 to 184 [ 1522.944499][ T3413] loop3: detected capacity change from 0 to 512 [ 1522.950308][ T3413] EXT4-fs (loop3): Invalid log cluster size: 122 [ 1523.001995][ T3424] FAULT_INJECTION: forcing a failure. [ 1523.001995][ T3424] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1523.004878][ T3424] CPU: 1 PID: 3424 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1523.006537][ T3424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1523.008197][ T3424] Call Trace: [ 1523.008858][ T3424] dump_stack+0x137/0x19d [ 1523.009953][ T3424] should_fail+0x23c/0x250 [ 1523.010774][ T3424] __alloc_pages+0x102/0x320 [ 1523.011803][ T3424] alloc_pages_vma+0x391/0x660 [ 1523.012625][ T3424] ? ext4_page_mkwrite+0xf20/0xf20 [ 1523.013492][ T3424] handle_mm_fault+0xb9c/0x1a70 [ 1523.014587][ T3424] ? follow_page_mask+0x93f/0x1040 [ 1523.015598][ T3424] __get_user_pages+0x947/0xee0 [ 1523.016671][ T3424] get_user_pages_unlocked+0x135/0x5f0 [ 1523.017734][ T3424] __gup_longterm_unlocked+0x47/0x110 [ 1523.018892][ T3424] internal_get_user_pages_fast+0xfab/0x1130 [ 1523.020313][ T3424] get_user_pages_fast+0x5d/0x80 [ 1523.021165][ T3424] iov_iter_get_pages+0x1e9/0xcc0 [ 1523.022501][ T3424] ? kmem_cache_alloc+0x201/0x2f0 [ 1523.023523][ T3424] ? mempool_alloc_slab+0x16/0x20 [ 1523.024752][ T3424] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1523.025711][ T3424] ? kmem_cache_alloc+0x201/0x2f0 [ 1523.026845][ T3424] ? bio_alloc_bioset+0x27d/0x480 [ 1523.028101][ T3424] iomap_dio_bio_actor+0x673/0xb50 [ 1523.029345][ T3424] iomap_dio_actor+0x26e/0x3b0 [ 1523.030244][ T3424] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1523.031484][ T3424] iomap_apply+0x1e2/0x400 [ 1523.032390][ T3424] __iomap_dio_rw+0x5af/0xad0 [ 1523.033531][ T3424] ? __iomap_dio_rw+0xad0/0xad0 [ 1523.034575][ T3424] iomap_dio_rw+0x30/0x70 [ 1523.035423][ T3424] ext4_file_read_iter+0x21a/0x290 [ 1523.035481][ T3429] loop3: detected capacity change from 0 to 512 [ 1523.037482][ T3424] aio_read+0x1c1/0x280 [ 1523.038181][ T3424] ? kmem_cache_alloc+0x201/0x2f0 [ 1523.039002][ T3424] io_submit_one+0x7fb/0x1350 [ 1523.040221][ T3424] __se_sys_io_submit+0xf5/0x260 [ 1523.041213][ T3424] __x64_sys_io_submit+0x3f/0x50 [ 1523.042291][ T3424] do_syscall_64+0x4a/0x90 [ 1523.043321][ T3424] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1523.044363][ T3424] RIP: 0033:0x4665d9 [ 1523.044841][ T3429] EXT4-fs (loop3): Invalid log cluster size: 516 [ 1523.045240][ T3424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1523.045258][ T3424] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 05:35:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000a0000000a000300", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00\x00\x00\x00\x00'], 0x24}}, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1523.051961][ T3424] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1523.053715][ T3424] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1523.055499][ T3424] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1523.057346][ T3424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1523.058891][ T3424] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1523.062286][ T3423] loop1: detected capacity change from 0 to 264192 [ 1523.070973][ T3423] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1523.079853][ T3439] Process accounting resumed [ 1523.082386][ T3429] loop3: detected capacity change from 0 to 512 [ 1523.083892][ T3429] EXT4-fs (loop3): Invalid log cluster size: 516 [ 1523.086556][ T3443] loop4: detected capacity change from 0 to 184 05:35:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000030000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000c00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:43 executing program 5 (fault-call:9 fault-nth:23): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f130000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1523.219266][ T3463] loop4: detected capacity change from 0 to 184 [ 1523.225110][ T3464] loop1: detected capacity change from 0 to 264192 [ 1523.232868][ T3464] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1523.235951][ T3468] loop3: detected capacity change from 0 to 512 [ 1523.244531][ T3468] EXT4-fs (loop3): Invalid log cluster size: 768 [ 1523.287738][ T3468] loop3: detected capacity change from 0 to 512 [ 1523.293896][ T3468] EXT4-fs (loop3): Invalid log cluster size: 768 [ 1523.313810][ T3480] FAULT_INJECTION: forcing a failure. [ 1523.313810][ T3480] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1523.316415][ T3480] CPU: 1 PID: 3480 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1523.318455][ T3480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1523.320484][ T3480] Call Trace: [ 1523.321039][ T3480] dump_stack+0x137/0x19d [ 1523.322057][ T3480] should_fail+0x23c/0x250 [ 1523.323066][ T3480] __alloc_pages+0x102/0x320 [ 1523.324193][ T3480] alloc_pages_vma+0x391/0x660 [ 1523.325188][ T3480] ? ext4_page_mkwrite+0xf20/0xf20 [ 1523.326121][ T3480] handle_mm_fault+0xb9c/0x1a70 [ 1523.327194][ T3480] ? follow_page_mask+0x93f/0x1040 [ 1523.328451][ T3480] __get_user_pages+0x947/0xee0 [ 1523.329314][ T3480] get_user_pages_unlocked+0x135/0x5f0 [ 1523.330500][ T3480] __gup_longterm_unlocked+0x47/0x110 [ 1523.331515][ T3480] internal_get_user_pages_fast+0xfab/0x1130 [ 1523.332877][ T3480] get_user_pages_fast+0x5d/0x80 [ 1523.334026][ T3480] iov_iter_get_pages+0x1e9/0xcc0 [ 1523.334914][ T3480] ? kmem_cache_alloc+0x201/0x2f0 [ 1523.336241][ T3480] ? mempool_alloc_slab+0x16/0x20 [ 1523.337165][ T3480] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1523.338290][ T3480] ? kmem_cache_alloc+0x201/0x2f0 [ 1523.339474][ T3480] ? bio_alloc_bioset+0x27d/0x480 [ 1523.340427][ T3480] iomap_dio_bio_actor+0x673/0xb50 [ 1523.341772][ T3480] iomap_dio_actor+0x26e/0x3b0 [ 1523.342793][ T3480] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1523.344235][ T3480] iomap_apply+0x1e2/0x400 [ 1523.345171][ T3480] __iomap_dio_rw+0x5af/0xad0 [ 1523.346135][ T3480] ? __iomap_dio_rw+0xad0/0xad0 [ 1523.347287][ T3480] iomap_dio_rw+0x30/0x70 [ 1523.348110][ T3480] ext4_file_read_iter+0x21a/0x290 [ 1523.349125][ T3480] aio_read+0x1c1/0x280 [ 1523.350316][ T3480] ? kmem_cache_alloc+0x201/0x2f0 [ 1523.351457][ T3480] io_submit_one+0x7fb/0x1350 [ 1523.352696][ T3480] __se_sys_io_submit+0xf5/0x260 [ 1523.353620][ T3480] __x64_sys_io_submit+0x3f/0x50 [ 1523.354536][ T3480] do_syscall_64+0x4a/0x90 [ 1523.355389][ T3480] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1523.356500][ T3480] RIP: 0033:0x4665d9 [ 1523.357351][ T3480] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1523.361471][ T3480] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1523.363056][ T3480] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1523.364782][ T3480] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1523.366299][ T3480] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1523.367648][ T3480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1523.369070][ T3480] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1523.771596][ T3439] Process accounting resumed 05:35:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:44 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000d00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f140000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000002040000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:44 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x42, &(0x7f0000000240)='devpts\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x1f, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000300)="ddb1770611b3112aab44572726c801c5847946332fd4ab7535415dd01f8998d539b8ebbe5fb4e5970ad6d1d4f1a22a3548d5d3d1f04889fd2922927380f6a4aa8c0169c59e2dc2f7f91df4cb2521c5a2b813c51a57f456ffb9e9b0644faa33f5224a93df97aecfcc6f87e590a504f37d97183f7a4bbaf0657e14815f043aebbf27d7b17240cdbb704b798a0069de4d7afc8df48f5caa43aa1ece1b6fd3248c8dc24d1749760462e868cd8fa82fa5e0aa2b0f5b", 0xb3, 0x7}, {&(0x7f00000003c0), 0x0, 0x6}, {&(0x7f0000000400), 0x0, 0x200}, {&(0x7f0000000440)="bb37462c92495d0917b2479a3661d88d19fd2e67604ff179947efd1eece8d150df48fe29e32e5cf3c59710a30eeb645409f7e5d5bd84cb2147b66eccd9f41ea895fd8632e0", 0x45}], 0x200c00, &(0x7f0000000600)={[{@shortname_lower}, {@shortname_winnt}, {@iocharset={'iocharset', 0x3d, 'cp863'}}, {@shortname_mixed}, {@shortname_winnt}, {@iocharset={'iocharset', 0x3d, 'cp775'}}, {@iocharset={'iocharset', 0x3d, 'cp863'}}, {@rodir}], [{@fowner_eq}, {@fowner_gt={'fowner>', r1}}, {@seclabel}, {@context={'context', 0x3d, 'user_u'}}, {@dont_appraise}, {@context={'context', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, '+{@)'}}]}) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 05:35:44 executing program 5 (fault-call:9 fault-nth:24): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1523.878574][ T3490] Process accounting resumed 05:35:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:44 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000180)="bad75e693175ff4ccfc4", 0xfffffec5}, {&(0x7f0000000300)="76df8cfefa7ddac22dcfcf9e00c693a47524fbfa60133f4bf9500ca94f344e4dd28a9ec9014befb0ea01a514ea8c7c66e5e88e77a778affc2a2030f7fbfa96fe6c14a0c75aee26637a81e3bcb693e7513645eb550c7adad4103ebae473f42372227fa59722490bdd9f2774cffe4bd181ffffffffffffffc3788e745965108c770cc26d1936bcc660d3ccbf2feaeb4603347ab0", 0x93}], 0x2, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="220000001400256304000000000000040208031301000000080002", 0x1b) splice(r0, 0x0, r2, 0x0, 0x9cdb, 0x0) write$binfmt_misc(r1, &(0x7f00000003c0)={'syz0', "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"}, 0x1004) [ 1523.916114][ T3499] loop1: detected capacity change from 0 to 264192 [ 1523.922116][ T3499] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1523.928461][ T3498] loop4: detected capacity change from 0 to 184 05:35:44 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000f00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000006040000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1523.970413][ T3506] loop3: detected capacity change from 0 to 512 [ 1523.974830][ T3506] EXT4-fs (loop3): Invalid log cluster size: 1026 [ 1523.986938][ T3523] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1524.001063][ T3524] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1524.004122][ T3522] FAULT_INJECTION: forcing a failure. [ 1524.004122][ T3522] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1524.006495][ T3522] CPU: 1 PID: 3522 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1524.007951][ T3522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1524.009647][ T3522] Call Trace: [ 1524.010225][ T3522] dump_stack+0x137/0x19d [ 1524.011080][ T3522] should_fail+0x23c/0x250 [ 1524.011931][ T3522] __alloc_pages+0x102/0x320 [ 1524.012685][ T3522] alloc_pages_vma+0x391/0x660 [ 1524.013465][ T3522] ? ext4_page_mkwrite+0xf20/0xf20 [ 1524.014478][ T3522] handle_mm_fault+0xb9c/0x1a70 [ 1524.015378][ T3522] ? follow_page_mask+0x93f/0x1040 [ 1524.016254][ T3522] __get_user_pages+0x947/0xee0 [ 1524.017088][ T3522] get_user_pages_unlocked+0x135/0x5f0 [ 1524.018054][ T3522] __gup_longterm_unlocked+0x47/0x110 [ 1524.019041][ T3522] internal_get_user_pages_fast+0xfab/0x1130 05:35:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:44 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x810, &(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="b4f541b3ef85834ae79d00c9dd9e0721c0ba55a7d9338642cd4ca0099ee1e9707199", 0x22, 0x80, &(0x7f0000000080)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10) 05:35:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f150000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1524.020384][ T3522] get_user_pages_fast+0x5d/0x80 [ 1524.021697][ T3522] iov_iter_get_pages+0x1e9/0xcc0 [ 1524.022612][ T3522] ? kmem_cache_alloc+0x201/0x2f0 [ 1524.023510][ T3522] ? mempool_alloc_slab+0x16/0x20 [ 1524.024441][ T3522] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1524.025461][ T3522] ? kmem_cache_alloc+0x201/0x2f0 [ 1524.026566][ T3522] ? bio_alloc_bioset+0x27d/0x480 [ 1524.027658][ T3522] iomap_dio_bio_actor+0x673/0xb50 [ 1524.028469][ T3522] iomap_dio_actor+0x26e/0x3b0 [ 1524.029184][ T3522] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1524.030572][ T3522] iomap_apply+0x1e2/0x400 [ 1524.031553][ T3522] __iomap_dio_rw+0x5af/0xad0 [ 1524.032437][ T3522] ? __iomap_dio_rw+0xad0/0xad0 [ 1524.033423][ T3522] iomap_dio_rw+0x30/0x70 [ 1524.034154][ T3522] ext4_file_read_iter+0x21a/0x290 [ 1524.035443][ T3522] aio_read+0x1c1/0x280 [ 1524.036089][ T3522] ? kmem_cache_alloc+0x201/0x2f0 [ 1524.036956][ T3522] io_submit_one+0x7fb/0x1350 [ 1524.037808][ T3522] __se_sys_io_submit+0xf5/0x260 [ 1524.038747][ T3522] __x64_sys_io_submit+0x3f/0x50 [ 1524.039557][ T3522] do_syscall_64+0x4a/0x90 [ 1524.040268][ T3522] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1524.041312][ T3522] RIP: 0033:0x4665d9 [ 1524.041970][ T3522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1524.045116][ T3522] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1524.046382][ T3522] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1524.047645][ T3522] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1524.048957][ T3522] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1524.050222][ T3522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1524.051449][ T3522] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:44 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='[\xdbX\xae[\x1a\xa9\xfd\xfe\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\xd1c\x81\x9eG\xf9,\xe2\xc6a\x8b\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0fSe\x9c.\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x0) write$binfmt_elf32(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000031f800000000003800000000008f1c4f6290d39667"], 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000711000/0x1000)=nil, 0x1000, 0x180000b, 0x8010, r1, 0x5000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv2(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/241, 0xf1}], 0x1, 0x0, 0x0, 0x2) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) pidfd_send_signal(r2, 0x13, &(0x7f0000000580)={0x26, 0x0, 0x9}, 0x0) dup3(r2, r1, 0x0) getdents(r1, &(0x7f0000000280)=""/200, 0xc8) getdents(r1, &(0x7f0000000140)=""/172, 0xac) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r4, r3, 0x0) getdents(r3, &(0x7f0000000280)=""/200, 0xc8) preadv(r3, &(0x7f0000000380)=[{&(0x7f0000000200)=""/74, 0x4a}], 0x1, 0x7c1, 0x5) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x800) 05:35:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f160000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1524.075380][ T3532] loop1: detected capacity change from 0 to 264192 [ 1524.079354][ T3532] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1524.137473][ T3546] loop4: detected capacity change from 0 to 184 [ 1524.152439][ T3547] loop3: detected capacity change from 0 to 512 [ 1524.155513][ T3547] EXT4-fs (loop3): Invalid log cluster size: 1030 05:35:44 executing program 5 (fault-call:9 fault-nth:25): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:44 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:44 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8001100000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000010040000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:44 executing program 2: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x7fe}, 0x10) write(r0, &(0x7f0000000040)="1c0000b6ffa250c0b02b2da11be9d34e67d5fe001a009b8a14e5f407", 0x1c) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) 05:35:44 executing program 0: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2}, {0x3d}, {0x6, 0x0, 0x0, 0x7ffffff7}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 05:35:44 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8001800000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f170000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1524.241452][ T3561] loop1: detected capacity change from 0 to 264192 [ 1524.248666][ T3561] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1524.255265][ T3571] loop4: detected capacity change from 0 to 184 [ 1524.267892][ T3570] loop3: detected capacity change from 0 to 512 [ 1524.279171][ T3570] EXT4-fs (loop3): Invalid log cluster size: 1040 05:35:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)={[{@fat=@umask}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) [ 1524.323383][ T3584] FAULT_INJECTION: forcing a failure. [ 1524.323383][ T3584] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1524.326414][ T3584] CPU: 0 PID: 3584 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1524.327954][ T3584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1524.329605][ T3584] Call Trace: [ 1524.330223][ T3584] dump_stack+0x137/0x19d [ 1524.331104][ T3584] should_fail+0x23c/0x250 [ 1524.331964][ T3584] __alloc_pages+0x102/0x320 [ 1524.332769][ T3584] alloc_pages_vma+0x391/0x660 [ 1524.333499][ T3584] ? ext4_page_mkwrite+0xf20/0xf20 [ 1524.334290][ T3584] handle_mm_fault+0xb9c/0x1a70 [ 1524.335442][ T3584] ? follow_page_mask+0x93f/0x1040 [ 1524.336212][ T3584] __get_user_pages+0x947/0xee0 [ 1524.337109][ T3584] get_user_pages_unlocked+0x135/0x5f0 [ 1524.338038][ T3584] __gup_longterm_unlocked+0x47/0x110 [ 1524.338934][ T3584] internal_get_user_pages_fast+0xfab/0x1130 [ 1524.340106][ T3584] get_user_pages_fast+0x5d/0x80 [ 1524.340834][ T3584] iov_iter_get_pages+0x1e9/0xcc0 [ 1524.341671][ T3584] ? kmem_cache_alloc+0x201/0x2f0 [ 1524.342393][ T3584] ? mempool_alloc_slab+0x16/0x20 [ 1524.343241][ T3584] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1524.344105][ T3584] ? kmem_cache_alloc+0x201/0x2f0 [ 1524.345510][ T3584] ? bio_alloc_bioset+0x27d/0x480 [ 1524.346396][ T3584] iomap_dio_bio_actor+0x673/0xb50 [ 1524.347254][ T3584] iomap_dio_actor+0x26e/0x3b0 [ 1524.348017][ T3584] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1524.348949][ T3584] iomap_apply+0x1e2/0x400 [ 1524.349815][ T3584] __iomap_dio_rw+0x5af/0xad0 [ 1524.350532][ T3584] ? __iomap_dio_rw+0xad0/0xad0 [ 1524.351259][ T3584] iomap_dio_rw+0x30/0x70 [ 1524.351860][ T3584] ext4_file_read_iter+0x21a/0x290 [ 1524.352660][ T3584] aio_read+0x1c1/0x280 [ 1524.353298][ T3584] ? kmem_cache_alloc+0x201/0x2f0 [ 1524.354042][ T3584] io_submit_one+0x7fb/0x1350 [ 1524.354948][ T3584] __se_sys_io_submit+0xf5/0x260 [ 1524.355706][ T3584] __x64_sys_io_submit+0x3f/0x50 [ 1524.356489][ T3584] do_syscall_64+0x4a/0x90 [ 1524.357204][ T3584] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1524.358328][ T3584] RIP: 0033:0x4665d9 [ 1524.359029][ T3584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1524.362339][ T3584] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1524.363698][ T3584] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1524.364921][ T3584] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1524.366284][ T3584] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1524.367675][ T3584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1524.369153][ T3584] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:44 executing program 0: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r3, r2, 0x0) getdents(r2, &(0x7f0000000280)=""/200, 0xc8) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="e3eb5e2e95cb1b35a4feeabeb9c29a90caae40da8894d193b872beefd5dde47989d76c2bb57a5ce5e3428e811acfff3f8be14bbdc8a95992d5be07ed0a91e2b3c0ab058cf71bbae9fe2a1efd152d2eda5118e1409fd900d047d9da8857c48cd5d4e2d663fe4a49af4337fad13910e5", 