ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[]) 13:56:15 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0xfffffff6) 13:56:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x800, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004105) syz_open_dev$tty1(0xc, 0x4, 0x1) [ 114.179479][ T9200] loop3: detected capacity change from 0 to 136 [ 114.205374][ T9200] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 114.246800][ T9217] FAULT_INJECTION: forcing a failure. [ 114.246800][ T9217] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 114.260135][ T9217] CPU: 1 PID: 9217 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 114.268507][ T9217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.278558][ T9217] Call Trace: [ 114.281837][ T9217] dump_stack+0x137/0x19d [ 114.286210][ T9217] should_fail+0x23c/0x250 [ 114.290627][ T9217] __alloc_pages_nodemask+0xe7/0x310 [ 114.295938][ T9217] alloc_pages_current+0x21d/0x310 [ 114.301031][ T9217] pte_alloc_one+0x29/0xb0 [ 114.305458][ T9217] __pte_alloc+0x2f/0x210 [ 114.309770][ T9217] copy_pte_range+0x128e/0x1460 [ 114.314670][ T9217] ? __alloc_pages_nodemask+0x17a/0x310 [ 114.320290][ T9217] copy_page_range+0x5ca/0x8d0 [ 114.325046][ T9217] ? __vma_link_rb+0x3c2/0x3e0 [ 114.329793][ T9217] ? up_write+0x25/0xc0 [ 114.333933][ T9217] dup_mmap+0x6bb/0x9d0 [ 114.338112][ T9217] dup_mm+0x7c/0x210 [ 114.341985][ T9217] copy_process+0x1203/0x2e00 [ 114.346678][ T9217] kernel_clone+0x14b/0x680 [ 114.351162][ T9217] __se_sys_clone3+0x194/0x1d0 [ 114.355980][ T9217] ? __cond_resched+0x11/0x40 [ 114.360676][ T9217] ? fput+0x2d/0x130 [ 114.364549][ T9217] ? ksys_write+0x157/0x180 [ 114.369036][ T9217] ? fpregs_assert_state_consistent+0x7d/0x90 [ 114.375088][ T9217] ? exit_to_user_mode_prepare+0x65/0x190 [ 114.380885][ T9217] __x64_sys_clone3+0x2d/0x40 [ 114.385544][ T9217] do_syscall_64+0x4a/0x90 [ 114.389947][ T9217] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 114.395893][ T9217] RIP: 0033:0x4665f9 [ 114.399781][ T9217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.419485][ T9217] RSP: 002b:00007f7130de4188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 114.427968][ T9217] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 114.435928][ T9217] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000080 13:56:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030", 0x5, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:15 executing program 1 (fault-call:1 fault-nth:91): set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 114.444122][ T9217] RBP: 00007f7130de41d0 R08: 0000000000000000 R09: 0000000000000000 [ 114.452074][ T9217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 114.460033][ T9217] R13: 00007ffd69a9f00f R14: 00007f7130de4300 R15: 0000000000022000 [ 114.485521][ T9221] loop5: detected capacity change from 0 to 136 [ 114.538130][ T9242] FAULT_INJECTION: forcing a failure. [ 114.538130][ T9242] name failslab, interval 1, probability 0, space 0, times 0 [ 114.544072][ T9239] loop4: detected capacity change from 0 to 264192 [ 114.550793][ T9242] CPU: 1 PID: 9242 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 114.550815][ T9242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.558905][ T9238] loop3: detected capacity change from 0 to 136 [ 114.565638][ T9242] Call Trace: [ 114.565648][ T9242] dump_stack+0x137/0x19d [ 114.565676][ T9242] should_fail+0x23c/0x250 [ 114.594193][ T9242] ? dup_mmap+0x39e/0x9d0 [ 114.598608][ T9242] __should_failslab+0x81/0x90 [ 114.603402][ T9242] should_failslab+0x5/0x20 [ 114.607905][ T9242] kmem_cache_alloc+0x46/0x2e0 [ 114.612727][ T9242] ? __vma_link_rb+0x3c2/0x3e0 [ 114.617487][ T9242] ? up_write+0x25/0xc0 [ 114.621718][ T9242] dup_mmap+0x39e/0x9d0 [ 114.625884][ T9242] dup_mm+0x7c/0x210 [ 114.629787][ T9242] copy_process+0x1203/0x2e00 [ 114.634460][ T9242] kernel_clone+0x14b/0x680 [ 114.638956][ T9242] __se_sys_clone3+0x194/0x1d0 [ 114.643712][ T9242] ? __cond_resched+0x11/0x40 [ 114.648396][ T9242] ? fput+0x2d/0x130 [ 114.652300][ T9242] ? ksys_write+0x157/0x180 [ 114.656920][ T9242] ? fpregs_assert_state_consistent+0x7d/0x90 [ 114.662987][ T9242] ? exit_to_user_mode_prepare+0x65/0x190 [ 114.668706][ T9242] __x64_sys_clone3+0x2d/0x40 [ 114.673382][ T9242] do_syscall_64+0x4a/0x90 [ 114.677794][ T9242] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 114.683715][ T9242] RIP: 0033:0x4665f9 13:56:16 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0xfffffffe) [ 114.687608][ T9242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.707212][ T9242] RSP: 002b:00007f7130de4188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 114.715630][ T9242] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 114.723620][ T9242] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000080 13:56:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000580), r0) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="0dac8b156c3c702b5c51df4d17ee6ad3c700006404200025c37000fddbdf250e0a98cb34000000"], 0x18}}, 0x4000400) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0000ffffff81000800000000000000024000ffffff81000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x800, 0x5, &(0x7f0000000680)=[{&(0x7f0000000100)="cf563c578fef3b3629924a9ba6bbfa624bf8282db1fb2de7266994d2ebf6133c4ee4314818448cca019093a0a02f7c4ac8d35f260784dde047899d6729e90a5186b584de12b67e334c9027b6ab2df295f06021af83684652bb1d88a8dc18eba8a4197253fad2e56288ef927d58af76f7622d2234ae2fb5ceec0adb5ad0fbd158ca41", 0x82, 0xb6b}, {&(0x7f00000001c0)="582eea443b69e870f3504434677ba3d34876ec8f1dbfa0f3bad779fff2bff941ee", 0x21, 0x5}, {&(0x7f0000000200)="87b4f2547aca628ae9b99fbe3d5be0af0998ec586eeb8c72271864fd91ac45b9d65765f5279890f4f8b35e4aaf22b819be4528be7bb1457983a4e9d56ef0a63df815bfe697c0e2af017137b4057f2e4183db99e96552157ba2ea8562bda51572ad14da", 0x63, 0x7}, {&(0x7f0000000280)="64ff0917b88971b825057aa5e20428da6861a617d74c562577722c29720a75adec389d3d8106cf3018643ef423fbc365e884584039ff9f6a98d0dc87b815d522b03ffaf5837a66e69718313f24cb3dde9b5b653267b4a19aab1826e07615efd7e63e47fe4ccef6299d8543294218e2c64586da8b43fc12d3c2cb9a6e964e542425a16e28bf2ba416ef4b46f6adccf12a3fef", 0x92, 0x8000}, {&(0x7f00000005c0)="0d91b5f433ca9be1f50e2a53e17c9c6d8c032ed32ddca17fb4b53ea071d4d23d34d2dca13c53d93c0cb8df4177b9f42c103dcbfa949219522028df142d8b009fc5c4688ab38a8f76f8ac67b804f144038ed12dac02c1f93442943975499310b276a4d82d5fd4800f802bccdcdd630c34202d10e1b212adad5646938f88a0e5e341e4a0f97c6e95cc3fd4f9160545460db978fdda33afac34dea2de375c03093680bd668d3783cc", 0xa7, 0xcad}], 0x80, &(0x7f00000003c0)=ANY=[@ANYBLOB="696f636861727365743d61736369690c757466383dffff6e6e6f6e756d7461696c3d312c7569643c", @ANYRESDEC=0xee00, @ANYBLOB=',dont_measure,measure,\x00']) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x4, 0x4, @fd_index=0x6, 0x4, 0x8000, 0x943, 0x1d, 0x0, {0x3}}, 0x3) syz_io_uring_submit(0x0, r2, &(0x7f0000000380)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x6) [ 114.731594][ T9242] RBP: 00007f7130de41d0 R08: 0000000000000000 R09: 0000000000000000 [ 114.739567][ T9242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 114.747537][ T9242] R13: 00007ffd69a9f00f R14: 00007f7130de4300 R15: 0000000000022000 13:56:16 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x1000000000) 13:56:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:16 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x40000000000) 13:56:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030", 