0x6f}, {&(0x7f0000000400)="d2961595f73ba5242687011806c716f786b6a7d700109751d333c56f03a64e127fd58e7fe2ee78dfeb440e95e51be3ce4f5d67d31964e0bb9da02c52d590c9d4ebce64dc2442614f2b29a86577dcf695d2da7bf01e279745640b327e38db18727f26d3fd9b392b4ba05736dcf2cdf2886e28779a974da0e675b5d3b431ff10ff6fe8a15747e746c2f03bb0e8cbacf44c35185f7e9bb03abbd32350545e400ed0764c0a8d0433cdcd8265ea42627e4238d795f18bd8771d9cd81618274f0b378a01219875e01b9ed8c4f00615a4909dde5713c1dcb9c4bc83eb4ffcd49e1e3f4a8c3f82025bed35010e32be4d9a2e480ed163056a898a4b1543d8bf95afc770d8ed52e9e5dfbb6f5be20e1108b787b31e3d1ffa03e2e90c982fe5a94186c46e7e1a510dd6790dad34e7336291e8953401960302c09101fc5934865159b6fb92ddc1cd948cc28dabf89d659878e6e87ee0c8dfead23148a485bcec2af62372d5c02e12db725b840c2df5aa3128247c86e5d056d8dafa0c4acb4609f4763584f21f5d44f90062caa2e0c0576cff0daf91f1365d533e2afb32e6dc9092fa2eb65d44cc51881bda3679ce0659d49f9ab60f05fa629df273f5a521a70c0d8b186f3de0c6709a2271543d5ed7ad3b5da0be01f8547f3504168a0c820a331b8b128da8121aa35b4ae8acfafcbbe0436a44820a9d78210a9e3700ec1fbfc8f458dd65dc88e95af7d7fd42fd090519b5a30e389edc04a2cc46cac2fefdddfcdd11484268ffdb06c95496b8a714863a768bf4466f730a116cc8bf7837cb32fc61906c39ae164235dd0291d8dbd6e28c4ade2f8bde6941bf17dd3b06c4a6c9d6757d2b702c5177de74e10ed76dca0cbd0530be3a6a5b76d5eadb82f2d6df61ba1935cf728e06ba5ed5bac873eb3510549fda921953427cc518136442853f80eca9418fd6847cc09a3a77818b4b5e0f85f50ad7244c301e4742a643727bddd939d80d7ab3288f2bce5f382c9e414579dee900580af8ab083d0a316f113ab313aa626c5cb1bd70e1f6d67ceb5c4cfdbebb1be73706dade2a7a21f6fb2267ce200c34a2ab525280ea83af0fd205cd6f85aa0a56d6209db31ddbe5d04f1aded51f1d4004af46c29ffd9c18ad61699bc2eee41282a1e621bf129ce28318523c9363820f15aa3390fbb38d13c8b6f57946fdf049fbbfb4487f79479f668ddcee1fafa122faa59f63ccbb2aa5f799ab61a6b4dbdf2d05df8e6a7071e157ca1b709cb0b5ff8bf52cb884ac83ab63e82f27bd13c44c02ca04742509bd1e67bcc5cc20bc61ae55d625f615101152dba00f3b22a519648f290eb74c5baa6d6bc02511084b397c197cace57b42faba9d2a509f70880b61fc890198f8e503a85945766a874f6e541f854b2956f0023e6dfb11f2fa0b7faa6f1ceda3f3ce353401781d43298d50b5499e954aa62fb296fc2c75f06e27f4accf58ba584de2877622047726757b923522c613006423b7fd57258c78b6835b7be1c2b03f161f33a02e376eeca5f5096f24104af83c636ee7ca2f134ff873a6ed5397b4d1091dbe2b4bc9a214390ef14927609b3c31d9711f9da88ae5f33864453032447c686f887070ba98a83ea392ec28706dde6a703ac6770f722ff6d72641f3d165a0c295194c6bdc20fa59b97455b83b791bb65be6c0b040979bafac0740dee1b48f37d428ef8ee165b504f91b979000565f2e2ad08c7c432df01dc6506a3a53e6085b502dd63d90002f002ba240316f18075357bbbe71cd30ac7adbee48e738d88da61b0916a2af805173e7b4c13a46a06a638e08adb58dc47c52ae835a8c6eeac569ee7258d96ea852caa7000227828049841b42c0a2c146bda05364938e2dbebf08a22ee86d695f408c61e5c8d7928021210df6af8c8b836baa6111f1a72bea2822b78565e3ed97e27004a84998a6ea35bb8dcccdfe5097119ae418482047fe4f5a0cbe426eb7876005117969f477f5e47a048735d2d9565a9722b5148e0e912df10753bddfca4c059279e63ceb276261544fa9e202605566f84a0370146c84f895fefb4d4d8c2eb74b50ce01e67e45804a617a1f8939430c6ae0d9489c6f8fc1d09f0c275697b3caa0d3c5db60670b6bb5dffc91bf6cb7bd43c577a40b35e33d111176227a369a5069dc8a441e0c2eee9db86ee4b7b2eaa3f68c4c44eb48feecc50efc746ddb9eccc78c2b9cd73954650863a80f83290e19dad508fc8b281b792f87c39c05182ccd0d0ea88418d95615af0ae09be47e5b5a4b0c0b55e4c53574f05641f728aaceadf9fb165a8f3c769158d44d819158dd050965b078a152fe37184303efd275770c8d2c1a3b0e33476273110a1567fb303de3608c5a2ca5b60b04ada5b56c40c5fc50a192da25d807ce905fee1eedf21a447939663ad3a0f96b7e127bf4aba5758f74ea942bd0b0a9b6d1061e98f6d77122efaf95ff342afaadefd3d2eada21e282affccd01b80a4df9310a668437c9c6a9a1c714b9adc507ce01cf2c686ddf671177b81a2fe084509a99f7d1266312d249fd701d6826d29b65c2c5a7fcc61c68ef9c1124dc4541a82c17969a78b79bcbbb9318f765f0be41afb63539e5a083590f447c163a6ba42f6ed1ea46356936c5a7a9fc568fbcf167fd30b920834b64d0ce4200cd459c842f9903f804f785ec26205c7d55a3c97902df80ca2d27f03aaba8ac0967d8fa229c82525a04a5b118331860f2c0a868cdf35004a2fa777ec73bbc9ec92864ecacc6d719fa5d3140f0ac705d619239050f012a8516c4d20b84d48a492282fee1bed5b5f84bdf794542b60f738d32b473cf0003c290498c507d37773468198a76290f75b17709a4c3307c7aa465115b104a373e0085c7454f84ce59228803ffe00f265b1daab12ec9c345605c7b282e9c647de59994451eb292c91d9acb7203e66b53e6c73de531360928d3cf7659c04cd40278cc24bef10f6a656c8f58f457ccfc29f78fb2c6f85258419dd4bb21226f4fe2407f480cc06b03872e833341749ceadf04b59f9dd7363608c65a8e44b88e9a71f5a7ff6c71d323b9eeac871a2ddc1ddf0a4329dab051fe53857eb506f300159ccb0a16f70abedde541260976d882bfe2a35ae53ddef6d92286c8a91f0c292221b62e5af285db0e9da66b73bb21767ca159ffd397562ae989def0fa9a2451e0f5eef9fb3bb1efbd4f443c8ec841e8ba317315cda5b08880ba1bd7c1c2452f2d351322572c76e5892ccc1b374036341718c89eefa3b43769c8489388c3d79fda7ba56d999f5dd33f52ba4af0a6f9df461a4fecb72d3bf624b4b8cd30caa72ee11843ba9a27bf53188bd8d09c7712cb99ce348232a9f6bad6130733a311a11dd4ca2ac6bb1b34d8ba6ab855eeeb01a6c0e97b38516e70d33e4c849fa09c67473750a2ca5d9b63f49e25a4d87f6a8afa36c6898b4277230d9fdf4c06a3ed0beb1ecd96407d0f7a34ab0d970294ef72972f846eb5514b604183848e3d7c9932c9eabc135c7b688943c6a7648696eebb9159bb24af32527772022ff924c017859b785c21232cfa8790d69135e857d29547ed634849fda1ecca22d5b036fc37310edb0b36160f442478c43d58e50026aff2f6044e0d80896d6791f98a2dad70464635419ede63c1af390cf4126a1587a495758f74f14d12e5a08a4fc6487ca419c8df4adddf35447db92e9be921e6ba41d03d56cabac43febefcf92303ee2f8885c02d8ceba4a77f87a8930368f36a3f2b14430e8d578e9e4f71e1ac6347e1d886523a683107d6f21029c5be75011a482d29b1e18dfaf8fd16d1d72f51a3240b65efdae93ad4933878d720b6ea5fafbba0714155c49077661d37548e25323b65fc1797004b6c211b764c8b107c27ef1361da8ef72b2f9539ebf4b8d02f2cb4f7c55034e63241ba4269a2cf0dc813feef3a37b839f4afddd4b86e45b0febef4ad2aae4b86d5f40085fc9b063fcbaadd5baf0f17e661b53ee3bfe9a4a0602040d50d114ad32a90006647c053864fde9cfe7c2e88f417176b9ec98c2ebe40d053ad8848b6388702cff01a2f0ce8c5410bd8cd4fa535fab85e6ccfe734a73aae32ce96e06507921e73a24741c9bae677e192da074cb77bd5dffaf6243d1c3bf520d43cc2dea9d8174d5bd234ad865b6da77fdce8073933a3db96546b75529171ab8d264eaded8b3066ee2eaf8f5429292440b502c3231c5563fee5da1793f12b79c198ed13fdc18643b4e1c3d2e9ed03f255d20abf5a8552432e5f5b14d51a85ee5396d6e4ab9cf4e5d473de5f065825d5549b21c8cdaa59b3fb1c57a79f7806e4ad9127011c31d597811f6947b5ea4db61e2022f526ebfaaa149e34d3ea17853e09ea4ac05dae184dc3202a6fed19df1c09ea98d395c65fc777867abfe5c25156f6a601e09b26d6bfe4ac22af8d43cdf9a82c6e7d3ac861118c92478a005898b41cc68df30696fefa95f913bcc2f73d1931ee072545efaaa54a2b66ea6c95cd8c45f63e213aada7f0d38bc56553cd947f6a3b85ca1dbeb94597648731020e15bf440dc185e52c87fba7293e1a0760fd15c890fbab4999cf2f15eb17d2834248a1ba00e29fbec7b3d4fba778dd80975b5a94d5dbeba14550249326c3703621ceec78a81c62e0526c446358251989d624ce1b8d48c8629685e20ca65afda0b98c214b44761af3a24d923cd23d0e81ef17b2851ed27cd5acb93bb4b863f76cf825a3a225c73330831d16205129555011f6a89fd47931eb8d435239c7d8fa8f19dec6e15a1f8f05d78092212a55888809b130812e5e3be54b04ab7842f1e3ae4c387b245667e5532ed8e71e17988745bb35e4532bee6454cbd5d2ba7f9db42cf34802164328da5fe5f000fd0a7eed3a4b22bc08748f2238420946ba6fba83b6241131f7b2e1ce51207ea95fc6616ff65319fe8c93a307809d7af4cb8e6dd544b5a3bbbca8f6034d680d717667a4d2b90b33db8bb15daa1b94a7bedb1fd4950985b83f9767b475c3b892bc06d7c459cba3c94eb960bf4596942e02a8cecd77aafb81b1e45a3b3653a30d6410ac35af26d9edccd64e17992759064c8806f9d0ffad58d94b7232d04e6be06e1d888b4dd470ea7b85bce511c892d63b658b65fe6fd6005a3f76c924cee06317d60816ef52b4ef23521322ed296f9b7bae78c1e4f08eee5ed1a83f6a7dbae285bae19aa7ddebf2469b574b8ed14dd8ed8542eb829edaf93fdeadec3c127d09a8f2d4df8addfc0f41fcaf16be90bfad679777ba54bf8b9219620a552a490f01edf2ed0f47c7742dc95e56201c96b231fb4ba75071c88f1736c50a96a9ae7f9810eddf4b20dc81ced5a9c3de4be2e81d479ced421178769789d1b9d29847b3957b4a908538629df5226b1d31c2248cfe3a108e08d667e1531d4c8af6a4622e8fd52be6e8c4e8a8114a52e00584c022c2135f387eb8f17f8b97ddc8edc650eb2df1e400e48a685b07fdbf276dd4159e807394d0f8c16fa35d6323922fc57424e749938aa4efc494a41bd7784f2bcb44c26fce2105c798ded62a77d82e268f66f1c85deb8753c41841637db425051726e6a73e2ed8f7aff39fa47c628a8c11ee54093eae984ba49573991447dfd7b965cf3360dbcf6ea4acb2e0ac0c2e2c962141de91ecf0425e70cc2347b0464a655dba7a30e4c0ad840fef421fc64b734b6fa94012e42e962d0e637a52a37eeb65745242908b9378141483d528c29e3e31d2f90a420bda7c5c9b329ffe50dc0ada410a4fdaf5143b6c73dffcd54ceb82e2a3265df071edff3971dfefa0ef927731ed2", 0x1000}], 0x2) openat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x4b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = getpid() clone3(&(0x7f0000000380)={0x20004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000300)=[r4], 0x1}, 0x58) [ 1524.402167][ T3570] loop3: detected capacity change from 0 to 512 [ 1524.403902][ T3570] EXT4-fs (loop3): Invalid log cluster size: 1040 [ 1524.418031][ T3598] loop1: detected capacity change from 0 to 264192 [ 1524.422079][ T3598] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1524.431103][ T3600] loop4: detected capacity change from 0 to 184 05:35:45 executing program 5 (fault-call:9 fault-nth:26): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000050000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:45 executing program 0: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8001900000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000300000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x1000}, {0x0, 0x0, 0x4200}], 0x280800, &(0x7f0000000040)={[], [{@smackfsdef={'smackfsdef', 0x3d, ':+%!-&x^![%,+}'}}, {@uid_lt={'uid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, '{'}}]}) 05:35:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f180000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8002200000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:45 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000080), &(0x7f00000001c0)=0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000100)={'#! ', './file0', [{0x20, '/proc/self\x00'}, {0x20, '/proc/self\x00'}, {}, {}], 0xa, "1bf5edb5add36de1822d1d084faf025a8d1e8c27488cb6eecb1bf718fb324016ee2137f1b5db96e09245a204eda77883ef4e7fdf85a0193f3a631b20168dbf9cd3694647ed8acc369768f9c0616d12b1dcc8e1a41f20943684262b0c44afb37a598d729ea30ce38232dfc7ac7b7fee34a2561ca59664f13c31b0734443b9c0a67341800e0b"}, 0xaa) dup3(r3, r2, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x44) [ 1524.559872][ T3631] loop4: detected capacity change from 0 to 184 [ 1524.570226][ T3630] loop3: detected capacity change from 0 to 512 [ 1524.574469][ T3630] EXT4-fs (loop3): Invalid log cluster size: 1280 [ 1524.594839][ T3639] loop1: detected capacity change from 0 to 264192 [ 1524.602978][ T3639] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1524.628797][ T3630] loop3: detected capacity change from 0 to 512 [ 1524.636062][ T3630] EXT4-fs (loop3): Invalid log cluster size: 1280 [ 1524.648223][ T3653] FAULT_INJECTION: forcing a failure. [ 1524.648223][ T3653] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1524.650630][ T3653] CPU: 1 PID: 3653 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1524.651965][ T3653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1524.653738][ T3653] Call Trace: [ 1524.654222][ T3653] dump_stack+0x137/0x19d [ 1524.654897][ T3653] should_fail+0x23c/0x250 [ 1524.655763][ T3653] __alloc_pages+0x102/0x320 [ 1524.656609][ T3653] alloc_pages_vma+0x391/0x660 [ 1524.658060][ T3653] ? ext4_page_mkwrite+0xf20/0xf20 [ 1524.658932][ T3653] handle_mm_fault+0xb9c/0x1a70 [ 1524.659867][ T3653] ? follow_page_mask+0x93f/0x1040 [ 1524.660764][ T3653] __get_user_pages+0x947/0xee0 [ 1524.661647][ T3653] get_user_pages_unlocked+0x135/0x5f0 [ 1524.662529][ T3653] __gup_longterm_unlocked+0x47/0x110 [ 1524.663384][ T3653] internal_get_user_pages_fast+0xfab/0x1130 [ 1524.664500][ T3653] get_user_pages_fast+0x5d/0x80 [ 1524.665488][ T3653] iov_iter_get_pages+0x1e9/0xcc0 [ 1524.666232][ T3653] ? kmem_cache_alloc+0x201/0x2f0 [ 1524.667223][ T3653] ? mempool_alloc_slab+0x16/0x20 [ 1524.667998][ T3653] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1524.668864][ T3653] ? kmem_cache_alloc+0x201/0x2f0 [ 1524.669691][ T3653] ? bio_alloc_bioset+0x27d/0x480 [ 1524.670630][ T3653] iomap_dio_bio_actor+0x673/0xb50 [ 1524.671495][ T3653] iomap_dio_actor+0x26e/0x3b0 [ 1524.672353][ T3653] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1524.673369][ T3653] iomap_apply+0x1e2/0x400 [ 1524.674164][ T3653] __iomap_dio_rw+0x5af/0xad0 [ 1524.675002][ T3653] ? __iomap_dio_rw+0xad0/0xad0 [ 1524.675724][ T3653] iomap_dio_rw+0x30/0x70 [ 1524.676394][ T3653] ext4_file_read_iter+0x21a/0x290 [ 1524.677144][ T3653] aio_read+0x1c1/0x280 [ 1524.677906][ T3653] ? kmem_cache_alloc+0x201/0x2f0 05:35:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000060000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:45 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f190000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1524.678904][ T3653] io_submit_one+0x7fb/0x1350 [ 1524.679728][ T3653] __se_sys_io_submit+0xf5/0x260 [ 1524.680654][ T3653] __x64_sys_io_submit+0x3f/0x50 [ 1524.681664][ T3653] do_syscall_64+0x4a/0x90 [ 1524.682520][ T3653] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1524.683457][ T3653] RIP: 0033:0x4665d9 [ 1524.684085][ T3653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1524.687747][ T3653] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1524.689608][ T3653] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1524.691484][ T3653] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1524.692695][ T3653] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1524.694039][ T3653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1524.695846][ T3653] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1524.706125][ T3656] loop4: detected capacity change from 0 to 184 [ 1524.742106][ T3669] loop3: detected capacity change from 0 to 512 [ 1524.756324][ T3669] EXT4-fs (loop3): Invalid log cluster size: 1536 [ 1524.758339][ T3667] loop1: detected capacity change from 0 to 264192 [ 1524.763466][ T3667] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1524.801217][ T3669] loop3: detected capacity change from 0 to 512 [ 1524.803273][ T3669] EXT4-fs (loop3): Invalid log cluster size: 1536 05:35:45 executing program 5 (fault-call:9 fault-nth:27): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:45 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x5, 0x0, 0x0, 0x7ffffdbd}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr={0xad, 0x1}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 05:35:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8008900000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:45 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f1a0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000004060000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:45 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) 05:35:45 executing program 2: setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240)=@md5={0x1, "275ea884af67735f1f9f4f06238a38b9"}, 0x11, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000300), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x134, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x108, 0xc, 0x0, 0x1, [{0x38, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x1c}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}]}, 0x134}}, 0x0) [ 1524.882820][ T3694] loop3: detected capacity change from 0 to 512 [ 1524.887043][ T3694] EXT4-fs (loop3): Invalid log cluster size: 1540 [ 1524.891410][ T3693] loop1: detected capacity change from 0 to 264192 [ 1524.895356][ T3693] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1524.902550][ T3695] loop4: detected capacity change from 0 to 184 05:35:45 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) 05:35:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800fe00000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f1b0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1524.953637][ T3694] loop3: detected capacity change from 0 to 512 [ 1524.960069][ T3694] EXT4-fs (loop3): Invalid log cluster size: 1540 [ 1524.976292][ T3721] FAULT_INJECTION: forcing a failure. [ 1524.976292][ T3721] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1524.978745][ T3721] CPU: 1 PID: 3721 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1524.982093][ T3721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1524.985500][ T3721] Call Trace: [ 1524.986148][ T3721] dump_stack+0x137/0x19d [ 1524.987136][ T3721] should_fail+0x23c/0x250 [ 1524.987973][ T3721] __alloc_pages+0x102/0x320 [ 1524.988882][ T3721] alloc_pages_vma+0x391/0x660 [ 1524.989853][ T3721] ? ext4_page_mkwrite+0xf20/0xf20 [ 1524.990770][ T3721] handle_mm_fault+0xb9c/0x1a70 [ 1524.991611][ T3721] ? follow_page_mask+0x93f/0x1040 [ 1524.992527][ T3721] __get_user_pages+0x947/0xee0 [ 1524.993347][ T3721] get_user_pages_unlocked+0x135/0x5f0 [ 1524.994307][ T3721] __gup_longterm_unlocked+0x47/0x110 [ 1524.995366][ T3721] internal_get_user_pages_fast+0xfab/0x1130 [ 1524.996696][ T3721] get_user_pages_fast+0x5d/0x80 [ 1524.997600][ T3721] iov_iter_get_pages+0x1e9/0xcc0 [ 1524.998627][ T3721] ? kmem_cache_alloc+0x201/0x2f0 [ 1524.999567][ T3721] ? mempool_alloc_slab+0x16/0x20 [ 1525.000580][ T3721] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1525.001693][ T3721] ? kmem_cache_alloc+0x201/0x2f0 [ 1525.002512][ T3721] ? bio_alloc_bioset+0x27d/0x480 05:35:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f000010f000/0x1000)=nil, 0x1000, 0x800006, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000003) [ 1525.003437][ T3721] iomap_dio_bio_actor+0x673/0xb50 [ 1525.004366][ T3721] iomap_dio_actor+0x26e/0x3b0 [ 1525.005223][ T3721] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1525.006308][ T3721] iomap_apply+0x1e2/0x400 [ 1525.006961][ T3721] __iomap_dio_rw+0x5af/0xad0 [ 1525.007695][ T3721] ? __iomap_dio_rw+0xad0/0xad0 [ 1525.008440][ T3721] iomap_dio_rw+0x30/0x70 [ 1525.009390][ T3721] ext4_file_read_iter+0x21a/0x290 [ 1525.010349][ T3721] aio_read+0x1c1/0x280 [ 1525.011058][ T3721] ? kmem_cache_alloc+0x201/0x2f0 [ 1525.011914][ T3721] io_submit_one+0x7fb/0x1350 [ 1525.012761][ T3721] __se_sys_io_submit+0xf5/0x260 [ 1525.013561][ T3721] __x64_sys_io_submit+0x3f/0x50 [ 1525.014314][ T3721] do_syscall_64+0x4a/0x90 [ 1525.014968][ T3721] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1525.016168][ T3721] RIP: 0033:0x4665d9 [ 1525.016852][ T3721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1525.020706][ T3721] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1525.022123][ T3721] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1525.023721][ T3721] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1525.025159][ T3721] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1525.026722][ T3721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1525.028141][ T3721] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1525.058095][ T3731] loop1: detected capacity change from 0 to 264192 [ 1525.062650][ T3731] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1525.078780][ T3733] loop4: detected capacity change from 0 to 184 05:35:45 executing program 5 (fault-call:9 fault-nth:28): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:45 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) 05:35:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000070000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f1c0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8001401000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000034070000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:45 executing program 0 (fault-call:0 fault-nth:0): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1525.198693][ T3748] loop3: detected capacity change from 0 to 512 [ 1525.205444][ T3748] EXT4-fs (loop3): Invalid log cluster size: 1792 [ 1525.221099][ T3748] loop3: detected capacity change from 0 to 512 [ 1525.224125][ T3748] EXT4-fs (loop3): Invalid log cluster size: 1792 [ 1525.232757][ T3761] loop1: detected capacity change from 0 to 264192 [ 1525.236933][ T3757] loop4: detected capacity change from 0 to 184 [ 1525.277747][ T3768] FAULT_INJECTION: forcing a failure. [ 1525.277747][ T3768] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1525.280502][ T3768] CPU: 1 PID: 3768 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1525.280661][ T3761] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1525.282007][ T3768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1525.282018][ T3768] Call Trace: [ 1525.282042][ T3768] dump_stack+0x137/0x19d [ 1525.287329][ T3768] should_fail+0x23c/0x250 [ 1525.288099][ T3768] __alloc_pages+0x102/0x320 [ 1525.288901][ T3768] alloc_pages_vma+0x391/0x660 [ 1525.289793][ T3768] ? ext4_page_mkwrite+0xf20/0xf20 [ 1525.290653][ T3768] handle_mm_fault+0xb9c/0x1a70 [ 1525.291468][ T3768] ? follow_page_mask+0x93f/0x1040 [ 1525.292569][ T3768] __get_user_pages+0x947/0xee0 [ 1525.293929][ T3768] get_user_pages_unlocked+0x135/0x5f0 [ 1525.295068][ T3768] __gup_longterm_unlocked+0x47/0x110 [ 1525.296114][ T3768] internal_get_user_pages_fast+0xfab/0x1130 [ 1525.297345][ T3768] get_user_pages_fast+0x5d/0x80 [ 1525.298145][ T3768] iov_iter_get_pages+0x1e9/0xcc0 [ 1525.299187][ T3768] ? kmem_cache_alloc+0x201/0x2f0 [ 1525.300315][ T3768] ? mempool_alloc_slab+0x16/0x20 [ 1525.301192][ T3768] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1525.301989][ T3768] ? kmem_cache_alloc+0x201/0x2f0 [ 1525.302970][ T3768] ? bio_alloc_bioset+0x27d/0x480 [ 1525.303836][ T3768] iomap_dio_bio_actor+0x673/0xb50 [ 1525.304928][ T3768] iomap_dio_actor+0x26e/0x3b0 [ 1525.305725][ T3768] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1525.306597][ T3768] iomap_apply+0x1e2/0x400 [ 1525.307512][ T3768] __iomap_dio_rw+0x5af/0xad0 [ 1525.308252][ T3768] ? __iomap_dio_rw+0xad0/0xad0 [ 1525.309117][ T3768] iomap_dio_rw+0x30/0x70 [ 1525.309926][ T3768] ext4_file_read_iter+0x21a/0x290 [ 1525.310902][ T3768] aio_read+0x1c1/0x280 [ 1525.311617][ T3768] ? kmem_cache_alloc+0x201/0x2f0 [ 1525.312600][ T3768] io_submit_one+0x7fb/0x1350 [ 1525.313314][ T3768] __se_sys_io_submit+0xf5/0x260 [ 1525.314204][ T3768] __x64_sys_io_submit+0x3f/0x50 [ 1525.314936][ T3768] do_syscall_64+0x4a/0x90 [ 1525.315705][ T3768] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1525.316933][ T3768] RIP: 0033:0x4665d9 [ 1525.318129][ T3768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1525.322312][ T3768] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1525.324656][ T3768] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1525.326302][ T3768] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 05:35:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000402000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1525.327546][ T3768] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1525.328999][ T3768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1525.330293][ T3768] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f1d0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1525.373685][ T3776] FAULT_INJECTION: forcing a failure. [ 1525.373685][ T3776] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1525.375977][ T3776] CPU: 1 PID: 3776 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 1525.378204][ T3776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1525.380811][ T3776] Call Trace: [ 1525.381570][ T3776] dump_stack+0x137/0x19d [ 1525.382704][ T3776] should_fail+0x23c/0x250 [ 1525.383575][ T3776] should_fail_usercopy+0x16/0x20 [ 1525.384692][ T3776] strncpy_from_user+0x21/0x250 [ 1525.385786][ T3776] __se_sys_request_key+0x46/0x280 [ 1525.386828][ T3776] ? fput+0x2d/0x130 [ 1525.387996][ T3776] ? ksys_write+0x157/0x180 [ 1525.389051][ T3776] __x64_sys_request_key+0x51/0x60 [ 1525.390006][ T3776] do_syscall_64+0x4a/0x90 [ 1525.391075][ T3776] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1525.392020][ T3776] RIP: 0033:0x4665d9 [ 1525.393005][ T3776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1525.397417][ T3776] RSP: 002b:00007f7a3035d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1525.398809][ T3776] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1525.400700][ T3776] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 1525.402480][ T3776] RBP: 00007f7a3035d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1525.403895][ T3776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1525.405255][ T3776] R13: 00007fff3c5b460f R14: 00007f7a3035d300 R15: 0000000000022000 [ 1525.413379][ T3775] loop3: detected capacity change from 0 to 512 [ 1525.417458][ T3775] EXT4-fs (loop3): Invalid log cluster size: 1844 05:35:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000090000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:45 executing program 0 (fault-call:0 fault-nth:1): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1525.425035][ T3780] loop4: detected capacity change from 0 to 184 [ 1525.461729][ T3786] loop1: detected capacity change from 0 to 264192 [ 1525.495219][ T3794] FAULT_INJECTION: forcing a failure. [ 1525.495219][ T3794] name failslab, interval 1, probability 0, space 0, times 0 [ 1525.498003][ T3794] CPU: 1 PID: 3794 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 1525.499831][ T3794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1525.501960][ T3794] Call Trace: [ 1525.502558][ T3794] dump_stack+0x137/0x19d [ 1525.503385][ T3794] should_fail+0x23c/0x250 [ 1525.504191][ T3794] ? __se_sys_request_key+0xd0/0x280 [ 1525.505352][ T3794] __should_failslab+0x81/0x90 [ 1525.506095][ T3794] should_failslab+0x5/0x20 [ 1525.506997][ T3794] __kmalloc_track_caller+0x64/0x340 [ 1525.508086][ T3794] ? strnlen_user+0x137/0x1c0 [ 1525.509085][ T3794] strndup_user+0x73/0x120 [ 1525.510111][ T3794] __se_sys_request_key+0xd0/0x280 [ 1525.511201][ T3794] ? fput+0x2d/0x130 [ 1525.512531][ T3794] __x64_sys_request_key+0x51/0x60 [ 1525.512611][ T3796] loop3: detected capacity change from 0 to 512 [ 1525.514021][ T3794] do_syscall_64+0x4a/0x90 [ 1525.515923][ T3794] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1525.517087][ T3794] RIP: 0033:0x4665d9 [ 1525.517996][ T3794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1525.523033][ T3794] RSP: 002b:00007f7a3035d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1525.525011][ T3794] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1525.526963][ T3794] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 1525.529048][ T3794] RBP: 00007f7a3035d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1525.531797][ T3794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1525.533161][ T3794] R13: 00007fff3c5b460f R14: 00007f7a3035d300 R15: 0000000000022000 [ 1525.538633][ T3786] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1525.539055][ T3796] EXT4-fs (loop3): Invalid log cluster size: 2304 [ 1525.582884][ T3796] loop3: detected capacity change from 0 to 512 [ 1525.585385][ T3796] EXT4-fs (loop3): Invalid log cluster size: 2304 05:35:46 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001a40)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r3, r2, 0x0) getdents(r2, &(0x7f0000000280)=""/200, 0xc8) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000580)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) 05:35:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f1e0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:46 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800ea02000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:46 executing program 0 (fault-call:0 fault-nth:2): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000000a0000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:46 executing program 5 (fault-call:9 fault-nth:29): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1525.971934][ T3816] loop3: detected capacity change from 0 to 512 [ 1525.976800][ T3816] EXT4-fs (loop3): Invalid log cluster size: 2560 [ 1525.987558][ T3824] FAULT_INJECTION: forcing a failure. [ 1525.987558][ T3824] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1525.990964][ T3824] CPU: 1 PID: 3824 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 1525.992503][ T3824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1525.994467][ T3824] Call Trace: [ 1525.995188][ T3824] dump_stack+0x137/0x19d [ 1525.995871][ T3824] should_fail+0x23c/0x250 [ 1525.996806][ T3824] should_fail_usercopy+0x16/0x20 [ 1525.997604][ T3824] _copy_from_user+0x1c/0xd0 [ 1525.998444][ T3824] strndup_user+0xb0/0x120 [ 1525.999226][ T3824] __se_sys_request_key+0xd0/0x280 [ 1526.000274][ T3824] ? fput+0x2d/0x130 [ 1526.001011][ T3824] __x64_sys_request_key+0x51/0x60 [ 1526.002378][ T3824] do_syscall_64+0x4a/0x90 [ 1526.003048][ T3824] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1526.004035][ T3824] RIP: 0033:0x4665d9 [ 1526.005002][ T3824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1526.008415][ T3824] RSP: 002b:00007f7a3035d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1526.009926][ T3824] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1526.011489][ T3824] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 1526.013265][ T3824] RBP: 00007f7a3035d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1526.014730][ T3824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1526.016326][ T3824] R13: 00007fff3c5b460f R14: 00007f7a3035d300 R15: 0000000000022000 05:35:46 executing program 0 (fault-call:0 fault-nth:3): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:46 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800fb02000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1526.025539][ T3821] loop4: detected capacity change from 0 to 184 [ 1526.030551][ T3817] loop1: detected capacity change from 0 to 264192 [ 1526.034463][ T3816] loop3: detected capacity change from 0 to 512 [ 1526.040731][ T3816] EXT4-fs (loop3): Invalid log cluster size: 2560 [ 1526.043965][ T3817] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1526.062098][ T3836] FAULT_INJECTION: forcing a failure. [ 1526.062098][ T3836] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1526.065867][ T3836] CPU: 0 PID: 3836 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1526.069723][ T3836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.071743][ T3836] Call Trace: [ 1526.072435][ T3836] dump_stack+0x137/0x19d [ 1526.073503][ T3836] should_fail+0x23c/0x250 [ 1526.074579][ T3836] __alloc_pages+0x102/0x320 05:35:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000000b0000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x8100, 0xa2) [ 1526.075541][ T3836] alloc_pages_vma+0x391/0x660 [ 1526.076471][ T3836] ? ext4_page_mkwrite+0xf20/0xf20 [ 1526.077664][ T3836] handle_mm_fault+0xb9c/0x1a70 [ 1526.078756][ T3836] ? follow_page_mask+0x93f/0x1040 [ 1526.078769][ T3839] FAULT_INJECTION: forcing a failure. [ 1526.078769][ T3839] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.079740][ T3836] __get_user_pages+0x947/0xee0 [ 1526.082732][ T3836] get_user_pages_unlocked+0x135/0x5f0 [ 1526.083699][ T3836] __gup_longterm_unlocked+0x47/0x110 [ 1526.084619][ T3836] internal_get_user_pages_fast+0xfab/0x1130 [ 1526.085551][ T3836] get_user_pages_fast+0x5d/0x80 [ 1526.086465][ T3836] iov_iter_get_pages+0x1e9/0xcc0 [ 1526.087283][ T3836] ? kmem_cache_alloc+0x201/0x2f0 [ 1526.088123][ T3836] ? mempool_alloc_slab+0x16/0x20 [ 1526.088931][ T3836] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1526.089735][ T3836] ? kmem_cache_alloc+0x201/0x2f0 [ 1526.090846][ T3836] ? bio_alloc_bioset+0x27d/0x480 [ 1526.091962][ T3836] iomap_dio_bio_actor+0x673/0xb50 [ 1526.092871][ T3836] iomap_dio_actor+0x26e/0x3b0 [ 1526.093748][ T3836] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1526.095042][ T3836] iomap_apply+0x1e2/0x400 [ 1526.095862][ T3836] __iomap_dio_rw+0x5af/0xad0 [ 1526.096684][ T3836] ? __iomap_dio_rw+0xad0/0xad0 [ 1526.097624][ T3836] iomap_dio_rw+0x30/0x70 [ 1526.098268][ T3836] ext4_file_read_iter+0x21a/0x290 [ 1526.099079][ T3836] aio_read+0x1c1/0x280 [ 1526.099802][ T3836] ? kmem_cache_alloc+0x201/0x2f0 [ 1526.100702][ T3836] io_submit_one+0x7fb/0x1350 [ 1526.101412][ T3836] __se_sys_io_submit+0xf5/0x260 [ 1526.102191][ T3836] __x64_sys_io_submit+0x3f/0x50 [ 1526.103229][ T3836] do_syscall_64+0x4a/0x90 [ 1526.104024][ T3836] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1526.105058][ T3836] RIP: 0033:0x4665d9 [ 1526.105655][ T3836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1526.108987][ T3836] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1526.110494][ T3836] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1526.112026][ T3836] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1526.113576][ T3836] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1526.114917][ T3836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1526.116819][ T3836] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1526.118476][ T3839] CPU: 1 PID: 3839 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 1526.120024][ T3839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.121975][ T3839] Call Trace: [ 1526.122643][ T3839] dump_stack+0x137/0x19d [ 1526.123613][ T3839] should_fail+0x23c/0x250 05:35:46 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = syz_io_uring_setup(0x2de5, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x200}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000100)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, r0, 0x0, 0x0, 0x0, 0x39d72594ae289dbd, 0x1, {0x0, r4}}, 0x1) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080)=0xa6ef, 0x2) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, r5}}, 0x0) io_uring_enter(r1, 0x302, 0x0, 0x0, 0x0, 0x0) 05:35:46 executing program 0 (fault-call:0 fault-nth:4): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1526.125766][ T3839] ? __se_sys_request_key+0x104/0x280 [ 1526.127078][ T3839] __should_failslab+0x81/0x90 [ 1526.127998][ T3839] should_failslab+0x5/0x20 [ 1526.128971][ T3839] __kmalloc_track_caller+0x64/0x340 [ 1526.129860][ T3839] ? strnlen_user+0x137/0x1c0 [ 1526.130580][ T3839] strndup_user+0x73/0x120 [ 1526.131638][ T3839] __se_sys_request_key+0x104/0x280 [ 1526.132868][ T3839] ? fput+0x2d/0x130 [ 1526.133508][ T3839] __x64_sys_request_key+0x51/0x60 [ 1526.134480][ T3839] do_syscall_64+0x4a/0x90 [ 1526.135560][ T3839] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1526.136577][ T3839] RIP: 0033:0x4665d9 [ 1526.137220][ T3839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1526.140277][ T3839] RSP: 002b:00007f7a3035d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1526.141634][ T3839] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1526.143010][ T3839] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 1526.144135][ T3839] RBP: 00007f7a3035d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1526.145407][ T3839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1526.146985][ T3839] R13: 00007fff3c5b460f R14: 00007f7a3035d300 R15: 0000000000022000 05:35:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f210000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1526.207092][ T3855] FAULT_INJECTION: forcing a failure. [ 1526.207092][ T3855] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1526.209734][ T3855] CPU: 0 PID: 3855 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 1526.211442][ T3855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.213144][ T3855] Call Trace: [ 1526.213721][ T3855] dump_stack+0x137/0x19d [ 1526.214486][ T3855] should_fail+0x23c/0x250 [ 1526.215229][ T3855] should_fail_usercopy+0x16/0x20 [ 1526.216103][ T3855] _copy_from_user+0x1c/0xd0 [ 1526.216967][ T3855] strndup_user+0xb0/0x120 [ 1526.217856][ T3855] __se_sys_request_key+0x104/0x280 [ 1526.218701][ T3855] ? fput+0x2d/0x130 [ 1526.219376][ T3855] __x64_sys_request_key+0x51/0x60 [ 1526.220245][ T3855] do_syscall_64+0x4a/0x90 [ 1526.220994][ T3855] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1526.222043][ T3855] RIP: 0033:0x4665d9 [ 1526.222860][ T3855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1526.226302][ T3855] RSP: 002b:00007f7a3035d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1526.228058][ T3855] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1526.229537][ T3855] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 1526.230923][ T3855] RBP: 00007f7a3035d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1526.232238][ T3855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1526.233477][ T3855] R13: 00007fff3c5b460f R14: 00007f7a3035d300 R15: 0000000000022000 [ 1526.245725][ T3854] loop3: detected capacity change from 0 to 512 [ 1526.250983][ T3856] loop4: detected capacity change from 0 to 184 05:35:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x7, 0x9, 0x0, 0x9}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x208000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @dev}}, 0x0, 0x0, 0x24, 0x0, "12476376be060067e0377d6c3fa955825a423c0db20733230d8500000000ca6d00000000000000272f00264022118624203d00"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000040)=0x5, 0x4) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0xfffffffe, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) shutdown(r3, 0x0) write(r2, &(0x7f0000000240)="fc", 0xe10) write$9p(r0, &(0x7f0000001400)="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", 0x233) 05:35:46 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000003000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000000c0000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:46 executing program 0 (fault-call:0 fault-nth:5): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:46 executing program 5 (fault-call:9 fault-nth:30): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1526.264620][ T3854] EXT4-fs (loop3): Invalid log cluster size: 2816 [ 1526.271604][ T3869] loop1: detected capacity change from 0 to 264192 [ 1526.283228][ T3869] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f220000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1526.350297][ T3888] FAULT_INJECTION: forcing a failure. [ 1526.350297][ T3888] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.352547][ T3888] CPU: 0 PID: 3888 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 1526.353932][ T3888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.355825][ T3888] Call Trace: [ 1526.356367][ T3888] dump_stack+0x137/0x19d [ 1526.357110][ T3888] should_fail+0x23c/0x250 [ 1526.357875][ T3888] ? asymmetric_key_hex_to_key_id+0x59/0xd0 [ 1526.358842][ T3888] __should_failslab+0x81/0x90 [ 1526.359591][ T3888] should_failslab+0x5/0x20 [ 1526.360402][ T3888] __kmalloc+0x66/0x340 [ 1526.361157][ T3888] ? asymmetric_key_cmp+0x150/0x150 [ 1526.362247][ T3888] asymmetric_key_hex_to_key_id+0x59/0xd0 [ 1526.363174][ T3888] asymmetric_key_match_preparse+0x117/0x190 [ 1526.364590][ T3888] request_key_and_link+0x113/0xca0 [ 1526.365389][ T3888] ? restrict_link_reject+0x10/0x10 [ 1526.366463][ T3888] ? strcmp+0x23/0x50 [ 1526.367105][ T3888] __se_sys_request_key+0x1c4/0x280 [ 1526.367980][ T3888] ? fput+0x2d/0x130 [ 1526.368827][ T3888] __x64_sys_request_key+0x51/0x60 [ 1526.369758][ T3888] do_syscall_64+0x4a/0x90 [ 1526.370562][ T3888] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1526.371707][ T3888] RIP: 0033:0x4665d9 [ 1526.372373][ T3888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1526.375412][ T3888] RSP: 002b:00007f7a3035d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1526.376853][ T3888] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1526.377233][ T3887] loop3: detected capacity change from 0 to 512 [ 1526.378125][ T3888] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 1526.378139][ T3888] RBP: 00007f7a3035d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1526.381873][ T3892] loop4: detected capacity change from 0 to 184 [ 1526.382368][ T3888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1526.382380][ T3888] R13: 00007fff3c5b460f R14: 00007f7a3035d300 R15: 0000000000022000 [ 1526.390572][ T3887] EXT4-fs (loop3): Invalid log cluster size: 3072 05:35:46 executing program 0 (fault-call:0 fault-nth:6): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:46 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8007603000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1526.406058][ T3900] loop1: detected capacity change from 0 to 264192 [ 1526.414258][ T3900] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1526.438200][ T3903] FAULT_INJECTION: forcing a failure. [ 1526.438200][ T3903] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1526.440454][ T3903] CPU: 0 PID: 3903 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1526.441885][ T3903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.443607][ T3903] Call Trace: [ 1526.444257][ T3903] dump_stack+0x137/0x19d [ 1526.445080][ T3903] should_fail+0x23c/0x250 [ 1526.445886][ T3903] __alloc_pages+0x102/0x320 [ 1526.446112][ T3910] FAULT_INJECTION: forcing a failure. [ 1526.446112][ T3910] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1526.446638][ T3903] alloc_pages_vma+0x391/0x660 [ 1526.446658][ T3903] ? ext4_page_mkwrite+0xf20/0xf20 [ 1526.446673][ T3903] handle_mm_fault+0xb9c/0x1a70 [ 1526.450844][ T3903] ? follow_page_mask+0x93f/0x1040 [ 1526.451627][ T3903] __get_user_pages+0x947/0xee0 [ 1526.452567][ T3903] get_user_pages_unlocked+0x135/0x5f0 [ 1526.453581][ T3903] __gup_longterm_unlocked+0x47/0x110 [ 1526.454626][ T3903] internal_get_user_pages_fast+0xfab/0x1130 05:35:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f230000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1526.455522][ T3903] get_user_pages_fast+0x5d/0x80 [ 1526.456518][ T3903] iov_iter_get_pages+0x1e9/0xcc0 [ 1526.457553][ T3903] ? kmem_cache_alloc+0x201/0x2f0 [ 1526.458453][ T3903] ? mempool_alloc_slab+0x16/0x20 [ 1526.459224][ T3903] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1526.460053][ T3903] ? kmem_cache_alloc+0x201/0x2f0 [ 1526.460815][ T3903] ? bio_alloc_bioset+0x27d/0x480 [ 1526.461647][ T3903] iomap_dio_bio_actor+0x673/0xb50 [ 1526.462611][ T3903] iomap_dio_actor+0x26e/0x3b0 [ 1526.463444][ T3903] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1526.464698][ T3903] iomap_apply+0x1e2/0x400 [ 1526.465613][ T3903] __iomap_dio_rw+0x5af/0xad0 [ 1526.466581][ T3903] ? __iomap_dio_rw+0xad0/0xad0 [ 1526.467268][ T3903] iomap_dio_rw+0x30/0x70 [ 1526.467887][ T3903] ext4_file_read_iter+0x21a/0x290 [ 1526.468788][ T3903] aio_read+0x1c1/0x280 [ 1526.469480][ T3903] ? kmem_cache_alloc+0x201/0x2f0 [ 1526.470291][ T3903] io_submit_one+0x7fb/0x1350 [ 1526.471193][ T3903] __se_sys_io_submit+0xf5/0x260 [ 1526.472151][ T3903] __x64_sys_io_submit+0x3f/0x50 [ 1526.473191][ T3903] do_syscall_64+0x4a/0x90 [ 1526.473946][ T3903] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1526.475123][ T3903] RIP: 0033:0x4665d9 [ 1526.475759][ T3903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1526.478914][ T3903] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1526.480275][ T3903] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1526.481701][ T3903] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1526.482828][ T3903] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1526.484215][ T3903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1526.485572][ T3903] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1526.487018][ T3910] CPU: 1 PID: 3910 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 1526.487202][ T3887] loop3: detected capacity change from 0 to 512 [ 1526.488376][ T3910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.491676][ T3910] Call Trace: [ 1526.492305][ T3910] dump_stack+0x137/0x19d [ 1526.493253][ T3910] should_fail+0x23c/0x250 [ 1526.494075][ T3910] should_fail_usercopy+0x16/0x20 [ 1526.495404][ T3910] _copy_to_user+0x1c/0x90 [ 1526.496307][ T3910] simple_read_from_buffer+0xab/0x120 [ 1526.497431][ T3910] proc_fail_nth_read+0xf6/0x140 [ 1526.498280][ T3910] ? rw_verify_area+0x136/0x250 [ 1526.499578][ T3910] ? proc_fault_inject_write+0x200/0x200 [ 1526.500807][ T3910] vfs_read+0x154/0x5d0 [ 1526.501592][ T3910] ? __fget_light+0x21b/0x260 [ 1526.502590][ T3910] ? __cond_resched+0x11/0x40 [ 1526.503376][ T3910] ksys_read+0xce/0x180 [ 1526.504061][ T3910] __x64_sys_read+0x3e/0x50 [ 1526.504940][ T3910] do_syscall_64+0x4a/0x90 05:35:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000000d0000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:47 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:47 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1526.505684][ T3910] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1526.506715][ T3910] RIP: 0033:0x41935c [ 1526.507522][ T3910] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1526.510924][ T3910] RSP: 002b:00007f7a3035d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1526.512306][ T3910] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 1526.513830][ T3910] RDX: 000000000000000f RSI: 00007f7a3035d1e0 RDI: 0000000000000003 [ 1526.515459][ T3910] RBP: 00007f7a3035d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1526.516821][ T3910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1526.518035][ T3910] R13: 00007fff3c5b460f R14: 00007f7a3035d300 R15: 0000000000022000 [ 1526.571199][ T3915] loop3: detected capacity change from 0 to 512 [ 1526.576203][ T3918] loop4: detected capacity change from 0 to 184 [ 1526.582252][ T3917] loop1: detected capacity change from 0 to 264192 [ 1526.590039][ T3915] EXT4-fs (loop3): Invalid log cluster size: 3328 [ 1526.618087][ T3915] loop3: detected capacity change from 0 to 512 [ 1526.620689][ T3917] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1526.631599][ T3915] EXT4-fs (loop3): Invalid log cluster size: 3328 05:35:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x7, 0x9, 0x0, 0x9}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x208000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @dev}}, 0x0, 0x0, 0x24, 0x0, "12476376be060067e0377d6c3fa955825a423c0db20733230d8500000000ca6d00000000000000272f00264022118624203d00"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000040)=0x5, 0x4) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0xfffffffe, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) shutdown(r3, 0x0) write(r2, &(0x7f0000000240)="fc", 0xe10) write$9p(r0, &(0x7f0000001400)="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", 0x233) 05:35:47 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x2}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:47 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000204000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f240000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000000e0000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:47 executing program 5 (fault-call:9 fault-nth:31): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:47 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x3}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1527.221621][ T3954] loop1: detected capacity change from 0 to 264192 [ 1527.228287][ T3953] loop4: detected capacity change from 0 to 184 [ 1527.232523][ T3954] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1527.240043][ T3952] loop3: detected capacity change from 0 to 512 [ 1527.244075][ T3952] EXT4-fs (loop3): Invalid log cluster size: 3584 05:35:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f250000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:47 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x4}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:47 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x5}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1527.272598][ T3970] FAULT_INJECTION: forcing a failure. [ 1527.272598][ T3970] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1527.277119][ T3970] CPU: 0 PID: 3970 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1527.279373][ T3970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1527.282600][ T3970] Call Trace: [ 1527.283696][ T3970] dump_stack+0x137/0x19d [ 1527.285320][ T3970] should_fail+0x23c/0x250 [ 1527.286673][ T3970] __alloc_pages+0x102/0x320 [ 1527.288296][ T3970] alloc_pages+0x21d/0x310 [ 1527.289676][ T3970] __page_cache_alloc+0x4d/0xf0 [ 1527.291516][ T3970] page_cache_ra_unbounded+0x1ae/0x410 [ 1527.293601][ T3970] ondemand_readahead+0x579/0x7b0 [ 1527.295490][ T3970] page_cache_async_ra+0x165/0x190 [ 1527.297078][ T3970] do_async_mmap_readahead+0x21a/0x260 [ 1527.298585][ T3970] filemap_fault+0x106/0x7b0 [ 1527.300146][ T3970] ext4_filemap_fault+0x4b/0x60 [ 1527.302258][ T3970] ? ext4_page_mkwrite+0xf20/0xf20 [ 1527.303517][ T3970] handle_mm_fault+0x128f/0x1a70 [ 1527.304786][ T3970] ? follow_page_mask+0x93f/0x1040 [ 1527.306567][ T3970] __get_user_pages+0x947/0xee0 [ 1527.308563][ T3970] get_user_pages_unlocked+0x135/0x5f0 [ 1527.310444][ T3970] __gup_longterm_unlocked+0x47/0x110 [ 1527.312450][ T3970] internal_get_user_pages_fast+0xfab/0x1130 [ 1527.314152][ T3970] get_user_pages_fast+0x5d/0x80 [ 1527.314954][ T3970] iov_iter_get_pages+0x1e9/0xcc0 [ 1527.315785][ T3970] ? kmem_cache_alloc+0x201/0x2f0 [ 1527.316820][ T3970] ? mempool_alloc_slab+0x16/0x20 [ 1527.317678][ T3970] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1527.318624][ T3970] ? kmem_cache_alloc+0x201/0x2f0 [ 1527.319388][ T3970] ? bio_alloc_bioset+0x27d/0x480 [ 1527.320181][ T3970] iomap_dio_bio_actor+0x673/0xb50 [ 1527.321307][ T3970] iomap_dio_actor+0x26e/0x3b0 05:35:47 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x6}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1527.322331][ T3970] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1527.323413][ T3970] iomap_apply+0x1e2/0x400 [ 1527.324165][ T3970] __iomap_dio_rw+0x5af/0xad0 [ 1527.324998][ T3970] ? __iomap_dio_rw+0xad0/0xad0 [ 1527.325790][ T3970] iomap_dio_rw+0x30/0x70 [ 1527.326504][ T3970] ext4_file_read_iter+0x21a/0x290 [ 1527.327373][ T3970] aio_read+0x1c1/0x280 [ 1527.328107][ T3970] ? kmem_cache_alloc+0x201/0x2f0 [ 1527.329066][ T3970] io_submit_one+0x7fb/0x1350 [ 1527.329876][ T3970] __se_sys_io_submit+0xf5/0x260 [ 1527.330660][ T3970] __x64_sys_io_submit+0x3f/0x50 [ 1527.331431][ T3970] do_syscall_64+0x4a/0x90 [ 1527.332273][ T3970] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1527.333313][ T3970] RIP: 0033:0x4665d9 [ 1527.333894][ T3970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1527.336891][ T3970] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1527.338202][ T3970] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1527.339535][ T3970] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1527.340666][ T3970] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1527.342005][ T3970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1527.343267][ T3970] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:47 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000604000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1527.364600][ T3952] loop3: detected capacity change from 0 to 512 [ 1527.377118][ T3952] EXT4-fs (loop3): Invalid log cluster size: 3584 [ 1527.411131][ T3988] loop4: detected capacity change from 0 to 184 [ 1527.415901][ T3987] loop1: detected capacity change from 0 to 264192 [ 1527.437291][ T3987] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000000f0000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:48 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x7}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000005000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f260000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/45}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x78ce76d5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x10010, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r2, r1, 0x0) r3 = openat(r1, &(0x7f0000000000)='./file1\x00', 0x765202, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r4, r3, 0x0) getdents(r3, &(0x7f0000000280)=""/200, 0xc8) ioctl$TCSETS(r3, 0x5402, &(0x7f00000001c0)={0x7e, 0x40, 0x20, 0xf90, 0x4, "d170b0431dc6a97a91d19ab9c43dc953e166fd"}) getdents(r1, &(0x7f0000000280)=""/200, 0xc8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000140)={0x4, 0x200, 0x73d5, 0xfff, 0x12, "21543f54c7c947c8bccf1efdd7353e4b74a39f"}) r5 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 05:35:48 executing program 5 (fault-call:9 fault-nth:32): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:48 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x8}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x560a, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) r2 = gettid() tkill(r2, 0x34) syz_open_procfs(r2, &(0x7f0000000040)='net/icmp\x00') 05:35:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000006000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f270000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1527.897701][ T4006] loop1: detected capacity change from 0 to 264192 [ 1527.904364][ T4006] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1527.907360][ T4013] loop3: detected capacity change from 0 to 512 [ 1527.912752][ T4013] EXT4-fs (loop3): Invalid log cluster size: 3840 [ 1527.915123][ T4012] loop4: detected capacity change from 0 to 184 [ 1527.973811][ T4027] FAULT_INJECTION: forcing a failure. [ 1527.973811][ T4027] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1527.976440][ T4027] CPU: 1 PID: 4027 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1527.978103][ T4027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1527.979665][ T4027] Call Trace: [ 1527.980281][ T4027] dump_stack+0x137/0x19d [ 1527.980945][ T4027] should_fail+0x23c/0x250 [ 1527.981720][ T4027] __alloc_pages+0x102/0x320 [ 1527.982457][ T4027] alloc_pages+0x21d/0x310 [ 1527.983217][ T4027] __page_cache_alloc+0x4d/0xf0 [ 1527.984187][ T4027] page_cache_ra_unbounded+0x1ae/0x410 [ 1527.985250][ T4027] ondemand_readahead+0x579/0x7b0 [ 1527.986235][ T4027] page_cache_async_ra+0x165/0x190 [ 1527.987108][ T4027] do_async_mmap_readahead+0x21a/0x260 [ 1527.987992][ T4027] filemap_fault+0x106/0x7b0 [ 1527.988631][ T4027] ext4_filemap_fault+0x4b/0x60 [ 1527.989474][ T4027] ? ext4_page_mkwrite+0xf20/0xf20 [ 1527.990321][ T4027] handle_mm_fault+0x128f/0x1a70 [ 1527.991167][ T4027] ? follow_page_mask+0x93f/0x1040 [ 1527.992073][ T4027] __get_user_pages+0x947/0xee0 [ 1527.992821][ T4027] get_user_pages_unlocked+0x135/0x5f0 [ 1527.993771][ T4027] __gup_longterm_unlocked+0x47/0x110 [ 1527.994772][ T4027] internal_get_user_pages_fast+0xfab/0x1130 [ 1527.995789][ T4027] get_user_pages_fast+0x5d/0x80 [ 1527.996852][ T4027] iov_iter_get_pages+0x1e9/0xcc0 [ 1527.997770][ T4027] ? kmem_cache_alloc+0x201/0x2f0 [ 1527.998556][ T4027] ? mempool_alloc_slab+0x16/0x20 [ 1527.999413][ T4027] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1528.000225][ T4027] ? kmem_cache_alloc+0x201/0x2f0 [ 1528.001095][ T4027] ? bio_alloc_bioset+0x27d/0x480 [ 1528.001825][ T4027] iomap_dio_bio_actor+0x673/0xb50 [ 1528.002766][ T4027] iomap_dio_actor+0x26e/0x3b0 [ 1528.003566][ T4027] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1528.004436][ T4027] iomap_apply+0x1e2/0x400 [ 1528.005215][ T4027] __iomap_dio_rw+0x5af/0xad0 [ 1528.005918][ T4027] ? __iomap_dio_rw+0xad0/0xad0 [ 1528.006638][ T4027] iomap_dio_rw+0x30/0x70 [ 1528.007248][ T4027] ext4_file_read_iter+0x21a/0x290 [ 1528.008220][ T4027] aio_read+0x1c1/0x280 [ 1528.009481][ T4027] ? kmem_cache_alloc+0x201/0x2f0 [ 1528.010994][ T4027] io_submit_one+0x7fb/0x1350 [ 1528.012048][ T4027] __se_sys_io_submit+0xf5/0x260 [ 1528.013025][ T4027] __x64_sys_io_submit+0x3f/0x50 [ 1528.014748][ T4027] do_syscall_64+0x4a/0x90 [ 1528.015829][ T4027] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1528.017975][ T4027] RIP: 0033:0x4665d9 05:35:48 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x8) sendfile(0xffffffffffffffff, r3, &(0x7f0000000280)=0xff, 0x4) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/220, 0xdc}, {&(0x7f00000001c0)=""/45, 0x2d}], 0x2, 0x5, 0xffff) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x2008000) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x1}) 05:35:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000406000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000004100000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:48 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x9}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1528.019275][ T4027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.024423][ T4027] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1528.026206][ T4027] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1528.028477][ T4027] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1528.030346][ T4027] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.033066][ T4027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1528.035321][ T4027] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1528.052238][ T4013] loop3: detected capacity change from 0 to 512 [ 1528.058114][ T4013] EXT4-fs (loop3): Invalid log cluster size: 3840 05:35:48 executing program 2: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000a00)=0x0) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f0000000340)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x10) r3 = socket$inet6(0xa, 0x1, 0xffffffff) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000400)={0x0, 0x0, 0x1, 0x0, '\x00', [{0x10000, 0x6, 0x5, 0x2, 0x9, 0x7f}, {0x7ff, 0x3, 0x1, 0x9, 0x10001, 0x3f}], ['\x00']}) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_LINK_TIMEOUT={0xf, 0x8, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x77359400}}, 0x38b) syz_io_uring_setup(0x2ead, &(0x7f0000000000)={0x0, 0x9d2, 0x1, 0x1, 0x201, 0x0, r0}, &(0x7f000041c000/0x4000)=nil, &(0x7f0000c8a000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r6, r5, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x3, 0x0, @fd=r6, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x6) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) bind$inet6(r5, &(0x7f0000000200)={0xa, 0x4e21, 0x1, @empty, 0x1}, 0x1c) io_uring_enter(r0, 0xa2, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r7 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r7, 0xffffffffffffffff, 0x0) sync_file_range(r7, 0xe3c0, 0x80000000, 0x0) 05:35:48 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xa}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1528.109810][ T4041] loop1: detected capacity change from 0 to 264192 [ 1528.114817][ T4047] loop4: detected capacity change from 0 to 184 [ 1528.118027][ T4041] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1528.131552][ T4052] loop3: detected capacity change from 0 to 512 05:35:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000007000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1528.154865][ T4052] EXT4-fs (loop3): Invalid log cluster size: 4100 05:35:48 executing program 5 (fault-call:9 fault-nth:33): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f280000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f0000000280)) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0xd, 0x2}) lremovexattr(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)=@known='system.sockprotoname\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000320000000f000000000000000200000002000000008000000080000020000000e1f4655fe1f4655f2682f03f53ef010001000000e0f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed41000000100000e0f4655fe1f4655fe1f4655f000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000080)={[{@grpjquota}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/connector\x00') 05:35:48 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xb}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000020100000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000009000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1528.190705][ T4052] loop3: detected capacity change from 0 to 512 [ 1528.198821][ T4071] loop4: detected capacity change from 0 to 184 [ 1528.203526][ T4052] EXT4-fs (loop3): Invalid log cluster size: 4100 05:35:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000004, 0x4000051, r0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f0000000040)={0x0, 0xbd6, [0x5, 0x0, 0xc, 0xffffffffdf595f2a, 0x3e0000000000000, 0x401]}) write$binfmt_misc(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="dc7afea08184959730ba75cceffa8dff6aa640797ea9ed66a4f8fdeaef0ad9dfbe93ec6bccc58a459830a1e94740e06d94342c64dd8165ebea25878b8a8da2560890b8f323579e284fe7fafd05f442ec8ab4712e0ee6e3d021fdf6b8ff2137a52dc71c80e3c5ca3c8758cd5a01709c67a1ec8c65a982abd30c22cf91e3adda9f"], 0x100) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 05:35:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800000a000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000110000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:48 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xc}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1528.271861][ T4087] loop4: detected capacity change from 0 to 184 [ 1528.286060][ T4080] loop1: detected capacity change from 0 to 264192 [ 1528.288401][ T4091] loop3: detected capacity change from 0 to 512 [ 1528.294865][ T4091] EXT4-fs (loop3): Invalid log cluster size: 4128 [ 1528.307237][ T4080] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, 0xffffffffffffffff, 0xfffff000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r3, r2, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r3, 0xffffc000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r4, r1, 0x0) getdents(r1, &(0x7f0000000280)=""/200, 0xc8) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1800009, 0x12, r1, 0x2000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() ptrace(0x10, r5) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000040)="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", 0xfa}, {&(0x7f0000000140)="338ae07474ea1046ffe54278afe57c61c5064ee73c28d3a098788b303153a94e08b61959c6ceca9fcbc7c208b09626fdb0e6e0c14287f60d56a1c23f79d22cbbad31a58c3a411a3fc2e9ca6a703dc564ac1d3d288a1cfd658c552b863f8f82ca3544113b2345132aeca58e135bb405272c39351d8915398272a4e167441ee254f91045f9d0502e8f4e27e3e715fd2bafeb5235da2021d98479f511052a18f465f133696fd562a439f4dde64d1b3bf5b28a67e58659d020d6a5f3ff1fc9af8f36ab332d7e5ebcaa20c4e32cf8e9d3d69e6f4fd8c0b770b8e59ec5be9798c908580c906bb7c2174ed281411f309a08013766ef33351bf3165e5e2d362958e522", 0xff}], 0x3) wait4(0x0, 0x0, 0x8, 0x0) 05:35:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f290000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1528.383585][ T4113] FAULT_INJECTION: forcing a failure. [ 1528.383585][ T4113] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1528.388248][ T4113] CPU: 0 PID: 4113 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1528.391254][ T4113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1528.394236][ T4113] Call Trace: [ 1528.395198][ T4113] dump_stack+0x137/0x19d [ 1528.396850][ T4113] should_fail+0x23c/0x250 [ 1528.398232][ T4113] __alloc_pages+0x102/0x320 [ 1528.399916][ T4113] alloc_pages+0x21d/0x310 [ 1528.401730][ T4113] __page_cache_alloc+0x4d/0xf0 [ 1528.402676][ T4113] page_cache_ra_unbounded+0x1ae/0x410 [ 1528.404261][ T4113] ondemand_readahead+0x579/0x7b0 [ 1528.406096][ T4113] page_cache_async_ra+0x165/0x190 [ 1528.407544][ T4113] do_async_mmap_readahead+0x21a/0x260 [ 1528.409295][ T4113] filemap_fault+0x106/0x7b0 [ 1528.410739][ T4113] ext4_filemap_fault+0x4b/0x60 [ 1528.412183][ T4113] ? ext4_page_mkwrite+0xf20/0xf20 [ 1528.414129][ T4113] handle_mm_fault+0x128f/0x1a70 [ 1528.415820][ T4113] ? follow_page_mask+0x93f/0x1040 [ 1528.417452][ T4113] __get_user_pages+0x947/0xee0 [ 1528.418877][ T4113] get_user_pages_unlocked+0x135/0x5f0 [ 1528.420125][ T4113] __gup_longterm_unlocked+0x47/0x110 [ 1528.421347][ T4113] internal_get_user_pages_fast+0xfab/0x1130 [ 1528.423352][ T4113] get_user_pages_fast+0x5d/0x80 [ 1528.424723][ T4113] iov_iter_get_pages+0x1e9/0xcc0 [ 1528.426151][ T4113] ? kmem_cache_alloc+0x201/0x2f0 [ 1528.427722][ T4113] ? mempool_alloc_slab+0x16/0x20 [ 1528.429263][ T4113] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1528.430851][ T4113] ? kmem_cache_alloc+0x201/0x2f0 [ 1528.432235][ T4113] ? bio_alloc_bioset+0x27d/0x480 [ 1528.433820][ T4113] iomap_dio_bio_actor+0x673/0xb50 [ 1528.435362][ T4113] iomap_dio_actor+0x26e/0x3b0 [ 1528.436770][ T4113] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1528.438791][ T4113] iomap_apply+0x1e2/0x400 [ 1528.440255][ T4113] __iomap_dio_rw+0x5af/0xad0 [ 1528.441514][ T4113] ? __iomap_dio_rw+0xad0/0xad0 [ 1528.442588][ T4113] iomap_dio_rw+0x30/0x70 [ 1528.443837][ T4113] ext4_file_read_iter+0x21a/0x290 [ 1528.445092][ T4113] aio_read+0x1c1/0x280 [ 1528.446571][ T4113] ? kmem_cache_alloc+0x201/0x2f0 [ 1528.448187][ T4113] io_submit_one+0x7fb/0x1350 [ 1528.450052][ T4113] __se_sys_io_submit+0xf5/0x260 [ 1528.451876][ T4113] __x64_sys_io_submit+0x3f/0x50 [ 1528.453268][ T4113] do_syscall_64+0x4a/0x90 [ 1528.454788][ T4113] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1528.456508][ T4113] RIP: 0033:0x4665d9 [ 1528.457958][ T4113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.458223][ T4116] loop3: detected capacity change from 0 to 512 [ 1528.463290][ T4113] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1528.463311][ T4113] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1528.463323][ T4113] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1528.463335][ T4113] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.469133][ T4116] EXT4-fs (loop3): Invalid log cluster size: 4352 [ 1528.469518][ T4113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1528.478340][ T4113] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1528.480013][ T4123] loop4: detected capacity change from 0 to 184 [ 1528.490030][ T4118] loop1: detected capacity change from 0 to 264192 [ 1528.503648][ T4116] loop3: detected capacity change from 0 to 512 [ 1528.505917][ T4116] EXT4-fs (loop3): Invalid log cluster size: 4352 [ 1528.508111][ T4118] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:49 executing program 5 (fault-call:9 fault-nth:34): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xd}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r2, r1, 0x0) getdents(r1, &(0x7f0000000280)=""/200, 0xc8) mmap(&(0x7f00000c1000/0x4000)=nil, 0x4000, 0x2000000, 0x2010, r1, 0x70866000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r3, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 05:35:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800000b000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000120000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f2a0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1528.645300][ T4150] loop1: detected capacity change from 0 to 264192 [ 1528.651948][ T4150] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1528.664455][ T4159] loop4: detected capacity change from 0 to 184 05:35:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f2b0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xe}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:49 executing program 2: r0 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x1e}, 0x18) clone3(&(0x7f0000000080)={0x1700, 0x0, 0x0, 0x0, {0x64}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 05:35:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xf}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800000c000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:49 executing program 2: r0 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @local}, 0x8}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r4, 0x0) recvmmsg(r3, &(0x7f0000002bc0)=[{{0x0, 0x53, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x8000000000001f0, 0x0, 0x0) r5 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) [ 1528.696129][ T4163] loop3: detected capacity change from 0 to 512 [ 1528.706992][ T4163] EXT4-fs (loop3): Invalid log cluster size: 4608 [ 1528.723234][ T4169] FAULT_INJECTION: forcing a failure. [ 1528.723234][ T4169] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1528.727751][ T4169] CPU: 0 PID: 4169 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1528.730613][ T4169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1528.734137][ T4169] Call Trace: [ 1528.735277][ T4169] dump_stack+0x137/0x19d [ 1528.736934][ T4169] should_fail+0x23c/0x250 [ 1528.738447][ T4169] __alloc_pages+0x102/0x320 [ 1528.740059][ T4169] alloc_pages+0x21d/0x310 [ 1528.741455][ T4169] __page_cache_alloc+0x4d/0xf0 [ 1528.742761][ T4169] page_cache_ra_unbounded+0x1ae/0x410 [ 1528.744708][ T4169] ondemand_readahead+0x579/0x7b0 [ 1528.746657][ T4169] page_cache_async_ra+0x165/0x190 [ 1528.748212][ T4169] do_async_mmap_readahead+0x21a/0x260 [ 1528.749719][ T4169] filemap_fault+0x106/0x7b0 [ 1528.751308][ T4169] ext4_filemap_fault+0x4b/0x60 [ 1528.752648][ T4169] ? ext4_page_mkwrite+0xf20/0xf20 [ 1528.754238][ T4169] handle_mm_fault+0x128f/0x1a70 [ 1528.756081][ T4169] ? follow_page_mask+0x93f/0x1040 [ 1528.757681][ T4169] __get_user_pages+0x947/0xee0 [ 1528.759154][ T4169] get_user_pages_unlocked+0x135/0x5f0 [ 1528.761069][ T4169] __gup_longterm_unlocked+0x47/0x110 [ 1528.763078][ T4169] internal_get_user_pages_fast+0xfab/0x1130 [ 1528.765073][ T4169] get_user_pages_fast+0x5d/0x80 [ 1528.767000][ T4169] iov_iter_get_pages+0x1e9/0xcc0 [ 1528.768557][ T4169] ? kmem_cache_alloc+0x201/0x2f0 [ 1528.770387][ T4169] ? mempool_alloc_slab+0x16/0x20 [ 1528.771960][ T4169] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1528.773902][ T4169] ? kmem_cache_alloc+0x201/0x2f0 [ 1528.775539][ T4169] ? bio_alloc_bioset+0x27d/0x480 [ 1528.777576][ T4169] iomap_dio_bio_actor+0x673/0xb50 [ 1528.779324][ T4169] iomap_dio_actor+0x26e/0x3b0 [ 1528.780979][ T4169] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1528.782964][ T4169] iomap_apply+0x1e2/0x400 [ 1528.784491][ T4169] __iomap_dio_rw+0x5af/0xad0 [ 1528.786062][ T4169] ? __iomap_dio_rw+0xad0/0xad0 [ 1528.788027][ T4169] iomap_dio_rw+0x30/0x70 [ 1528.789978][ T4169] ext4_file_read_iter+0x21a/0x290 [ 1528.791782][ T4169] aio_read+0x1c1/0x280 [ 1528.793186][ T4169] ? kmem_cache_alloc+0x201/0x2f0 [ 1528.795409][ T4169] io_submit_one+0x7fb/0x1350 [ 1528.796744][ T4169] __se_sys_io_submit+0xf5/0x260 [ 1528.798628][ T4169] __x64_sys_io_submit+0x3f/0x50 [ 1528.800318][ T4169] do_syscall_64+0x4a/0x90 [ 1528.802705][ T4169] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1528.804225][ T4169] RIP: 0033:0x4665d9 [ 1528.805305][ T4169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.811194][ T4169] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1528.813859][ T4169] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1528.815710][ T4169] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1528.817489][ T4169] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.819704][ T4169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1528.822067][ T4169] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1528.846732][ T4163] loop3: detected capacity change from 0 to 512 [ 1528.850455][ T4163] EXT4-fs (loop3): Invalid log cluster size: 4608 [ 1528.890334][ T4185] loop4: detected capacity change from 0 to 184 [ 1528.902677][ T4187] loop1: detected capacity change from 0 to 264192 [ 1528.907393][ T4187] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:49 executing program 5 (fault-call:9 fault-nth:35): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x10}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00'}) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r3, 0xca289435, &(0x7f0000000580)={0x2, 0x1f3b800, @status={[0xfffffffeffffffff, 0x1a06e, 0x7fff, 0x7, 0x84e, 0x4]}, [0x3ff, 0x4, 0x5, 0x80000001, 0xb6, 0x1, 0x4af2a3f1, 0x4, 0x2a7bfc43, 0x55f1, 0x9, 0x3ff, 0xfffffffffffffff8, 0x0, 0xffff, 0x2, 0x604, 0x40, 0x8, 0x7, 0x1, 0x5, 0x3e, 0x2, 0x4, 0x0, 0x7fffffff, 0x7fffffff, 0x0, 0x3, 0x3e, 0x2, 0x1, 0xe1f, 0x1ff, 0x9, 0xff, 0x640, 0x9, 0x1f, 0x20, 0x7fff, 0x1, 0xd5fe, 0xf7, 0x5, 0x1, 0x4, 0x7, 0x7, 0x7, 0x9e1, 0x1aa, 0x7, 0xbb0e, 0x9, 0x8, 0x0, 0xffff, 0x8, 0x5, 0x1, 0x5, 0x6]}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) r6 = dup3(r5, r4, 0x0) getdents(r4, &(0x7f0000000280)=""/200, 0xc8) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'ipvlan0\x00'}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x1b, &(0x7f0000000040)={@initdev, 0x0}, &(0x7f0000000140)=0x14) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x11, 0x8864, r7, 0x1, 0x10, 0x6, @dev}, 0x14) 05:35:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000140000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800000d000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f2c0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x11}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800000f000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f2d0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1529.000705][ T4205] loop4: detected capacity change from 0 to 184 [ 1529.018279][ T4207] loop1: detected capacity change from 0 to 264192 [ 1529.035102][ T4207] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1529.042480][ T4219] loop3: detected capacity change from 0 to 512 05:35:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r5, r3, &(0x7f0000000200)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, r4, 0x0}, 0x0) r6 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000480)='cpu<&0\n\n\n') io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 05:35:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x12}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1529.068697][ T4219] EXT4-fs (loop3): Invalid log cluster size: 5120 05:35:49 executing program 2: chdir(0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x8) open(&(0x7f0000000080)='./bus\x00', 0x8040, 0x80) r2 = open(&(0x7f0000000200)='./bus\x00', 0x40303, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x256440, 0x0) fcntl$setstatus(r3, 0x4, 0x2c00) sendfile(r1, r2, 0x0, 0x8400fffffffa) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x420, 0x0, 0x1, 0x7, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000040)=0x2) r5 = open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) sendfile(r0, r5, 0x0, 0x8400fffffffa) [ 1529.100838][ T4230] loop4: detected capacity change from 0 to 184 [ 1529.129552][ T4237] loop1: detected capacity change from 0 to 264192 [ 1529.129552][ T4219] loop3: detected capacity change from 0 to 512 [ 1529.135357][ T4238] FAULT_INJECTION: forcing a failure. [ 1529.135357][ T4238] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1529.140010][ T4238] CPU: 1 PID: 4238 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1529.143329][ T4238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1529.146642][ T4238] Call Trace: [ 1529.147581][ T4238] dump_stack+0x137/0x19d [ 1529.149789][ T4238] should_fail+0x23c/0x250 [ 1529.151010][ T4219] EXT4-fs (loop3): Invalid log cluster size: 5120 [ 1529.151661][ T4238] __alloc_pages+0x102/0x320 [ 1529.154807][ T4238] alloc_pages+0x21d/0x310 [ 1529.156312][ T4238] __page_cache_alloc+0x4d/0xf0 [ 1529.157960][ T4238] page_cache_ra_unbounded+0x1ae/0x410 [ 1529.159837][ T4238] ondemand_readahead+0x579/0x7b0 [ 1529.161470][ T4238] page_cache_async_ra+0x165/0x190 [ 1529.163652][ T4238] do_async_mmap_readahead+0x21a/0x260 [ 1529.165467][ T4238] filemap_fault+0x106/0x7b0 [ 1529.167175][ T4238] ext4_filemap_fault+0x4b/0x60 [ 1529.169775][ T4238] ? ext4_page_mkwrite+0xf20/0xf20 [ 1529.171904][ T4238] handle_mm_fault+0x128f/0x1a70 [ 1529.173969][ T4238] ? follow_page_mask+0x93f/0x1040 [ 1529.173978][ T4237] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1529.179489][ T4238] __get_user_pages+0x947/0xee0 [ 1529.181358][ T4238] get_user_pages_unlocked+0x135/0x5f0 [ 1529.183166][ T4238] __gup_longterm_unlocked+0x47/0x110 [ 1529.184839][ T4238] internal_get_user_pages_fast+0xfab/0x1130 [ 1529.187012][ T4238] get_user_pages_fast+0x5d/0x80 [ 1529.188868][ T4238] iov_iter_get_pages+0x1e9/0xcc0 [ 1529.190256][ T4238] ? kmem_cache_alloc+0x201/0x2f0 [ 1529.191924][ T4238] ? mempool_alloc_slab+0x16/0x20 [ 1529.193604][ T4238] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1529.195499][ T4238] ? kmem_cache_alloc+0x201/0x2f0 [ 1529.197231][ T4238] ? bio_alloc_bioset+0x27d/0x480 [ 1529.198509][ T4238] iomap_dio_bio_actor+0x673/0xb50 [ 1529.200407][ T4238] iomap_dio_actor+0x26e/0x3b0 [ 1529.201968][ T4238] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1529.203382][ T4238] iomap_apply+0x1e2/0x400 [ 1529.204552][ T4238] __iomap_dio_rw+0x5af/0xad0 [ 1529.205879][ T4238] ? __iomap_dio_rw+0xad0/0xad0 [ 1529.207400][ T4238] iomap_dio_rw+0x30/0x70 [ 1529.208572][ T4238] ext4_file_read_iter+0x21a/0x290 [ 1529.209780][ T4238] aio_read+0x1c1/0x280 [ 1529.211061][ T4238] ? kmem_cache_alloc+0x201/0x2f0 [ 1529.212676][ T4238] io_submit_one+0x7fb/0x1350 [ 1529.214155][ T4238] __se_sys_io_submit+0xf5/0x260 [ 1529.216039][ T4238] __x64_sys_io_submit+0x3f/0x50 [ 1529.217607][ T4238] do_syscall_64+0x4a/0x90 [ 1529.218860][ T4238] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1529.221275][ T4238] RIP: 0033:0x4665d9 [ 1529.222606][ T4238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1529.230917][ T4238] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1529.234375][ T4238] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1529.237893][ T4238] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1529.239729][ T4238] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1529.241618][ T4238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1529.243174][ T4238] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:49 executing program 5 (fault-call:9 fault-nth:36): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x48}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f2e0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:49 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002240)='/sys/class/iommu', 0x0, 0x0) r1 = clone3(&(0x7f00000003c0)={0x200100000, 0x0, 0x0, 0x0, {0xfffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) r2 = fork() wait4(r2, 0x0, 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x420082, 0x0) clone3(&(0x7f0000000200)={0x42000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x1d}, &(0x7f00000000c0)=""/163, 0xa3, &(0x7f0000000440)=""/4096, &(0x7f0000000180)=[r1, r2, r1, r1, r1], 0x5, {r3}}, 0x58) 05:35:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8002010000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000200000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x4c}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x68}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1529.400649][ T4262] loop1: detected capacity change from 0 to 264192 [ 1529.404131][ T4262] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1529.456777][ T4277] FAULT_INJECTION: forcing a failure. [ 1529.456777][ T4277] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1529.459117][ T4277] CPU: 0 PID: 4277 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1529.460545][ T4277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1529.461951][ T4277] Call Trace: [ 1529.462440][ T4277] dump_stack+0x137/0x19d [ 1529.463098][ T4277] should_fail+0x23c/0x250 [ 1529.463839][ T4277] __alloc_pages+0x102/0x320 [ 1529.464561][ T4277] alloc_pages+0x21d/0x310 [ 1529.465252][ T4277] __page_cache_alloc+0x4d/0xf0 [ 1529.466053][ T4277] page_cache_ra_unbounded+0x1ae/0x410 [ 1529.466921][ T4277] ondemand_readahead+0x579/0x7b0 [ 1529.467733][ T4277] page_cache_async_ra+0x165/0x190 [ 1529.468549][ T4277] do_async_mmap_readahead+0x21a/0x260 [ 1529.469450][ T4277] filemap_fault+0x106/0x7b0 [ 1529.470152][ T4277] ext4_filemap_fault+0x4b/0x60 [ 1529.470920][ T4277] ? ext4_page_mkwrite+0xf20/0xf20 [ 1529.471769][ T4277] handle_mm_fault+0x128f/0x1a70 [ 1529.472618][ T4277] ? follow_page_mask+0x93f/0x1040 [ 1529.473346][ T4277] __get_user_pages+0x947/0xee0 [ 1529.474134][ T4277] get_user_pages_unlocked+0x135/0x5f0 [ 1529.474956][ T4277] __gup_longterm_unlocked+0x47/0x110 [ 1529.475780][ T4277] internal_get_user_pages_fast+0xfab/0x1130 [ 1529.476662][ T4277] get_user_pages_fast+0x5d/0x80 [ 1529.477693][ T4277] iov_iter_get_pages+0x1e9/0xcc0 [ 1529.478558][ T4277] ? kmem_cache_alloc+0x201/0x2f0 [ 1529.479436][ T4277] ? mempool_alloc_slab+0x16/0x20 [ 1529.480606][ T4277] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1529.481925][ T4277] ? kmem_cache_alloc+0x201/0x2f0 [ 1529.482967][ T4277] ? bio_alloc_bioset+0x27d/0x480 [ 1529.483816][ T4277] iomap_dio_bio_actor+0x673/0xb50 [ 1529.484726][ T4277] iomap_dio_actor+0x26e/0x3b0 [ 1529.485484][ T4277] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1529.486521][ T4277] iomap_apply+0x1e2/0x400 [ 1529.487272][ T4277] __iomap_dio_rw+0x5af/0xad0 [ 1529.488041][ T4277] ? __iomap_dio_rw+0xad0/0xad0 [ 1529.488965][ T4277] iomap_dio_rw+0x30/0x70 [ 1529.489795][ T4277] ext4_file_read_iter+0x21a/0x290 [ 1529.490679][ T4277] aio_read+0x1c1/0x280 [ 1529.491316][ T4277] ? kmem_cache_alloc+0x201/0x2f0 [ 1529.492337][ T4277] io_submit_one+0x7fb/0x1350 [ 1529.493022][ T4277] __se_sys_io_submit+0xf5/0x260 [ 1529.493771][ T4277] __x64_sys_io_submit+0x3f/0x50 [ 1529.494640][ T4277] do_syscall_64+0x4a/0x90 [ 1529.495584][ T4277] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1529.496619][ T4277] RIP: 0033:0x4665d9 [ 1529.497338][ T4277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1529.500943][ T4277] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1529.502246][ T4277] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1529.503457][ T4277] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1529.504864][ T4277] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1529.506245][ T4277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1529.507511][ T4277] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f2f0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1529.536280][ T4272] loop4: detected capacity change from 0 to 184 05:35:50 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x6c}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:50 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000011000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f300000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1529.576763][ T4273] loop3: detected capacity change from 0 to 512 [ 1529.580417][ T4273] EXT4-fs (loop3): Invalid log cluster size: 8192 [ 1529.587093][ T4292] loop1: detected capacity change from 0 to 264192 [ 1529.592007][ T4292] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:50 executing program 5 (fault-call:9 fault-nth:37): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:50 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x74}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000010200000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1529.634457][ T4273] loop3: detected capacity change from 0 to 512 [ 1529.645524][ T4273] EXT4-fs (loop3): Invalid log cluster size: 8192 [ 1529.675504][ T4316] loop4: detected capacity change from 0 to 184 [ 1529.696950][ T4319] loop1: detected capacity change from 0 to 264192 [ 1529.702253][ T4319] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1529.734975][ T4327] FAULT_INJECTION: forcing a failure. [ 1529.734975][ T4327] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1529.737549][ T4327] CPU: 0 PID: 4327 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1529.739114][ T4327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1529.740605][ T4327] Call Trace: [ 1529.741180][ T4327] dump_stack+0x137/0x19d [ 1529.741906][ T4327] should_fail+0x23c/0x250 [ 1529.742844][ T4327] __alloc_pages+0x102/0x320 [ 1529.743585][ T4327] alloc_pages+0x21d/0x310 [ 1529.744426][ T4327] __page_cache_alloc+0x4d/0xf0 [ 1529.745214][ T4327] page_cache_ra_unbounded+0x1ae/0x410 [ 1529.746118][ T4327] ondemand_readahead+0x579/0x7b0 [ 1529.747025][ T4327] page_cache_async_ra+0x165/0x190 [ 1529.747934][ T4327] do_async_mmap_readahead+0x21a/0x260 [ 1529.747999][ T4329] loop3: detected capacity change from 0 to 512 [ 1529.748801][ T4327] filemap_fault+0x106/0x7b0 [ 1529.750401][ T4327] ext4_filemap_fault+0x4b/0x60 [ 1529.751130][ T4329] EXT4-fs (loop3): Invalid log cluster size: 8208 [ 1529.751160][ T4327] ? ext4_page_mkwrite+0xf20/0xf20 [ 1529.753011][ T4327] handle_mm_fault+0x128f/0x1a70 [ 1529.753897][ T4327] ? follow_page_mask+0x93f/0x1040 [ 1529.754613][ T4327] __get_user_pages+0x947/0xee0 [ 1529.755310][ T4327] get_user_pages_unlocked+0x135/0x5f0 [ 1529.756145][ T4327] __gup_longterm_unlocked+0x47/0x110 [ 1529.757091][ T4327] internal_get_user_pages_fast+0xfab/0x1130 [ 1529.758128][ T4327] get_user_pages_fast+0x5d/0x80 [ 1529.759067][ T4327] iov_iter_get_pages+0x1e9/0xcc0 [ 1529.759975][ T4327] ? kmem_cache_alloc+0x201/0x2f0 [ 1529.760865][ T4327] ? mempool_alloc_slab+0x16/0x20 [ 1529.761693][ T4327] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1529.762857][ T4327] ? kmem_cache_alloc+0x201/0x2f0 [ 1529.764161][ T4327] ? bio_alloc_bioset+0x27d/0x480 [ 1529.764945][ T4327] iomap_dio_bio_actor+0x673/0xb50 [ 1529.765645][ T4327] iomap_dio_actor+0x26e/0x3b0 [ 1529.766521][ T4327] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1529.767493][ T4327] iomap_apply+0x1e2/0x400 [ 1529.768141][ T4327] __iomap_dio_rw+0x5af/0xad0 [ 1529.768908][ T4327] ? __iomap_dio_rw+0xad0/0xad0 [ 1529.769626][ T4327] iomap_dio_rw+0x30/0x70 [ 1529.770272][ T4327] ext4_file_read_iter+0x21a/0x290 [ 1529.771063][ T4327] aio_read+0x1c1/0x280 [ 1529.771754][ T4327] ? kmem_cache_alloc+0x201/0x2f0 [ 1529.772765][ T4327] io_submit_one+0x7fb/0x1350 [ 1529.773733][ T4327] __se_sys_io_submit+0xf5/0x260 [ 1529.774978][ T4327] __x64_sys_io_submit+0x3f/0x50 [ 1529.775812][ T4327] do_syscall_64+0x4a/0x90 [ 1529.776730][ T4327] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1529.777907][ T4327] RIP: 0033:0x4665d9 [ 1529.778487][ T4327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1529.786907][ T4327] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1529.788464][ T4327] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1529.790247][ T4327] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1529.791700][ T4327] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1529.793109][ T4327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1529.794282][ T4327] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1529.838883][ T4329] loop3: detected capacity change from 0 to 512 [ 1529.841480][ T4315] ================================================================== [ 1529.842913][ T4315] BUG: KCSAN: data-race in mm_update_next_owner / page_cache_ra_unbounded [ 1529.844664][ T4315] [ 1529.845098][ T4315] write to 0xffff88813090b0ac of 4 bytes by task 4296 on cpu 0: [ 1529.846427][ T4315] page_cache_ra_unbounded+0x3e3/0x410 [ 1529.847408][ T4315] force_page_cache_ra+0x246/0x280 [ 1529.848153][ T4315] page_cache_sync_ra+0xcc/0xe0 [ 1529.848937][ T4315] filemap_read+0x388/0x1230 [ 1529.849623][ T4315] generic_file_read_iter+0x75/0x2c0 [ 1529.850648][ T4315] blkdev_read_iter+0xb9/0xf0 [ 1529.851320][ T4315] vfs_read+0x565/0x5d0 [ 1529.851891][ T4315] ksys_read+0xce/0x180 [ 1529.852558][ T4315] __x64_sys_read+0x3e/0x50 [ 1529.853227][ T4315] do_syscall_64+0x4a/0x90 [ 1529.854009][ T4315] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1529.854906][ T4315] [ 1529.855258][ T4315] read to 0xffff88813090b0ac of 4 bytes by task 4315 on cpu 1: [ 1529.856335][ T4315] mm_update_next_owner+0x1d9/0x520 [ 1529.857128][ T4315] exit_mm+0x358/0x450 [ 1529.857731][ T4315] do_exit+0x3ff/0x1560 [ 1529.858345][ T4315] do_group_exit+0xce/0x1a0 [ 1529.859228][ T4315] get_signal+0xfc3/0x1610 [ 1529.860009][ T4315] arch_do_signal_or_restart+0x2a/0x220 [ 1529.861017][ T4315] exit_to_user_mode_prepare+0x109/0x190 [ 1529.861850][ T4315] syscall_exit_to_user_mode+0x20/0x40 [ 1529.862648][ T4315] do_syscall_64+0x56/0x90 [ 1529.863302][ T4315] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1529.864231][ T4315] [ 1529.864639][ T4315] value changed: 0x00444140 -> 0x00404140 [ 1529.865536][ T4315] [ 1529.865960][ T4315] Reported by Kernel Concurrency Sanitizer on: [ 1529.866920][ T4315] CPU: 1 PID: 4315 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1529.868236][ T4315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1529.869772][ T4315] ================================================================== [ 1529.877989][ T4329] EXT4-fs (loop3): Invalid log cluster size: 8208 05:35:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f310000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:50 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000114000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:50 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x7a}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000220000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:50 executing program 5 (fault-call:9 fault-nth:38): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:50 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x06rust\xe3c*sgrVid:De', 0x0) 05:35:50 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000018000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1530.306221][ T4349] loop4: detected capacity change from 0 to 184 [ 1530.321336][ T4355] loop3: detected capacity change from 0 to 512 [ 1530.325767][ T4355] EXT4-fs (loop3): Invalid log cluster size: 8704 [ 1530.333863][ T4358] loop1: detected capacity change from 0 to 264192 [ 1530.352463][ T4358] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000250000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1530.361088][ T4355] loop3: detected capacity change from 0 to 512 [ 1530.363521][ T4355] EXT4-fs (loop3): Invalid log cluster size: 8704 [ 1530.386313][ T4353] FAULT_INJECTION: forcing a failure. [ 1530.386313][ T4353] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1530.391003][ T4353] CPU: 1 PID: 4353 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1530.393571][ T4353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.396289][ T4353] Call Trace: [ 1530.397254][ T4353] dump_stack+0x137/0x19d [ 1530.398750][ T4353] should_fail+0x23c/0x250 [ 1530.400432][ T4353] __alloc_pages+0x102/0x320 [ 1530.402308][ T4353] alloc_pages+0x21d/0x310 [ 1530.404058][ T4353] __page_cache_alloc+0x4d/0xf0 [ 1530.405503][ T4353] page_cache_ra_unbounded+0x1ae/0x410 [ 1530.407562][ T4353] ondemand_readahead+0x579/0x7b0 [ 1530.409158][ T4353] page_cache_async_ra+0x165/0x190 [ 1530.410796][ T4353] do_async_mmap_readahead+0x21a/0x260 [ 1530.411964][ T4353] filemap_fault+0x106/0x7b0 [ 1530.412757][ T4353] ext4_filemap_fault+0x4b/0x60 [ 1530.414052][ T4353] ? ext4_page_mkwrite+0xf20/0xf20 [ 1530.415456][ T4353] handle_mm_fault+0x128f/0x1a70 [ 1530.416335][ T4353] ? follow_page_mask+0x93f/0x1040 [ 1530.417842][ T4353] __get_user_pages+0x947/0xee0 [ 1530.419416][ T4353] get_user_pages_unlocked+0x3c8/0x5f0 [ 1530.421038][ T4353] __gup_longterm_unlocked+0x47/0x110 [ 1530.422879][ T4353] internal_get_user_pages_fast+0xfab/0x1130 [ 1530.424362][ T4353] get_user_pages_fast+0x5d/0x80 [ 1530.425766][ T4353] iov_iter_get_pages+0x1e9/0xcc0 [ 1530.427422][ T4353] ? kmem_cache_alloc+0x201/0x2f0 [ 1530.428503][ T4353] ? mempool_alloc_slab+0x16/0x20 [ 1530.430171][ T4353] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1530.432563][ T4353] ? kmem_cache_alloc+0x201/0x2f0 [ 1530.434437][ T4353] ? bio_alloc_bioset+0x27d/0x480 05:35:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f320000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:50 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\nrust\xe3c*sgrVid:De', 0x0) 05:35:50 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x14rust\xe3c*sgrVid:De', 