0x5, 0x8800}], 0x0, &(0x7f0000000080)) [ 114.790507][ T9254] loop5: detected capacity change from 0 to 136 [ 114.793885][ T9238] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 114.818852][ T9239] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 114.855301][ T9260] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 114.863598][ T9260] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 114.888005][ T9239] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 114.895988][ T9272] loop5: detected capacity change from 0 to 136 13:56:16 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB]) 13:56:16 executing program 1 (fault-call:1 fault-nth:92): set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:16 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x1000000000000) 13:56:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 114.907354][ T9277] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 114.940099][ T9278] loop3: detected capacity change from 0 to 136 [ 114.955423][ T9277] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 114.971844][ T9260] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 114.980074][ T9260] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 114.988593][ T9278] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 115.020580][ T9294] FAULT_INJECTION: forcing a failure. [ 115.020580][ T9294] name failslab, interval 1, probability 0, space 0, times 0 [ 115.033312][ T9294] CPU: 0 PID: 9294 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 115.041684][ T9294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.051791][ T9294] Call Trace: [ 115.055065][ T9294] dump_stack+0x137/0x19d [ 115.059395][ T9294] should_fail+0x23c/0x250 [ 115.063825][ T9294] ? dup_mmap+0x39e/0x9d0 [ 115.068151][ T9294] __should_failslab+0x81/0x90 [ 115.072936][ T9294] should_failslab+0x5/0x20 [ 115.077570][ T9294] kmem_cache_alloc+0x46/0x2e0 [ 115.082335][ T9294] ? __vma_link_rb+0x3c2/0x3e0 [ 115.087132][ T9294] ? up_write+0x25/0xc0 [ 115.091279][ T9294] dup_mmap+0x39e/0x9d0 [ 115.095431][ T9294] dup_mm+0x7c/0x210 [ 115.099322][ T9294] copy_process+0x1203/0x2e00 [ 115.103998][ T9294] kernel_clone+0x14b/0x680 [ 115.108499][ T9294] __se_sys_clone3+0x194/0x1d0 [ 115.113282][ T9294] ? __cond_resched+0x11/0x40 [ 115.118122][ T9294] ? fput+0x2d/0x130 [ 115.122031][ T9294] ? ksys_write+0x157/0x180 [ 115.126532][ T9294] ? fpregs_assert_state_consistent+0x7d/0x90 [ 115.132601][ T9294] ? exit_to_user_mode_prepare+0x65/0x190 [ 115.138414][ T9294] __x64_sys_clone3+0x2d/0x40 [ 115.143178][ T9294] do_syscall_64+0x4a/0x90 [ 115.147591][ T9294] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 115.153484][ T9294] RIP: 0033:0x4665f9 [ 115.157453][ T9294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.177053][ T9294] RSP: 002b:00007f7130de4188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 115.185467][ T9294] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 115.193528][ T9294] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000080 [ 115.201493][ T9294] RBP: 00007f7130de41d0 R08: 0000000000000000 R09: 0000000000000000 [ 115.209478][ T9294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 13:56:16 executing program 1 (fault-call:1 fault-nth:93): set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in6=@dev={0xfe, 0x80, '\x00', 0xa}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x73, 0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000191000/0x1000)=nil, &(0x7f00001bd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f000058e000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f000054a000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00001c1000/0x3000)=nil, &(0x7f0000572000/0x2000)=nil, &(0x7f000034f000/0x4000)=nil, &(0x7f000043f000/0x1000)=nil, &(0x7f0000000280)="e7d862a10859e05acefdad33bbccc6346db6c9c70f0ff33e3f18b30589a1ddce0c464913607e56138fdebf4f7b54ad0bab6ee60dce0cba6ccd9779753c833fcffab0", 0x42, r1}, 0x68) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)={[{@dmode}, {@block={'block', 0x3d, 0x800}}]}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) readv(r2, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000040)}, {&(0x7f0000000180)=""/168, 0xa8}], 0x4) 13:56:16 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x4000000000000) 13:56:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 115.217447][ T9294] R13: 00007ffd69a9f00f R14: 00007f7130de4300 R15: 0000000000022000 [ 115.232901][ T9297] loop5: detected capacity change from 0 to 136 [ 115.240395][ T9301] loop4: detected capacity change from 0 to 264192 [ 115.254983][ T9301] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 115.298453][ T9301] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 115.328793][ T9317] FAULT_INJECTION: forcing a failure. [ 115.328793][ T9317] name failslab, interval 1, probability 0, space 0, times 0 13:56:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030", 0x5, 0x8800}], 0x0, &(0x7f0000000080)) [ 115.341449][ T9317] CPU: 0 PID: 9317 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 115.349798][ T9317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.359854][ T9317] Call Trace: [ 115.363138][ T9317] dump_stack+0x137/0x19d [ 115.367482][ T9317] should_fail+0x23c/0x250 [ 115.371905][ T9317] ? dup_mmap+0x39e/0x9d0 [ 115.372176][ T9325] loop3: detected capacity change from 0 to 136 [ 115.376238][ T9317] __should_failslab+0x81/0x90 [ 115.376280][ T9317] should_failslab+0x5/0x20 [ 115.391820][ T9317] kmem_cache_alloc+0x46/0x2e0 13:56:16 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x10000000000000) 13:56:16 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB]) [ 115.396590][ T9317] ? __vma_link_rb+0x3c2/0x3e0 [ 115.400918][ T9325] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 115.401354][ T9317] ? up_write+0x25/0xc0 [ 115.413564][ T9317] dup_mmap+0x39e/0x9d0 [ 115.417731][ T9317] dup_mm+0x7c/0x210 [ 115.421637][ T9317] copy_process+0x1203/0x2e00 [ 115.426388][ T9317] kernel_clone+0x14b/0x680 [ 115.430896][ T9317] __se_sys_clone3+0x194/0x1d0 [ 115.435670][ T9317] ? __cond_resched+0x11/0x40 [ 115.440356][ T9317] ? fput+0x2d/0x130 [ 115.444254][ T9317] ? ksys_write+0x157/0x180 [ 115.448779][ T9317] ? fpregs_assert_state_consistent+0x7d/0x90 [ 115.454912][ T9317] ? exit_to_user_mode_prepare+0x65/0x190 [ 115.460636][ T9317] __x64_sys_clone3+0x2d/0x40 [ 115.465344][ T9317] do_syscall_64+0x4a/0x90 [ 115.469762][ T9317] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 115.475763][ T9317] RIP: 0033:0x4665f9 [ 115.479853][ T9317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:56:16 executing program 1 (fault-call:1 fault-nth:94): set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 115.499707][ T9317] RSP: 002b:00007f7130de4188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 115.508122][ T9317] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 115.516137][ T9317] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000080 [ 115.524099][ T9317] RBP: 00007f7130de41d0 R08: 0000000000000000 R09: 0000000000000000 [ 115.532063][ T9317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 115.540027][ T9317] R13: 00007ffd69a9f00f R14: 00007f7130de4300 R15: 0000000000022000 13:56:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6}], 0x0, &(0x7f0000000080)) 13:56:16 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x40000000000000) 13:56:17 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x40040000000000) [ 115.630546][ T9334] loop5: detected capacity change from 0 to 136 [ 115.657442][ T9346] loop4: detected capacity change from 0 to 264192 [ 115.674176][ T9341] ISOFS: Unable to identify CD-ROM format. 