0x0) [ 1530.436234][ T4353] iomap_dio_bio_actor+0x673/0xb50 [ 1530.438562][ T4353] iomap_dio_actor+0x26e/0x3b0 [ 1530.440018][ T4353] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1530.442173][ T4353] iomap_apply+0x1e2/0x400 [ 1530.443670][ T4353] __iomap_dio_rw+0x5af/0xad0 [ 1530.445158][ T4353] ? __iomap_dio_rw+0xad0/0xad0 [ 1530.446565][ T4353] iomap_dio_rw+0x30/0x70 [ 1530.448171][ T4353] ext4_file_read_iter+0x21a/0x290 [ 1530.449647][ T4353] aio_read+0x1c1/0x280 [ 1530.450875][ T4353] ? kmem_cache_alloc+0x201/0x2f0 [ 1530.452161][ T4353] io_submit_one+0x7fb/0x1350 [ 1530.453610][ T4353] __se_sys_io_submit+0xf5/0x260 [ 1530.455165][ T4353] __x64_sys_io_submit+0x3f/0x50 [ 1530.456667][ T4353] do_syscall_64+0x4a/0x90 [ 1530.458340][ T4353] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1530.460066][ T4353] RIP: 0033:0x4665d9 [ 1530.461417][ T4353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1530.467228][ T4353] RSP: 002b:00007f8cb2725188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1530.470312][ T4353] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1530.473185][ T4353] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1530.475722][ T4353] RBP: 00007f8cb27251d0 R08: 0000000000000000 R09: 0000000000000000 [ 1530.478142][ T4353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1530.480625][ T4353] R13: 00007ffd2fe767ef R14: 00007f8cb2725300 R15: 0000000000022000 [ 1530.488322][ T4375] loop4: detected capacity change from 0 to 184 05:35:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000019000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x1erust\xe3c*sgrVid:De', 0x0) [ 1530.539042][ T4385] loop3: detected capacity change from 0 to 512 [ 1530.542579][ T4385] EXT4-fs (loop3): Invalid log cluster size: 9472 05:35:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000002e0000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr#st\xe3c*sgrVid:De', 0x0) [ 1530.590163][ T4388] loop1: detected capacity change from 0 to 264192 [ 1530.616273][ T4388] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1530.623353][ T4399] loop3: detected capacity change from 0 to 512 [ 1530.632773][ T4399] EXT4-fs (loop3): Invalid log cluster size: 11776 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr%st\xe3c*sgrVid:De', 0x0) [ 1530.658729][ T4405] loop4: detected capacity change from 0 to 184 05:35:51 executing program 5 (fault-call:9 fault-nth:39): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f330000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1530.688470][ T4399] loop3: detected capacity change from 0 to 512 [ 1530.691740][ T4399] EXT4-fs (loop3): Invalid log cluster size: 11776 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr*st\xe3c*sgrVid:De', 0x0) 05:35:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000007340000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000020000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1530.778024][ T4419] loop1: detected capacity change from 0 to 264192 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr+st\xe3c*sgrVid:De', 0x0) [ 1530.815026][ T4419] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1530.827921][ T4426] loop3: detected capacity change from 0 to 512 [ 1530.840341][ T4433] FAULT_INJECTION: forcing a failure. [ 1530.840341][ T4433] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1530.845434][ T4433] CPU: 0 PID: 4433 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1530.847753][ T4433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.851367][ T4433] Call Trace: [ 1530.852558][ T4433] dump_stack+0x137/0x19d [ 1530.853944][ T4433] should_fail+0x23c/0x250 [ 1530.855569][ T4433] __alloc_pages+0x102/0x320 [ 1530.857348][ T4433] alloc_pages+0x21d/0x310 [ 1530.858821][ T4433] __page_cache_alloc+0x4d/0xf0 [ 1530.860553][ T4433] page_cache_ra_unbounded+0x1ae/0x410 [ 1530.861877][ T4433] ondemand_readahead+0x579/0x7b0 [ 1530.863381][ T4433] page_cache_async_ra+0x165/0x190 [ 1530.865079][ T4433] do_async_mmap_readahead+0x21a/0x260 [ 1530.866768][ T4433] filemap_fault+0x106/0x7b0 [ 1530.868340][ T4433] ext4_filemap_fault+0x4b/0x60 [ 1530.870074][ T4433] ? ext4_page_mkwrite+0xf20/0xf20 [ 1530.872164][ T4433] handle_mm_fault+0x128f/0x1a70 [ 1530.873740][ T4433] ? follow_page_mask+0x93f/0x1040 [ 1530.875126][ T4433] __get_user_pages+0x947/0xee0 [ 1530.876876][ T4433] get_user_pages_unlocked+0x135/0x5f0 [ 1530.878571][ T4433] __gup_longterm_unlocked+0x47/0x110 [ 1530.880388][ T4433] internal_get_user_pages_fast+0xfab/0x1130 [ 1530.882221][ T4433] get_user_pages_fast+0x5d/0x80 [ 1530.883856][ T4433] iov_iter_get_pages+0x1e9/0xcc0 [ 1530.885579][ T4433] ? kmem_cache_alloc+0x201/0x2f0 [ 1530.887096][ T4433] ? mempool_alloc_slab+0x16/0x20 [ 1530.888698][ T4433] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1530.890389][ T4433] ? kmem_cache_alloc+0x201/0x2f0 [ 1530.891845][ T4433] ? bio_alloc_bioset+0x27d/0x480 [ 1530.893352][ T4433] iomap_dio_bio_actor+0x673/0xb50 [ 1530.895014][ T4433] iomap_dio_actor+0x26e/0x3b0 [ 1530.896436][ T4433] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1530.897531][ T4433] iomap_apply+0x1e2/0x400 [ 1530.898587][ T4433] __iomap_dio_rw+0x5af/0xad0 [ 1530.900396][ T4433] ? __iomap_dio_rw+0xad0/0xad0 [ 1530.901853][ T4433] iomap_dio_rw+0x30/0x70 [ 1530.903201][ T4433] ext4_file_read_iter+0x21a/0x290 [ 1530.904177][ T4433] aio_read+0x1c1/0x280 [ 1530.905601][ T4433] ? kmem_cache_alloc+0x201/0x2f0 [ 1530.907118][ T4433] io_submit_one+0x7fb/0x1350 [ 1530.908985][ T4433] __se_sys_io_submit+0xf5/0x260 [ 1530.910426][ T4433] __x64_sys_io_submit+0x3f/0x50 [ 1530.912315][ T4433] do_syscall_64+0x4a/0x90 [ 1530.913840][ T4433] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1530.915861][ T4433] RIP: 0033:0x4665d9 [ 1530.917134][ T4433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1530.920987][ T4432] loop4: detected capacity change from 0 to 184 [ 1530.923813][ T4433] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1530.923835][ T4433] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1530.932647][ T4433] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1530.935217][ T4433] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1530.938013][ T4433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1530.940521][ T4433] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1530.942634][ T4426] EXT4-fs (loop3): Invalid log cluster size: 13319 05:35:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8001020000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f340000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr-st\xe3c*sgrVid:De', 0x0) [ 1530.975188][ T4426] loop3: detected capacity change from 0 to 512 [ 1530.977742][ T4426] EXT4-fs (loop3): Invalid log cluster size: 13319 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr.st\xe3c*sgrVid:De', 0x0) 05:35:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000003f0000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr0st\xe3c*sgrVid:De', 0x0) [ 1531.086539][ T4459] loop4: detected capacity change from 0 to 184 [ 1531.096705][ T4462] loop3: detected capacity change from 0 to 512 [ 1531.112003][ T4462] EXT4-fs (loop3): Invalid log cluster size: 16128 [ 1531.133720][ T4461] loop1: detected capacity change from 0 to 264192 05:35:51 executing program 5 (fault-call:9 fault-nth:40): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trLst\xe3c*sgrVid:De', 0x0) 05:35:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000022000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trXst\xe3c*sgrVid:De', 0x0) 05:35:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000400000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1531.136014][ T4461] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1531.152563][ T4462] loop3: detected capacity change from 0 to 512 [ 1531.175593][ T4462] EXT4-fs (loop3): Invalid log cluster size: 16128 05:35:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f350000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1531.234764][ T4488] loop4: detected capacity change from 0 to 184 [ 1531.238385][ T4490] loop3: detected capacity change from 0 to 512 [ 1531.252852][ T4490] EXT4-fs (loop3): Invalid log cluster size: 16384 [ 1531.274152][ T4496] FAULT_INJECTION: forcing a failure. [ 1531.274152][ T4496] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1531.276803][ T4496] CPU: 1 PID: 4496 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1531.278309][ T4496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1531.279885][ T4496] Call Trace: [ 1531.280593][ T4496] dump_stack+0x137/0x19d [ 1531.281334][ T4496] should_fail+0x23c/0x250 [ 1531.282178][ T4496] __alloc_pages+0x102/0x320 [ 1531.283169][ T4496] alloc_pages+0x21d/0x310 [ 1531.283844][ T4496] __page_cache_alloc+0x4d/0xf0 05:35:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800003f000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trcst\xe3c*sgrVid:De', 0x0) [ 1531.284744][ T4496] page_cache_ra_unbounded+0x1ae/0x410 [ 1531.285792][ T4496] ondemand_readahead+0x579/0x7b0 [ 1531.286608][ T4496] page_cache_async_ra+0x165/0x190 [ 1531.287396][ T4496] do_async_mmap_readahead+0x21a/0x260 [ 1531.288334][ T4496] filemap_fault+0x106/0x7b0 [ 1531.289109][ T4496] ext4_filemap_fault+0x4b/0x60 [ 1531.289832][ T4496] ? ext4_page_mkwrite+0xf20/0xf20 [ 1531.290641][ T4496] handle_mm_fault+0x128f/0x1a70 [ 1531.291602][ T4496] ? follow_page_mask+0x93f/0x1040 [ 1531.292446][ T4496] __get_user_pages+0x947/0xee0 [ 1531.293353][ T4496] get_user_pages_unlocked+0x135/0x5f0 [ 1531.294271][ T4496] __gup_longterm_unlocked+0x47/0x110 [ 1531.295502][ T4496] internal_get_user_pages_fast+0xfab/0x1130 [ 1531.296522][ T4496] get_user_pages_fast+0x5d/0x80 [ 1531.297539][ T4496] iov_iter_get_pages+0x1e9/0xcc0 [ 1531.298457][ T4496] ? kmem_cache_alloc+0x201/0x2f0 [ 1531.299508][ T4496] ? mempool_alloc_slab+0x16/0x20 [ 1531.300391][ T4496] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1531.301370][ T4496] ? kmem_cache_alloc+0x201/0x2f0 [ 1531.302174][ T4496] ? bio_alloc_bioset+0x27d/0x480 [ 1531.303121][ T4496] iomap_dio_bio_actor+0x673/0xb50 [ 1531.303951][ T4496] iomap_dio_actor+0x26e/0x3b0 [ 1531.305265][ T4496] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1531.306377][ T4496] iomap_apply+0x1e2/0x400 [ 1531.307324][ T4496] __iomap_dio_rw+0x5af/0xad0 [ 1531.308113][ T4496] ? __iomap_dio_rw+0xad0/0xad0 [ 1531.308977][ T4496] iomap_dio_rw+0x30/0x70 [ 1531.309695][ T4496] ext4_file_read_iter+0x21a/0x290 [ 1531.310703][ T4496] aio_read+0x1c1/0x280 [ 1531.311745][ T4496] ? kmem_cache_alloc+0x201/0x2f0 [ 1531.312870][ T4496] io_submit_one+0x7fb/0x1350 [ 1531.313925][ T4496] __se_sys_io_submit+0xf5/0x260 [ 1531.314852][ T4496] __x64_sys_io_submit+0x3f/0x50 [ 1531.315821][ T4496] do_syscall_64+0x4a/0x90 [ 1531.316548][ T4496] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1531.317763][ T4496] RIP: 0033:0x4665d9 [ 1531.318358][ T4496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1531.321615][ T4496] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1531.322904][ T4496] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1531.324282][ T4496] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1531.325482][ T4496] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1531.326824][ T4496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1531.328353][ T4496] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000480000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1531.359415][ T4490] loop3: detected capacity change from 0 to 512 [ 1531.361161][ T4490] EXT4-fs (loop3): Invalid log cluster size: 16384 [ 1531.364541][ T4499] loop1: detected capacity change from 0 to 264192 [ 1531.370681][ T4499] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trdst\xe3c*sgrVid:De', 0x0) 05:35:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f360000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1531.413877][ T4509] loop4: detected capacity change from 0 to 184 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trhst\xe3c*sgrVid:De', 0x0) [ 1531.448234][ T4517] loop3: detected capacity change from 0 to 512 [ 1531.470358][ T4517] EXT4-fs (loop3): Invalid log cluster size: 18432 05:35:51 executing program 5 (fault-call:9 fault-nth:41): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:51 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trist\xe3c*sgrVid:De', 0x0) 05:35:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000040000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:52 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trlst\xe3c*sgrVid:De', 0x0) 05:35:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f370000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1531.492973][ T4524] loop1: detected capacity change from 0 to 264192 [ 1531.498059][ T4524] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1531.529541][ T4517] loop3: detected capacity change from 0 to 512 [ 1531.531625][ T4517] EXT4-fs (loop3): Invalid log cluster size: 18432 05:35:52 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trost\xe3c*sgrVid:De', 0x0) 05:35:52 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trpst\xe3c*sgrVid:De', 0x0) 05:35:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000004c0000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1531.587842][ T4544] loop4: detected capacity change from 0 to 184 05:35:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000376000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1531.613778][ T4552] FAULT_INJECTION: forcing a failure. [ 1531.613778][ T4552] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1531.616938][ T4552] CPU: 0 PID: 4552 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1531.618543][ T4552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1531.620412][ T4552] Call Trace: [ 1531.620977][ T4552] dump_stack+0x137/0x19d [ 1531.622005][ T4552] should_fail+0x23c/0x250 [ 1531.622735][ T4552] __alloc_pages+0x102/0x320 [ 1531.623620][ T4552] alloc_pages+0x21d/0x310 [ 1531.624352][ T4552] __page_cache_alloc+0x4d/0xf0 [ 1531.625114][ T4552] page_cache_ra_unbounded+0x1ae/0x410 [ 1531.626084][ T4552] ondemand_readahead+0x579/0x7b0 [ 1531.627025][ T4552] page_cache_async_ra+0x165/0x190 [ 1531.628083][ T4552] do_async_mmap_readahead+0x21a/0x260 [ 1531.629275][ T4552] filemap_fault+0x106/0x7b0 [ 1531.630218][ T4552] ext4_filemap_fault+0x4b/0x60 [ 1531.631016][ T4552] ? ext4_page_mkwrite+0xf20/0xf20 [ 1531.631859][ T4552] handle_mm_fault+0x128f/0x1a70 [ 1531.632649][ T4552] ? follow_page_mask+0x93f/0x1040 [ 1531.633726][ T4552] __get_user_pages+0x947/0xee0 [ 1531.634578][ T4552] get_user_pages_unlocked+0x135/0x5f0 [ 1531.636152][ T4552] __gup_longterm_unlocked+0x47/0x110 [ 1531.637065][ T4552] internal_get_user_pages_fast+0xfab/0x1130 [ 1531.638155][ T4552] get_user_pages_fast+0x5d/0x80 [ 1531.638941][ T4552] iov_iter_get_pages+0x1e9/0xcc0 [ 1531.639768][ T4552] ? kmem_cache_alloc+0x201/0x2f0 [ 1531.640785][ T4552] ? mempool_alloc_slab+0x16/0x20 [ 1531.641725][ T4552] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1531.642638][ T4552] ? kmem_cache_alloc+0x201/0x2f0 [ 1531.643489][ T4552] ? bio_alloc_bioset+0x27d/0x480 [ 1531.644330][ T4552] iomap_dio_bio_actor+0x673/0xb50 [ 1531.645190][ T4552] iomap_dio_actor+0x26e/0x3b0 [ 1531.646118][ T4552] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1531.647043][ T4552] iomap_apply+0x1e2/0x400 [ 1531.647715][ T4552] __iomap_dio_rw+0x5af/0xad0 [ 1531.648463][ T4552] ? __iomap_dio_rw+0xad0/0xad0 [ 1531.649358][ T4552] iomap_dio_rw+0x30/0x70 [ 1531.650142][ T4552] ext4_file_read_iter+0x21a/0x290 [ 1531.650978][ T4552] aio_read+0x1c1/0x280 [ 1531.651758][ T4552] ? kmem_cache_alloc+0x201/0x2f0 [ 1531.652668][ T4552] io_submit_one+0x7fb/0x1350 [ 1531.653332][ T4552] __se_sys_io_submit+0xf5/0x260 [ 1531.654107][ T4552] __x64_sys_io_submit+0x3f/0x50 [ 1531.654973][ T4552] do_syscall_64+0x4a/0x90 [ 1531.655726][ T4552] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1531.657198][ T4552] RIP: 0033:0x4665d9 [ 1531.657783][ T4552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1531.661162][ T4552] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 05:35:52 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trsst\xe3c*sgrVid:De', 0x0) [ 1531.662528][ T4552] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1531.664136][ T4552] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1531.665737][ T4552] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1531.667014][ T4552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1531.668509][ T4552] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1531.687862][ T4558] loop3: detected capacity change from 0 to 512 [ 1531.698151][ T4558] EXT4-fs (loop3): Invalid log cluster size: 19456 05:35:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000600000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:52 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trtst\xe3c*sgrVid:De', 0x0) [ 1531.727696][ T4565] loop4: detected capacity change from 0 to 184 [ 1531.735352][ T4567] loop1: detected capacity change from 0 to 264192 [ 1531.740822][ T4567] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1531.743380][ T4558] loop3: detected capacity change from 0 to 512 [ 1531.746356][ T4558] EXT4-fs (loop3): Invalid log cluster size: 19456 [ 1531.841013][ T4588] loop3: detected capacity change from 0 to 512 [ 1531.843597][ T4588] EXT4-fs (loop3): Invalid log cluster size: 24576 05:35:52 executing program 5 (fault-call:9 fault-nth:42): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000680000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000089000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f380000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:52 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trxst\xe3c*sgrVid:De', 0x0) [ 1531.880767][ T4588] loop3: detected capacity change from 0 to 512 [ 1531.883204][ T4588] EXT4-fs (loop3): Invalid log cluster size: 24576 05:35:52 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trzst\xe3c*sgrVid:De', 0x0) 05:35:52 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tru%t\xe3c*sgrVid:De', 0x0) [ 1531.919322][ T4600] loop1: detected capacity change from 0 to 264192 [ 1531.922473][ T4600] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1531.924482][ T4601] loop4: detected capacity change from 0 to 184 05:35:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80002ea000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1532.013991][ T4617] FAULT_INJECTION: forcing a failure. [ 1532.013991][ T4617] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1532.016688][ T4617] CPU: 0 PID: 4617 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1532.018348][ T4617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1532.020043][ T4617] Call Trace: [ 1532.020776][ T4617] dump_stack+0x137/0x19d [ 1532.021835][ T4617] should_fail+0x23c/0x250 [ 1532.022703][ T4617] __alloc_pages+0x102/0x320 [ 1532.023525][ T4617] alloc_pages+0x21d/0x310 [ 1532.024472][ T4617] __page_cache_alloc+0x4d/0xf0 [ 1532.025520][ T4617] page_cache_ra_unbounded+0x1ae/0x410 [ 1532.026678][ T4617] ondemand_readahead+0x579/0x7b0 [ 1532.027511][ T4617] page_cache_async_ra+0x165/0x190 [ 1532.028436][ T4617] do_async_mmap_readahead+0x21a/0x260 [ 1532.029365][ T4617] filemap_fault+0x106/0x7b0 [ 1532.030223][ T4617] ext4_filemap_fault+0x4b/0x60 [ 1532.031261][ T4617] ? ext4_page_mkwrite+0xf20/0xf20 [ 1532.032207][ T4617] handle_mm_fault+0x128f/0x1a70 [ 1532.033094][ T4617] ? follow_page_mask+0x93f/0x1040 [ 1532.034247][ T4617] __get_user_pages+0x947/0xee0 [ 1532.035067][ T4617] get_user_pages_unlocked+0x135/0x5f0 [ 1532.036085][ T4617] __gup_longterm_unlocked+0x47/0x110 [ 1532.037153][ T4617] internal_get_user_pages_fast+0xfab/0x1130 [ 1532.038085][ T4617] get_user_pages_fast+0x5d/0x80 [ 1532.039031][ T4617] iov_iter_get_pages+0x1e9/0xcc0 [ 1532.039796][ T4617] ? kmem_cache_alloc+0x201/0x2f0 [ 1532.040633][ T4617] ? mempool_alloc_slab+0x16/0x20 [ 1532.041575][ T4617] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1532.042589][ T4617] ? kmem_cache_alloc+0x201/0x2f0 [ 1532.043490][ T4617] ? bio_alloc_bioset+0x27d/0x480 [ 1532.044383][ T4617] iomap_dio_bio_actor+0x673/0xb50 [ 1532.045378][ T4617] iomap_dio_actor+0x26e/0x3b0 [ 1532.046243][ T4617] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1532.047172][ T4617] iomap_apply+0x1e2/0x400 [ 1532.047918][ T4617] __iomap_dio_rw+0x5af/0xad0 [ 1532.048732][ T4617] ? __iomap_dio_rw+0xad0/0xad0 [ 1532.049466][ T4617] iomap_dio_rw+0x30/0x70 [ 1532.050251][ T4617] ext4_file_read_iter+0x21a/0x290 [ 1532.051099][ T4617] aio_read+0x1c1/0x280 [ 1532.051798][ T4617] ? kmem_cache_alloc+0x201/0x2f0 [ 1532.052620][ T4617] io_submit_one+0x7fb/0x1350 [ 1532.053486][ T4617] __se_sys_io_submit+0xf5/0x260 [ 1532.054292][ T4617] __x64_sys_io_submit+0x3f/0x50 [ 1532.055061][ T4617] do_syscall_64+0x4a/0x90 [ 1532.055810][ T4617] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1532.056904][ T4617] RIP: 0033:0x4665d9 [ 1532.057687][ T4617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1532.060695][ T4617] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1532.062075][ T4617] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1532.063281][ T4617] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1532.064632][ T4617] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1532.066002][ T4617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1532.067341][ T4617] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:52 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*%grVid:De', 0x0) 05:35:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f390000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1532.085219][ T4610] loop3: detected capacity change from 0 to 512 [ 1532.100925][ T4610] EXT4-fs (loop3): Invalid log cluster size: 26624 [ 1532.118937][ T4624] loop4: detected capacity change from 0 to 184 05:35:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800c0ed000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000006c0000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1532.150215][ T4610] loop3: detected capacity change from 0 to 512 [ 1532.156588][ T4610] EXT4-fs (loop3): Invalid log cluster size: 26624 [ 1532.182102][ T4633] loop1: detected capacity change from 0 to 264192 [ 1532.185808][ T4633] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1532.255665][ T4643] loop4: detected capacity change from 0 to 184 05:35:52 executing program 5 (fault-call:9 fault-nth:43): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:52 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrV%d:De', 0x0) 05:35:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f3a0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80002fb000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1532.275854][ T4645] loop3: detected capacity change from 0 to 512 [ 1532.285481][ T4645] EXT4-fs (loop3): Invalid log cluster size: 27648 05:35:52 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVed:De', 0x0) [ 1532.332405][ T4645] loop3: detected capacity change from 0 to 512 [ 1532.334203][ T4645] EXT4-fs (loop3): Invalid log cluster size: 27648 [ 1532.343437][ T4657] loop1: detected capacity change from 0 to 264192 05:35:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000740000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:52 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVi%:De', 0x0) [ 1532.383087][ T4657] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1532.394435][ T4669] loop4: detected capacity change from 0 to 184 [ 1532.434969][ T4666] FAULT_INJECTION: forcing a failure. [ 1532.434969][ T4666] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1532.437383][ T4666] CPU: 0 PID: 4666 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1532.439154][ T4666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1532.441010][ T4666] Call Trace: [ 1532.441728][ T4666] dump_stack+0x137/0x19d [ 1532.442581][ T4666] should_fail+0x23c/0x250 [ 1532.443361][ T4666] __alloc_pages+0x102/0x320 [ 1532.444253][ T4666] alloc_pages+0x21d/0x310 [ 1532.444990][ T4666] __page_cache_alloc+0x4d/0xf0 [ 1532.445812][ T4666] page_cache_ra_unbounded+0x1ae/0x410 [ 1532.446679][ T4666] ondemand_readahead+0x579/0x7b0 [ 1532.447655][ T4666] page_cache_async_ra+0x165/0x190 [ 1532.448587][ T4666] do_async_mmap_readahead+0x21a/0x260 [ 1532.449443][ T4666] filemap_fault+0x106/0x7b0 [ 1532.450230][ T4666] ext4_filemap_fault+0x4b/0x60 [ 1532.450961][ T4666] ? ext4_page_mkwrite+0xf20/0xf20 [ 1532.451989][ T4666] handle_mm_fault+0x128f/0x1a70 [ 1532.452905][ T4666] ? follow_page_mask+0x93f/0x1040 [ 1532.453751][ T4666] __get_user_pages+0x947/0xee0 [ 1532.454514][ T4666] get_user_pages_unlocked+0x135/0x5f0 [ 1532.455311][ T4666] __gup_longterm_unlocked+0x47/0x110 [ 1532.456627][ T4666] internal_get_user_pages_fast+0xfab/0x1130 [ 1532.457619][ T4666] get_user_pages_fast+0x5d/0x80 [ 1532.458498][ T4666] iov_iter_get_pages+0x1e9/0xcc0 [ 1532.459427][ T4666] ? kmem_cache_alloc+0x201/0x2f0 [ 1532.460297][ T4666] ? mempool_alloc_slab+0x16/0x20 [ 1532.461468][ T4666] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1532.462769][ T4666] ? kmem_cache_alloc+0x201/0x2f0 [ 1532.463645][ T4666] ? bio_alloc_bioset+0x27d/0x480 [ 1532.464543][ T4666] iomap_dio_bio_actor+0x673/0xb50 [ 1532.465460][ T4666] iomap_dio_actor+0x26e/0x3b0 [ 1532.466314][ T4666] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1532.467322][ T4666] iomap_apply+0x1e2/0x400 [ 1532.468096][ T4666] __iomap_dio_rw+0x5af/0xad0 [ 1532.468872][ T4666] ? __iomap_dio_rw+0xad0/0xad0 [ 1532.469621][ T4666] iomap_dio_rw+0x30/0x70 [ 1532.472027][ T4666] ext4_file_read_iter+0x21a/0x290 [ 1532.473224][ T4666] aio_read+0x1c1/0x280 [ 1532.473998][ T4666] ? kmem_cache_alloc+0x201/0x2f0 [ 1532.474904][ T4666] io_submit_one+0x7fb/0x1350 [ 1532.476098][ T4666] __se_sys_io_submit+0xf5/0x260 [ 1532.476906][ T4666] __x64_sys_io_submit+0x3f/0x50 [ 1532.477793][ T4666] do_syscall_64+0x4a/0x90 [ 1532.478438][ T4666] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1532.479720][ T4666] RIP: 0033:0x4665d9 [ 1532.480658][ T4666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1532.483748][ T4666] RSP: 002b:00007f8cb2725188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1532.485268][ T4666] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1532.486674][ T4666] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1532.487928][ T4666] RBP: 00007f8cb27251d0 R08: 0000000000000000 R09: 0000000000000000 [ 1532.490067][ T4666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1532.491496][ T4666] R13: 00007ffd2fe767ef R14: 00007f8cb2725300 R15: 0000000000022000 [ 1532.529596][ T4684] loop3: detected capacity change from 0 to 512 05:35:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800fffe000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f3b0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1532.550120][ T4684] EXT4-fs (loop3): Invalid log cluster size: 29696 05:35:53 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:D%', 0x0) 05:35:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000007a0000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000fff000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1532.627172][ T4693] loop4: detected capacity change from 0 to 184 [ 1532.630520][ T4696] loop1: detected capacity change from 0 to 264192 [ 1532.639807][ T4696] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1532.673720][ T4706] loop3: detected capacity change from 0 to 512 [ 1532.678567][ T4706] EXT4-fs (loop3): Invalid log cluster size: 31232 [ 1532.717656][ T4714] loop4: detected capacity change from 0 to 184 05:35:53 executing program 5 (fault-call:9 fault-nth:44): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:53 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r1 = request_key(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f00000000c0)='\x00', r1) 05:35:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f3c0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000c0ed0000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800feff000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:53 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="1007816167dad3ddc5080a21d26f950016835ac26cd517177c0a9b2894733882d952c00c6ea34573c7d76b9e774d7b608d8b86e1cab1975137735935646bd1", 0x3f, r0) [ 1532.813573][ T4727] loop3: detected capacity change from 0 to 512 [ 1532.817423][ T4727] EXT4-fs (loop3): Invalid log cluster size: 60864 [ 1532.825703][ T4731] loop4: detected capacity change from 0 to 184 [ 1532.831890][ T4729] loop1: detected capacity change from 0 to 264192 [ 1532.844923][ T4727] loop3: detected capacity change from 0 to 512 [ 1532.849210][ T4727] EXT4-fs (loop3): Invalid log cluster size: 60864 [ 1532.863282][ T4729] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f00000400000000000000000fff0000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000040000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1532.923139][ T4751] FAULT_INJECTION: forcing a failure. [ 1532.923139][ T4751] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1532.925844][ T4751] CPU: 1 PID: 4751 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1532.927540][ T4751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1532.929591][ T4751] Call Trace: [ 1532.930202][ T4751] dump_stack+0x137/0x19d [ 1532.931265][ T4751] should_fail+0x23c/0x250 [ 1532.932082][ T4751] __alloc_pages+0x102/0x320 [ 1532.933065][ T4751] alloc_pages+0x21d/0x310 [ 1532.933853][ T4751] __page_cache_alloc+0x4d/0xf0 [ 1532.934756][ T4751] page_cache_ra_unbounded+0x1ae/0x410 [ 1532.935779][ T4751] ondemand_readahead+0x579/0x7b0 [ 1532.936690][ T4751] page_cache_async_ra+0x165/0x190 [ 1532.937508][ T4751] do_async_mmap_readahead+0x21a/0x260 [ 1532.938550][ T4751] filemap_fault+0x106/0x7b0 [ 1532.939493][ T4751] ext4_filemap_fault+0x4b/0x60 [ 1532.940500][ T4751] ? ext4_page_mkwrite+0xf20/0xf20 [ 1532.941324][ T4751] handle_mm_fault+0x128f/0x1a70 [ 1532.942230][ T4751] ? follow_page_mask+0x93f/0x1040 [ 1532.943136][ T4751] __get_user_pages+0x947/0xee0 [ 1532.944081][ T4751] get_user_pages_unlocked+0x135/0x5f0 [ 1532.945048][ T4751] __gup_longterm_unlocked+0x47/0x110 [ 1532.946066][ T4751] internal_get_user_pages_fast+0xfab/0x1130 [ 1532.947189][ T4751] get_user_pages_fast+0x5d/0x80 [ 1532.948063][ T4751] iov_iter_get_pages+0x1e9/0xcc0 [ 1532.949308][ T4751] ? kmem_cache_alloc+0x201/0x2f0 [ 1532.950207][ T4751] ? mempool_alloc_slab+0x16/0x20 [ 1532.951139][ T4751] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1532.952068][ T4751] ? kmem_cache_alloc+0x201/0x2f0 [ 1532.953276][ T4751] ? bio_alloc_bioset+0x27d/0x480 [ 1532.954351][ T4751] iomap_dio_bio_actor+0x673/0xb50 [ 1532.955355][ T4751] iomap_dio_actor+0x26e/0x3b0 [ 1532.956338][ T4751] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1532.957257][ T4751] iomap_apply+0x1e2/0x400 [ 1532.958023][ T4751] __iomap_dio_rw+0x5af/0xad0 [ 1532.958918][ T4751] ? __iomap_dio_rw+0xad0/0xad0 [ 1532.959935][ T4751] iomap_dio_rw+0x30/0x70 [ 1532.960811][ T4751] ext4_file_read_iter+0x21a/0x290 [ 1532.962076][ T4751] aio_read+0x1c1/0x280 [ 1532.962970][ T4751] ? kmem_cache_alloc+0x201/0x2f0 [ 1532.963945][ T4751] io_submit_one+0x7fb/0x1350 [ 1532.964898][ T4751] __se_sys_io_submit+0xf5/0x260 [ 1532.965999][ T4751] __x64_sys_io_submit+0x3f/0x50 [ 1532.966913][ T4751] do_syscall_64+0x4a/0x90 [ 1532.967724][ T4751] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1532.968799][ T4751] RIP: 0033:0x4665d9 [ 1532.969385][ T4751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:35:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f3d0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:53 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1e, r0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "81a4da4ed040dbaea7c664987c86abf8e1a4eefac3b461e87e52c7c93cdbdb8f512e38b1fa46a25360bb8722e524a594f91bb40fe8167f9c4987fbc6bfd7abd3", 0x31}, 0x48, r0) [ 1532.972589][ T4751] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1532.974257][ T4751] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1532.975592][ T4751] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1532.977037][ T4751] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1532.978286][ T4751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1532.979955][ T4751] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1533.019817][ T4754] loop3: detected capacity change from 0 to 512 [ 1533.034044][ T4754] EXT4-fs (loop3): Invalid log cluster size: 65295 05:35:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000400002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:53 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$describe(0x6, r0, &(0x7f0000000140)=""/175, 0xaf) keyctl$KEYCTL_RESTRICT_KEYRING(0x1e, r1, 0x0, 0x0) r2 = add_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) r3 = request_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='!\x00', 0xfffffffffffffffd) keyctl$instantiate(0xc, r3, &(0x7f00000002c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', 'keyring\x00'}, 0x1e, r1) keyctl$search(0xa, r1, &(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x0}, r2) [ 1533.066070][ T4754] loop3: detected capacity change from 0 to 512 [ 1533.074464][ T4754] EXT4-fs (loop3): Invalid log cluster size: 65295 [ 1533.084992][ T4763] loop1: detected capacity change from 0 to 264192 [ 1533.088817][ T4763] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1533.092469][ T4766] loop4: detected capacity change from 0 to 184 05:35:53 executing program 5 (fault-call:9 fault-nth:45): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f3e0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000080000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r1, r0, 0x0) getdents(r0, &(0x7f0000000280)=""/200, 0xc8) tee(0xffffffffffffffff, r0, 0x7fffffff, 0x1) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1533.197023][ T4785] loop3: detected capacity change from 0 to 512 [ 1533.212421][ T4787] loop1: detected capacity change from 0 to 264192 [ 1533.213932][ T4785] EXT4-fs (loop3): Invalid log cluster size: 262144 [ 1533.263209][ T4787] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1533.279432][ T4785] loop3: detected capacity change from 0 to 512 [ 1533.279686][ T4796] loop4: detected capacity change from 0 to 184 [ 1533.290521][ T4785] EXT4-fs (loop3): Invalid log cluster size: 262144 [ 1533.294622][ T4806] FAULT_INJECTION: forcing a failure. [ 1533.294622][ T4806] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1533.297047][ T4806] CPU: 0 PID: 4806 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1533.298461][ T4806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1533.300414][ T4806] Call Trace: [ 1533.300973][ T4806] dump_stack+0x137/0x19d [ 1533.301936][ T4806] should_fail+0x23c/0x250 [ 1533.302645][ T4806] __alloc_pages+0x102/0x320 [ 1533.303487][ T4806] alloc_pages+0x21d/0x310 [ 1533.304210][ T4806] __page_cache_alloc+0x4d/0xf0 [ 1533.305106][ T4806] page_cache_ra_unbounded+0x1ae/0x410 [ 1533.305957][ T4806] ondemand_readahead+0x579/0x7b0 [ 1533.306789][ T4806] page_cache_async_ra+0x165/0x190 [ 1533.307848][ T4806] do_async_mmap_readahead+0x21a/0x260 [ 1533.308907][ T4806] filemap_fault+0x106/0x7b0 [ 1533.309750][ T4806] ext4_filemap_fault+0x4b/0x60 [ 1533.310746][ T4806] ? ext4_page_mkwrite+0xf20/0xf20 [ 1533.311698][ T4806] handle_mm_fault+0x128f/0x1a70 05:35:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f480000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f0000040000000000000000ffffe000002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1533.312567][ T4806] ? follow_page_mask+0x93f/0x1040 [ 1533.313437][ T4806] __get_user_pages+0x947/0xee0 [ 1533.314319][ T4806] get_user_pages_unlocked+0x135/0x5f0 [ 1533.315264][ T4806] __gup_longterm_unlocked+0x47/0x110 [ 1533.316167][ T4806] internal_get_user_pages_fast+0xfab/0x1130 [ 1533.317165][ T4806] get_user_pages_fast+0x5d/0x80 [ 1533.318097][ T4806] iov_iter_get_pages+0x1e9/0xcc0 [ 1533.318840][ T4806] ? kmem_cache_alloc+0x201/0x2f0 [ 1533.319672][ T4806] ? mempool_alloc_slab+0x16/0x20 [ 1533.320707][ T4806] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1533.323158][ T4806] ? kmem_cache_alloc+0x201/0x2f0 [ 1533.324189][ T4806] ? bio_alloc_bioset+0x27d/0x480 [ 1533.325135][ T4806] iomap_dio_bio_actor+0x673/0xb50 [ 1533.326074][ T4806] iomap_dio_actor+0x26e/0x3b0 [ 1533.326882][ T4806] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1533.327823][ T4806] iomap_apply+0x1e2/0x400 [ 1533.328650][ T4806] __iomap_dio_rw+0x5af/0xad0 [ 1533.329413][ T4806] ? __iomap_dio_rw+0xad0/0xad0 [ 1533.330287][ T4806] iomap_dio_rw+0x30/0x70 [ 1533.331128][ T4806] ext4_file_read_iter+0x21a/0x290 [ 1533.331971][ T4806] aio_read+0x1c1/0x280 [ 1533.332721][ T4806] ? kmem_cache_alloc+0x201/0x2f0 [ 1533.333582][ T4806] io_submit_one+0x7fb/0x1350 [ 1533.334390][ T4806] __se_sys_io_submit+0xf5/0x260 [ 1533.335239][ T4806] __x64_sys_io_submit+0x3f/0x50 [ 1533.336202][ T4806] do_syscall_64+0x4a/0x90 [ 1533.337328][ T4806] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1533.338309][ T4806] RIP: 0033:0x4665d9 [ 1533.338979][ T4806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1533.342193][ T4806] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1533.343574][ T4806] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1533.344952][ T4806] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1533.346120][ T4806] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1533.347839][ T4806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1533.349080][ T4806] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b80000000c0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1533.404618][ T4815] loop1: detected capacity change from 0 to 264192 [ 1533.410810][ T4817] loop3: detected capacity change from 0 to 512 [ 1533.413954][ T4815] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1533.421745][ T4817] EXT4-fs (loop3): Invalid log cluster size: 14745599 05:35:53 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1e, r0, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000040)='R\tru\x8at\xe3c\xf8)\xf9m\xc9\xed43a\xef\xda\x98\xf3\xa8\xc9\xfd\x82\x13{g\x16Y\a\x9b\xb6\x95\xb2\xcd\xf8C\xfe\xe0w@kv \xf6\x80O\xb6\x00\x00\xe8B\xcc\x06\x11\xe7\xf6\xb7\xb8\x9fEB\xc6o\x87\xe7\x8f\xbdpI\rRig\x9c\xd8,\x9c\x12\xc8\a\x99\xc1\xc5%\xa1a8\xca3\x9a,\xe1s\xb6\x8c\x02\\\xde\x13>}\v\xeb8\x89\xb7\x93\xd3Ve}\xff\xef\xf8\x82\xe7\xbdf\x06\xe4\x16\t\x98\xe5\xc6WqDt])n\x96Z\v!\x98\xdebO\x19\xda]\x83\x18\xf4;\xac\x84\xf1O\xe3\xdfe\x8b$\x84\xf2\x93~KF\xce(\x04d\x13\x1b\x04/t!\xe0\xdat\xc0\xdc\xb1\x00\xec\xa0;\x85\xcb\xfd\xae\x9a\xff\xcd\xdd\xdb\xdfs\xdbs\xa9\x8a>\xa3\x9d7\x85AC\x16\x9a$_\n\x88\xafxY\x97mHtd?\x0e\xe1l\xde\xae6\x966\xcdF\xe4R\x04\x19\xf9', r0) 05:35:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f4c0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1533.463554][ T4825] loop4: detected capacity change from 0 to 184 [ 1533.465363][ T4817] loop3: detected capacity change from 0 to 512 [ 1533.470219][ T4817] EXT4-fs (loop3): Invalid log cluster size: 14745599 05:35:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000001002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b800ffff1f0000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:54 executing program 0: ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) keyctl$read(0xb, 0x0, &(0x7f0000000080)=""/4096, 0x1000) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 05:35:54 executing program 5 (fault-call:9 fault-nth:46): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f600000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1533.561898][ T4838] loop1: detected capacity change from 0 to 264192 [ 1533.567457][ T4838] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1533.584761][ T4844] loop3: detected capacity change from 0 to 512 [ 1533.590122][ T4844] EXT4-fs (loop3): Invalid log cluster size: 16777216 [ 1533.595497][ T4848] loop4: detected capacity change from 0 to 184 05:35:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000400000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R*sgrVid:D\\\x00\x00\x00\x00\x00\x00\x00', r0) [ 1533.652793][ T4844] loop3: detected capacity change from 0 to 512 [ 1533.662620][ T4844] EXT4-fs (loop3): Invalid log cluster size: 16777216 05:35:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000002002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f680000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1533.699893][ T4862] loop1: detected capacity change from 0 to 264192 [ 1533.711539][ T4862] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1533.727367][ T4871] loop4: detected capacity change from 0 to 184 [ 1533.773608][ T4875] FAULT_INJECTION: forcing a failure. [ 1533.773608][ T4875] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1533.776402][ T4875] CPU: 1 PID: 4875 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1533.777802][ T4875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1533.784249][ T4875] Call Trace: [ 1533.784737][ T4875] dump_stack+0x137/0x19d [ 1533.785522][ T4875] should_fail+0x23c/0x250 [ 1533.786328][ T4875] __alloc_pages+0x102/0x320 [ 1533.787077][ T4875] alloc_pages+0x21d/0x310 [ 1533.787832][ T4875] __page_cache_alloc+0x4d/0xf0 [ 1533.788686][ T4875] page_cache_ra_unbounded+0x1ae/0x410 [ 1533.789872][ T4875] ondemand_readahead+0x579/0x7b0 [ 1533.790878][ T4875] page_cache_async_ra+0x165/0x190 [ 1533.791675][ T4875] do_async_mmap_readahead+0x21a/0x260 [ 1533.792637][ T4875] filemap_fault+0x106/0x7b0 [ 1533.793425][ T4875] ext4_filemap_fault+0x4b/0x60 [ 1533.794284][ T4875] ? ext4_page_mkwrite+0xf20/0xf20 [ 1533.795091][ T4875] handle_mm_fault+0x128f/0x1a70 [ 1533.795848][ T4875] ? follow_page_mask+0x93f/0x1040 [ 1533.796965][ T4875] __get_user_pages+0x947/0xee0 [ 1533.797760][ T4875] get_user_pages_unlocked+0x135/0x5f0 [ 1533.798682][ T4875] __gup_longterm_unlocked+0x47/0x110 [ 1533.799663][ T4875] internal_get_user_pages_fast+0xfab/0x1130 [ 1533.801119][ T4875] get_user_pages_fast+0x5d/0x80 [ 1533.802103][ T4875] iov_iter_get_pages+0x1e9/0xcc0 [ 1533.803123][ T4875] ? kmem_cache_alloc+0x201/0x2f0 [ 1533.804367][ T4875] ? mempool_alloc_slab+0x16/0x20 [ 1533.805246][ T4875] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1533.806195][ T4875] ? kmem_cache_alloc+0x201/0x2f0 [ 1533.807037][ T4875] ? bio_alloc_bioset+0x27d/0x480 [ 1533.807880][ T4875] iomap_dio_bio_actor+0x673/0xb50 [ 1533.808869][ T4875] iomap_dio_actor+0x26e/0x3b0 [ 1533.809600][ T4875] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1533.810608][ T4875] iomap_apply+0x1e2/0x400 [ 1533.811345][ T4875] __iomap_dio_rw+0x5af/0xad0 [ 1533.812179][ T4875] ? __iomap_dio_rw+0xad0/0xad0 [ 1533.813012][ T4875] iomap_dio_rw+0x30/0x70 [ 1533.813835][ T4875] ext4_file_read_iter+0x21a/0x290 [ 1533.814675][ T4875] aio_read+0x1c1/0x280 [ 1533.815359][ T4875] ? kmem_cache_alloc+0x201/0x2f0 [ 1533.816474][ T4875] io_submit_one+0x7fb/0x1350 [ 1533.817298][ T4875] __se_sys_io_submit+0xf5/0x260 [ 1533.818255][ T4875] __x64_sys_io_submit+0x3f/0x50 [ 1533.819090][ T4875] do_syscall_64+0x4a/0x90 [ 1533.819851][ T4875] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1533.820868][ T4875] RIP: 0033:0x4665d9 05:35:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000100b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:54 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000240), r2) sendmsg$NLBL_MGMT_C_REMOVE(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x20, r3, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x9, 0x1, '@:)[\x00'}]}, 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000001c0)={'wpan1\x00'}) sendmsg$NL802154_CMD_GET_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r0, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180), 0xffffffffffffffff) 05:35:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f6c0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1533.821564][ T4875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1533.824950][ T4875] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1533.826485][ T4875] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1533.827826][ T4875] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1533.829221][ T4875] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1533.830602][ T4875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1533.832003][ T4875] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 [ 1533.862201][ T4883] loop3: detected capacity change from 0 to 512 [ 1533.866476][ T4883] EXT4-fs (loop3): Invalid log cluster size: 33554432 05:35:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000200b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000402002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1533.887736][ T4884] loop4: detected capacity change from 0 to 184 05:35:54 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) r1 = request_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='keyring\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', 0xfffffffffffffffa) keyctl$invalidate(0x15, r1) add_key(&(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="46f5e1f40148abe6582f9572c292164cb1c6aae14c84a49236932ae53c5e71dbafeab296c6db3cc9d9989444b86be2c847a144c9a906598c3e36e9f47306a4a7fc0b53364fd7c6e8a3711c80f4cd2a1e4599237ee1411c105c00cdf118b387c31a4ebf0fbf6889e6b7bc95d2c6e4fb17dea3e7a4039da239833e77ac44df7b4e0c555e7e610ed2c8579837b882f706ee4bc823d3b3b997e41a765abefc70a6bb1bd8f262a2ddad9ab74c5dc9e5b148f9a909a5be0ade5b6489953068ee3475", 0xbf, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='%\x00', 0xfffffffffffffffa) [ 1533.934347][ T4897] loop1: detected capacity change from 0 to 264192 [ 1533.939567][ T4897] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1533.944769][ T4902] loop3: detected capacity change from 0 to 512 [ 1533.949638][ T4902] EXT4-fs (loop3): Invalid log cluster size: 33816576 05:35:54 executing program 5 (fault-call:9 fault-nth:47): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f740000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:54 executing program 0: request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='R\x1crust\xe3c*sg\x8bVid:De', 0xfffffffffffffffc) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000001fee)='R\x1crust\xe3c*sg\x8bVid:De', 0xfffffffffffffff8) 05:35:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000003002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1534.009260][ T4902] loop3: detected capacity change from 0 to 512 [ 1534.011875][ T4902] EXT4-fs (loop3): Invalid log cluster size: 33816576 [ 1534.016415][ T4911] loop4: detected capacity change from 0 to 184 05:35:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000040200b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000004002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:54 executing program 0: request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000000040)='R\trust\xe3c*sgrVid:De$l\xe8V{-V&\xad\xa3[-\xb6N\x13\xb6\xd9q\xc3t\xee\xe3\x87\xe9\xf6\xe3\xfa\xe2\xfc\xfd\xec\xdd\x81\xc1\xf4\x94\xcaf\xe4\xe2\xd6\xccL\x7fU', 0xfffffffffffffffa) r0 = add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="4742aa8ed49041219add28ff083729683906ddd10b4b36e1227a8e3a927f23", 0x1f, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r0) [ 1534.084596][ T4936] loop3: detected capacity change from 0 to 512 [ 1534.091944][ T4936] EXT4-fs (loop3): Invalid log cluster size: 50331648 [ 1534.096475][ T4933] loop1: detected capacity change from 0 to 264192 [ 1534.114915][ T4933] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1534.142510][ T4945] loop4: detected capacity change from 0 to 184 [ 1534.155278][ T4946] FAULT_INJECTION: forcing a failure. [ 1534.155278][ T4946] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1534.157676][ T4946] CPU: 1 PID: 4946 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1534.159394][ T4946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1534.161056][ T4946] Call Trace: [ 1534.161619][ T4946] dump_stack+0x137/0x19d [ 1534.162541][ T4946] should_fail+0x23c/0x250 [ 1534.163316][ T4946] __alloc_pages+0x102/0x320 [ 1534.164272][ T4946] alloc_pages+0x21d/0x310 [ 1534.165167][ T4946] __page_cache_alloc+0x4d/0xf0 [ 1534.166043][ T4946] page_cache_ra_unbounded+0x1ae/0x410 [ 1534.167026][ T4946] ondemand_readahead+0x579/0x7b0 [ 1534.167900][ T4946] page_cache_async_ra+0x165/0x190 [ 1534.168840][ T4946] do_async_mmap_readahead+0x21a/0x260 [ 1534.170041][ T4946] filemap_fault+0x106/0x7b0 [ 1534.170775][ T4946] ext4_filemap_fault+0x4b/0x60 [ 1534.171739][ T4946] ? ext4_page_mkwrite+0xf20/0xf20 [ 1534.173003][ T4946] handle_mm_fault+0x128f/0x1a70 [ 1534.173904][ T4946] ? follow_page_mask+0x93f/0x1040 [ 1534.174733][ T4946] __get_user_pages+0x947/0xee0 [ 1534.175556][ T4946] get_user_pages_unlocked+0x135/0x5f0 [ 1534.176685][ T4946] __gup_longterm_unlocked+0x47/0x110 [ 1534.177774][ T4946] internal_get_user_pages_fast+0xfab/0x1130 [ 1534.178892][ T4946] get_user_pages_fast+0x5d/0x80 [ 1534.181071][ T4946] iov_iter_get_pages+0x1e9/0xcc0 [ 1534.182601][ T4946] ? kmem_cache_alloc+0x201/0x2f0 [ 1534.184205][ T4946] ? mempool_alloc_slab+0x16/0x20 [ 1534.185958][ T4946] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1534.187609][ T4946] ? kmem_cache_alloc+0x201/0x2f0 [ 1534.189331][ T4946] ? bio_alloc_bioset+0x27d/0x480 05:35:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000300b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1534.190814][ T4946] iomap_dio_bio_actor+0x673/0xb50 [ 1534.192716][ T4946] iomap_dio_actor+0x26e/0x3b0 [ 1534.194331][ T4946] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1534.196301][ T4946] iomap_apply+0x1e2/0x400 [ 1534.197736][ T4946] __iomap_dio_rw+0x5af/0xad0 [ 1534.199481][ T4946] ? __iomap_dio_rw+0xad0/0xad0 [ 1534.201116][ T4946] iomap_dio_rw+0x30/0x70 [ 1534.202430][ T4946] ext4_file_read_iter+0x21a/0x290 [ 1534.204213][ T4946] aio_read+0x1c1/0x280 [ 1534.205649][ T4946] ? kmem_cache_alloc+0x201/0x2f0 [ 1534.207854][ T4946] io_submit_one+0x7fb/0x1350 [ 1534.209492][ T4946] __se_sys_io_submit+0xf5/0x260 [ 1534.211154][ T4946] __x64_sys_io_submit+0x3f/0x50 [ 1534.213023][ T4946] do_syscall_64+0x4a/0x90 [ 1534.214523][ T4946] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1534.216397][ T4946] RIP: 0033:0x4665d9 [ 1534.217864][ T4946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1534.224635][ T4946] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1534.227297][ T4946] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1534.229565][ T4946] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1534.232170][ T4946] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1534.234923][ T4946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1534.237554][ T4946] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f7a0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:54 executing program 0: request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000000000)='R\trust\xe3c*sgrVid:De', 0xfffffffffffffff9) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1e, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) [ 1534.263415][ T4947] loop3: detected capacity change from 0 to 512 [ 1534.268666][ T4947] EXT4-fs (loop3): Invalid log cluster size: 67108864 05:35:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000005002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000400b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) [ 1534.309571][ T4956] loop4: detected capacity change from 0 to 184 05:35:54 executing program 5 (fault-call:9 fault-nth:48): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:54 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x36, 0x34, 0x32, 0x61, 0x3f, 0x36, 0x36, 0x65, 0x38, 0x32, 0x62, 0x34, 0x31, 0x36, 0x34, 0x35]}, &(0x7f0000000100)={0x0, "8a17a83fe8ccd5cd48e816d7d1183c08dade1cd35a094cc7a3b86b8a79c3b652b57efd533882018f35b3190f038a0669270b900f35c7fd5beed6ec6bd676e3ba", 0x31}, 0x48, r0) keyctl$instantiate(0xc, r0, &(0x7f0000000000)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', 'R\trust\xe3c*sgrVid:De'}, 0x28, 0xfffffffffffffff9) 05:35:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000006002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1534.359658][ T4971] loop3: detected capacity change from 0 to 512 [ 1534.364787][ T4971] EXT4-fs (loop3): Invalid log cluster size: 83886080 [ 1534.373697][ T4968] loop1: detected capacity change from 0 to 264192 [ 1534.377868][ T4968] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000ffe0000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1534.426474][ T4987] loop3: detected capacity change from 0 to 512 [ 1534.435381][ T4987] EXT4-fs (loop3): Invalid log cluster size: 100663296 [ 1534.449278][ T4993] loop4: detected capacity change from 0 to 184 [ 1534.465838][ T4999] loop1: detected capacity change from 0 to 264192 05:35:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000406002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1534.480361][ T4999] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1534.504742][ T5006] FAULT_INJECTION: forcing a failure. [ 1534.504742][ T5006] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1534.509306][ T5006] CPU: 0 PID: 5006 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1534.512322][ T5006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1534.515772][ T5006] Call Trace: [ 1534.516901][ T5006] dump_stack+0x137/0x19d [ 1534.518452][ T5006] should_fail+0x23c/0x250 [ 1534.519768][ T5006] __alloc_pages+0x102/0x320 [ 1534.521433][ T5006] alloc_pages+0x21d/0x310 [ 1534.522899][ T5006] __page_cache_alloc+0x4d/0xf0 [ 1534.524554][ T5006] page_cache_ra_unbounded+0x1ae/0x410 [ 1534.526465][ T5006] ondemand_readahead+0x579/0x7b0 [ 1534.528301][ T5006] page_cache_async_ra+0x165/0x190 [ 1534.530097][ T5006] do_async_mmap_readahead+0x21a/0x260 [ 1534.532095][ T5006] filemap_fault+0x106/0x7b0 [ 1534.533704][ T5006] ext4_filemap_fault+0x4b/0x60 [ 1534.535375][ T5006] ? ext4_page_mkwrite+0xf20/0xf20 [ 1534.537026][ T5006] handle_mm_fault+0x128f/0x1a70 [ 1534.538828][ T5006] ? follow_page_mask+0x93f/0x1040 [ 1534.540616][ T5006] __get_user_pages+0x947/0xee0 [ 1534.542180][ T5006] get_user_pages_unlocked+0x135/0x5f0 [ 1534.544269][ T5006] __gup_longterm_unlocked+0x47/0x110 [ 1534.545973][ T5006] internal_get_user_pages_fast+0xfab/0x1130 [ 1534.547808][ T5006] get_user_pages_fast+0x5d/0x80 [ 1534.549411][ T5006] iov_iter_get_pages+0x1e9/0xcc0 [ 1534.551248][ T5006] ? kmem_cache_alloc+0x201/0x2f0 [ 1534.552648][ T5006] ? mempool_alloc_slab+0x16/0x20 [ 1534.554488][ T5006] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1534.556441][ T5006] ? kmem_cache_alloc+0x201/0x2f0 [ 1534.557640][ T5006] ? bio_alloc_bioset+0x27d/0x480 [ 1534.559207][ T5006] iomap_dio_bio_actor+0x673/0xb50 [ 1534.560756][ T5006] iomap_dio_actor+0x26e/0x3b0 [ 1534.562228][ T5006] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1534.563870][ T5006] iomap_apply+0x1e2/0x400 [ 1534.565309][ T5006] __iomap_dio_rw+0x5af/0xad0 [ 1534.566197][ T5006] ? __iomap_dio_rw+0xad0/0xad0 [ 1534.567608][ T5006] iomap_dio_rw+0x30/0x70 [ 1534.568708][ T5006] ext4_file_read_iter+0x21a/0x290 [ 1534.570255][ T5006] aio_read+0x1c1/0x280 [ 1534.571753][ T5006] ? kmem_cache_alloc+0x201/0x2f0 [ 1534.573563][ T5006] io_submit_one+0x7fb/0x1350 [ 1534.575339][ T5006] __se_sys_io_submit+0xf5/0x260 [ 1534.577017][ T5006] __x64_sys_io_submit+0x3f/0x50 [ 1534.578652][ T5006] do_syscall_64+0x4a/0x90 [ 1534.580190][ T5006] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1534.582089][ T5006] RIP: 0033:0x4665d9 [ 1534.583253][ T5006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1534.589473][ T5006] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1534.592103][ T5006] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1534.594853][ T5006] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1534.597191][ T5006] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1534.600017][ T5006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 05:35:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000500b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0xffffc000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x44, &(0x7f0000000480)=""/111, &(0x7f0000000500)=0x6f) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x105a00, 0x0) dup3(r1, r0, 0x0) getdents(r0, &(0x7f0000000280)=""/200, 0xc8) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x10000, @empty, 0x1}, 0x1c) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x200, 0x4, &(0x7f0000000380)=[{&(0x7f0000000100)="94284d0efbb208039fe1e66be99581466be1c452b42302c26c8e7b35c2566831b74fd3d23c24062ed765b7f5e1ce09730c19fb3cf16b4deb344a9af6cdb906b6", 0x40, 0xfffffffffffffffe}, {&(0x7f0000000140)="a43519d0dc84e74c59ed9bf5959d3a9aeca9c9a6feecc098b500d6ab2569b2d0c6a8163cab62dcba9008826fd86a297914e10fff85b2af3b5c4891140a46bd9a35294e2a5b838ea16af64a1baa7c790cb43536ebfd2623f453d2a0", 0x5b, 0x5d}, {&(0x7f00000001c0)="10ee2dff3dd5b672fa6fb725dfc49c4a004adb5edada32", 0x17, 0x96db}, {&(0x7f0000000200)="cf261ff8e25d9a6f4a97cf2aeccaa9f7a5adc810809c633e985ba4cb0e82551158334c07fc7e73f2b9dad57c907620a0f935f5e40ab5e14f8c7d5f9f79cc29c6d4180c6d7a28363d2336db85972da245b130a76f5762484b8306251a120b71", 0x5f, 0x3}], 0x20000, &(0x7f0000000580)=ANY=[@ANYBLOB="643d10836830e5aebc6fe361acff51d18e4fafecb5b7f0623ffe6a55e75e557f8aafa4710f542dc06582bfb3aaed", @ANYRESHEX=0xee00, @ANYBLOB=',huge=never,huge=within_size,smackfstransmute=asymmetric\x00,smackfsdef=asymmetric\x00,\x00']) [ 1534.602960][ T5006] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000fde0100010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) [ 1534.629131][ T5007] loop3: detected capacity change from 0 to 512 [ 1534.632286][ T5007] EXT4-fs (loop3): Invalid log cluster size: 100925440 05:35:55 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='\xffb\xce\xd3st\xe3c*sgrVid:De', 0x0) 05:35:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000007002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1534.680724][ T5007] loop3: detected capacity change from 0 to 512 [ 1534.686122][ T5007] EXT4-fs (loop3): Invalid log cluster size: 100925440 [ 1534.692978][ T5018] loop4: detected capacity change from 0 to 184 [ 1534.718215][ T5028] loop1: detected capacity change from 0 to 264192 [ 1534.721263][ T5028] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 05:35:55 executing program 5 (fault-call:9 fault-nth:49): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000600b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000ff00100010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:55 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="54404fc86f1a0041165135bf8c21879c53cd4b8cabbef7ab291550900e688c7cfd94daedd740f78fe9cac7b5ebfc2dc0a9fdd20e07fbfd3d6e8ffa17d62986dc0056925f2ac37f34d4f5751acb80dc407af277cc7ac9d4c272f5042f0757223709dafe2fd00d4bd040f33c5e783c52aff388188933677e0e8dd050df32ec5366d831b15fe6db2cd1c58ec8d69e7b3fb5f1ae695a78f0436c094d3b38954f508f29484533477f699c31a3fd3ab7ea21d8e97d59563beb4f0839b1332d7d357af2e5afdabd81f1f9413ab703b7ebe076113812b746b35c5822f8ceb32c53", 0xdd, 0xfffffffffffffffd) 05:35:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000008002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) [ 1534.800397][ T5039] loop3: detected capacity change from 0 to 512 [ 1534.810464][ T5039] EXT4-fs (loop3): Invalid log cluster size: 117440512 [ 1534.860221][ T5051] loop4: detected capacity change from 0 to 184 [ 1534.867636][ T5054] loop1: detected capacity change from 0 to 264192 [ 1534.898177][ T5058] FAULT_INJECTION: forcing a failure. [ 1534.898177][ T5058] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1534.911450][ T5058] CPU: 1 PID: 5058 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 1534.920127][ T5058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1534.930395][ T5058] Call Trace: [ 1534.933913][ T5058] dump_stack+0x137/0x19d [ 1534.938329][ T5058] should_fail+0x23c/0x250 [ 1534.942950][ T5058] __alloc_pages+0x102/0x320 [ 1534.947550][ T5058] alloc_pages+0x21d/0x310 [ 1534.952064][ T5058] __page_cache_alloc+0x4d/0xf0 [ 1534.957041][ T5058] page_cache_ra_unbounded+0x1ae/0x410 [ 1534.962519][ T5058] ondemand_readahead+0x579/0x7b0 [ 1534.967538][ T5058] page_cache_async_ra+0x165/0x190 [ 1534.972653][ T5058] do_async_mmap_readahead+0x21a/0x260 [ 1534.978120][ T5058] filemap_fault+0x106/0x7b0 [ 1534.982741][ T5058] ext4_filemap_fault+0x4b/0x60 [ 1534.987638][ T5058] ? ext4_page_mkwrite+0xf20/0xf20 [ 1534.992762][ T5058] handle_mm_fault+0x128f/0x1a70 [ 1534.997830][ T5058] ? follow_page_mask+0x93f/0x1040 [ 1535.002957][ T5058] __get_user_pages+0x947/0xee0 [ 1535.007826][ T5058] get_user_pages_unlocked+0x135/0x5f0 [ 1535.013434][ T5058] __gup_longterm_unlocked+0x47/0x110 [ 1535.018856][ T5058] internal_get_user_pages_fast+0xfab/0x1130 [ 1535.024856][ T5058] get_user_pages_fast+0x5d/0x80 [ 1535.029814][ T5058] iov_iter_get_pages+0x1e9/0xcc0 [ 1535.034880][ T5058] ? kmem_cache_alloc+0x201/0x2f0 [ 1535.039988][ T5058] ? mempool_alloc_slab+0x16/0x20 [ 1535.045165][ T5058] bio_iov_iter_get_pages+0x4cf/0xb50 [ 1535.050610][ T5058] ? kmem_cache_alloc+0x201/0x2f0 [ 1535.055662][ T5058] ? bio_alloc_bioset+0x27d/0x480 [ 1535.060710][ T5058] iomap_dio_bio_actor+0x673/0xb50 [ 1535.065824][ T5058] iomap_dio_actor+0x26e/0x3b0 [ 1535.070605][ T5058] ? __filemap_fdatawait_range+0x17c/0x1b0 [ 1535.076477][ T5058] iomap_apply+0x1e2/0x400 [ 1535.080889][ T5058] __iomap_dio_rw+0x5af/0xad0 [ 1535.085583][ T5058] ? __iomap_dio_rw+0xad0/0xad0 [ 1535.090461][ T5058] iomap_dio_rw+0x30/0x70 [ 1535.094791][ T5058] ext4_file_read_iter+0x21a/0x290 [ 1535.099914][ T5058] aio_read+0x1c1/0x280 [ 1535.104078][ T5058] ? kmem_cache_alloc+0x201/0x2f0 [ 1535.109107][ T5058] io_submit_one+0x7fb/0x1350 [ 1535.113792][ T5058] __se_sys_io_submit+0xf5/0x260 [ 1535.118805][ T5058] __x64_sys_io_submit+0x3f/0x50 [ 1535.123746][ T5058] do_syscall_64+0x4a/0x90 [ 1535.128167][ T5058] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1535.134119][ T5058] RIP: 0033:0x4665d9 [ 1535.138011][ T5058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:35:55 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000080)='R\trust\xe3\x9b\x96\xce\x0f\x8d\xc1[c*sgrVid:De', 0x0) keyctl$update(0x2, r0, &(0x7f00000000c0)="74d1f6bbd21fd4a498f74a00b135dc4a125d6e320872a7649a552626b127e205495bcf99f9e014e35f68763975df34be0b2e1ef190412fcad24e298f55c37ba97019f17e72aaace7143a3701203f8fc2ccc4a5329c4d27414d8137b1c644b298fe30dc72f039d699f8e787ea7f1e75e3322a0c2cd69d51ec437185ae0ba44033b5f8345f1dcd8b474a91351a", 0x8c) 05:35:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000040600b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:55 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='}}.^(\\$:*:,{$\xe6-\x00', r0) 05:35:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r1, r0, 0x0) getdents(r0, &(0x7f0000000280)=""/200, 0xc8) lseek(r0, 0x4, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup3(r3, r2, 0x0) getdents(r2, &(0x7f0000000280)=""/200, 0xc8) r4 = inotify_init() dup2(r2, r4) r5 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='[&*%\x00', r5) 05:35:55 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000080)='R\trus\xff?\xc27wgrVid:De\xfe\x06e=f>di\xd8+\x92\xa1\x0f\'\xa8\xc6$\x87\x80|\x1b\r\xde\x98\xe9KJ\"\x8a|z\xdd\x89\x8b\xd5\x15\xdd\xe10\x80`rK\xe9c\x84\x8d\x9c\xba\xce\xdc\xa9\xa4\xb5\xeah\xa4\xf6\xa9A[\x1d\xe3-\xa8\xc6\xd4\x0f3\r\xa1\xeamo=8\x14\x12\x14\x94\xb1g\x18\xb8`-s\xc3i\xe3\x12 L\x8b\xac\xd4\xf2\x94\xb1\x9e,\xc9\x9c\xc7c\x90\xa0\xbdaR\xe2u\x8bh%\x97\x89\xab}\x1d8R>b\x0e\xbb\xba\x8aS\x11\xad\xcb\xb2\xf6*\xe2\xba\xc1 \x06,k+!I\xb4\x16\xec\x8c\xd2\rO,\x84T\xa1\xe8kdv\xc7\xe0\xc1\xf4\x05\xe9\x1d1\x02C\x87r\xe9\xa3\xdc\x14\x98;\ay\xb0fj\xd7\xb5Dl\'\x16\xaaJw\xd2\x02\x98g\xb6\xa0\b\xa3K\xd9:\x0f22\xe5\x0f\x82\xdeb\rp\x9a\xab\x02\x02j\xfc\xb1\x01\xe6Z\xdc\xb8\x17y\x9b3\xc4#\xc8\xb7R:\x96\xb9\xb0\x8e\xdd\xab\xe0\xe9\xba\xf3\xb9)\xf7\x0eJ+\xaf\x1f\x8do\xfa\x10\xec\xdby0\xff{\xa7\xc6Ee\xb7\xc3\t\xffp\xb1\xf3\x1e\xd8\xd6\x9d\x90\xf0=\xed\x14\xb9\x11\x8c', 0xfffffffffffffff9) [ 1535.157617][ T5058] RSP: 002b:00007f8cb2701188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1535.166033][ T5058] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 1535.174094][ T5058] RDX: 0000000020000540 RSI: 0000000000000008 RDI: 00007f8cb2702000 [ 1535.182070][ T5058] RBP: 00007f8cb27011d0 R08: 0000000000000000 R09: 0000000000000000 [ 1535.190044][ T5058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1535.198014][ T5058] R13: 00007ffd2fe767ef R14: 00007f8cb2701300 R15: 0000000000022000 05:35:55 executing program 0: request_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000001ffb)={'syz', 0x2}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) [ 1535.207931][ T5054] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 1535.233121][ T5060] loop3: detected capacity change from 0 to 512 05:35:55 executing program 0: request_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000000080)='R\xab \xeb\xb07st\xe3c*sgr\x00\x00\x00\x00', 0x0) [ 1535.281203][ T5060] EXT4-fs (loop3): Invalid log cluster size: 134217728 [ 1535.312002][ T5078] loop4: detected capacity change from 0 to 184 05:35:55 executing program 5 (fault-call:9 fault-nth:50): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000001700)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 05:35:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000700b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) 05:35:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000ff10100010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x80000001}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 05:35:55 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1e, r1, 0x0, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @auto=[0x62, 0x65, 0x39, 0x0, 0x30, 0x38, 0x37, 0x32, 0x62, 0x38, 0x33, 0x38, 0x63, 0x37, 0x38, 0x32]}, &(0x7f00000000c0)={0x0, "655a38401b88c6e9c49357c95794358de6895f9995b25ba5fb6c5c508e8995bd49f44f31188cffe876f4b454b745fd5d7b0df49e5e3cca652a11cee91ed56ace", 0xe1}, 0x48, r0) keyctl$unlink(0x9, r1, r2) [ 1535.371610][ T5060] loop3: detected capacity change from 0 to 512 [ 1535.383135][ T5060] EXT4-fs (loop3): Invalid log cluster size: 134217728 05:35:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000004000000000000000000000009002000000020000020000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)) 05:35:55 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) add_key(&(0x7f0000000000)='