13:56:17 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB]) [ 115.683284][ T9345] FAULT_INJECTION: forcing a failure. [ 115.683284][ T9345] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 115.696506][ T9345] CPU: 1 PID: 9345 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 115.699751][ T9346] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 115.704869][ T9345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.704884][ T9345] Call Trace: [ 115.704892][ T9345] dump_stack+0x137/0x19d [ 115.714647][ T9346] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 115.724100][ T9345] should_fail+0x23c/0x250 [ 115.724126][ T9345] __alloc_pages_nodemask+0xe7/0x310 [ 115.724145][ T9345] alloc_pages_current+0x21d/0x310 [ 115.756953][ T9345] pte_alloc_one+0x29/0xb0 [ 115.761350][ T9345] __pte_alloc+0x2f/0x210 [ 115.765677][ T9345] copy_pte_range+0x128e/0x1460 [ 115.770523][ T9345] ? __alloc_pages_nodemask+0x17a/0x310 [ 115.776046][ T9345] copy_page_range+0x5ca/0x8d0 [ 115.780789][ T9345] ? __vma_link_rb+0x3c2/0x3e0 [ 115.785530][ T9345] ? up_write+0x25/0xc0 [ 115.789666][ T9345] dup_mmap+0x6bb/0x9d0 [ 115.793838][ T9345] dup_mm+0x7c/0x210 [ 115.797729][ T9345] copy_process+0x1203/0x2e00 [ 115.802472][ T9345] kernel_clone+0x14b/0x680 [ 115.806955][ T9345] __se_sys_clone3+0x194/0x1d0 [ 115.811730][ T9345] ? __cond_resched+0x11/0x40 [ 115.816481][ T9345] ? fput+0x2d/0x130 [ 115.820360][ T9345] ? ksys_write+0x157/0x180 [ 115.824859][ T9345] ? fpregs_assert_state_consistent+0x7d/0x90 [ 115.830909][ T9345] ? exit_to_user_mode_prepare+0x65/0x190 [ 115.836606][ T9345] __x64_sys_clone3+0x2d/0x40 [ 115.841260][ T9345] do_syscall_64+0x4a/0x90 [ 115.845685][ T9345] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 115.851625][ T9345] RIP: 0033:0x4665f9 [ 115.855525][ T9345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.875119][ T9345] RSP: 002b:00007f7130de4188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 115.883534][ T9345] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 115.891504][ T9345] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000080 [ 115.899468][ T9345] RBP: 00007f7130de41d0 R08: 0000000000000000 R09: 0000000000000000 [ 115.907488][ T9345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 115.915487][ T9345] R13: 00007ffd69a9f00f R14: 00007f7130de4300 R15: 0000000000022000 [ 115.980487][ T9366] loop4: detected capacity change from 0 to 264192 [ 115.992017][ T9366] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 116.003566][ T9366] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 13:56:17 executing program 0: r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000001a0003041dfffd946f6105000214010a1f00ff050c100800080003000a000000", 0x24}], 0x1}, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000002740)={[0x80000000000]}, 0x8) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x9b3a3b4c1a530434, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r2, 0x8008330e, &(0x7f0000000100)) accept(r1, &(0x7f0000002780)=@phonet, &(0x7f0000002800)=0x80) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x104, 0x0, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0xbc, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0xfffffffffffffca1, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}]}, @ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0x104}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 13:56:17 executing program 1 (fault-call:1 fault-nth:95): set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6}], 0x0, &(0x7f0000000080)) 13:56:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:17 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x100000000000000) 13:56:17 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota,noquota,auto_da_alloc=0x00000']) 13:56:17 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x200000000000000) 13:56:17 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x300000000000000) [ 116.186737][ T9382] FAULT_INJECTION: forcing a failure. [ 116.186737][ T9382] name failslab, interval 1, probability 0, space 0, times 0 [ 116.193479][ T9383] ISOFS: Unable to identify CD-ROM format. [ 116.199393][ T9382] CPU: 0 PID: 9382 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 116.213461][ T9382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.223572][ T9382] Call Trace: [ 116.226878][ T9382] dump_stack+0x137/0x19d [ 116.231216][ T9382] should_fail+0x23c/0x250 13:56:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x4010, r2, 0x75c50000) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) sendmmsg(r3, &(0x7f00000021c0)=[{{&(0x7f0000000180)=@llc={0x1a, 0x306, 0x8, 0x7, 0x1, 0x3, @multicast}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000200)="aa743f7e18f9a7d306fdd2c988ef931633033239b957e52e5bf0be0f380f6ffd33036663cb225ddb6adcfffba6e71584d5b66b09942676bf5b93cde8b040e57ad0cd6e2f12456f", 0x47}, {&(0x7f0000000280)="b43fa91fc18c90f475515458b3c97467f0489a64f8a3c228e3e2eb861f4937373f614b336039f708df68a972a13c686db9fb63ef94e749a978b97e332f1455ef0278b84334a60bbbac39bb807775ab01f5507fec", 0x54}, {&(0x7f0000000100)="46a8eb8dd62afbc8fee64310e40fcd46774e404318acd7030b5247", 0x1b}, {&(0x7f0000000300)="7eafdabc4114f88899014ef10571fd4cb55c74f96f03d2bdd66a9f3598ddcc6ae0d7c0fb0c932ee17cd00d49287e13e77645f659fc5b689f4f39a644b65e411a1b3206d4229ac9b58aea878a63e7d2cd859d47aa9f503cc277bd120976587840e1b29e6108bfb4493d50ef", 0x6b}, {&(0x7f0000000380)="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", 0x1000}], 0x5, &(0x7f0000001400)}}, {{&(0x7f0000001440)=@can, 0x80, &(0x7f00000015c0)=[{&(0x7f00000014c0)="a6f9eddb798144c79ba4914ccc03749272f19102b12431cbbb2ccac04354fb528e8c86bf739a26d4a70a2b4d80b842dbaf23", 0x32}, {&(0x7f0000001500)="45d15169872acefb39a8ce2a6e52c5651a722f22", 0x14}, {&(0x7f0000001540)="01d77ff7b3b24867c3f88b840d965c08de0dddd9e9884898b1b210ebfa8f0f7a93a3b203e6caebc4d979a5eba5411f36466201beaaad9daef30d27e0a8f36f881621c4c756e9afed73c407dc4126", 0x4e}], 0x3, &(0x7f0000001600)=[{0x108, 0x84, 0x80000001, "a5eb81b5483db71b2c5732ad17a3079d51dce7cf140c2900c3407e5727806d9ff64e7a73be2d26868e0c6447a31c8ced41747f6fa5aea84fd1e7050e3d41b6999299451a2cd523545a7d628f538c8b5a39138cd8954b67477a96f65df5c97aa73d9f3d812ffebb5fe40abe9538b5b3c37fc036a42a77a32424087cc1763e00cd9032c354731f43bf3248c0eb76dc85bd5365391c7b0b67ac21ca1fecfe9806940573195f8ea423443bf6c2f4c7bb1dd294b10df1bd07f9e8c37ad9db6009338d20354847324c4c837320cad4df668c825ba0d677602cd4c88f41cbb24070796aaeb810cda755cffeec01745318de2e160b537daaaed612"}, {0xe0, 0x114, 0x7fffffff, "57e1daf0753e8ee18609bbf7e59ba4d8c6f545c2da3ba6660cc67a3ccbf8fed5df9ca449666c6230120473a212c4f757c8f5c1fa9d0bf0e9e72e54cb82c39fc812e3e9103800c29172746713040f25e7b3621348b143945db6bcffe1997ee40c77686e51d321c754dfbae0a09e9bd1477f817410d2b58112d58d6926a4ddb46674767df7ae55c2fdd02432c2f3b2425cf7e437edad350e871e9db6658d796097ee1d1173f59c4a2727014a35c1febf64055cc14b1d32166f44398e56c264e07e1165507aeb79c62bfe0c2cc460"}, {0x78, 0xefa0bee069b6be2e, 0xb6b, "fbb30e96aea9218fba3bdbf864d956108391da01947db4497675803d51b2668fc64701ed2c5a555429a589c4456f0e74de2610214f778fdb34bac378bed7409497f5b687f416377b79f82c8dc6007fe0b2b2207deb2e4537e05b4ff7031a563d3ae41b96"}, {0x100, 0x117, 0xfffffc00, "0b96f2a66bae9623447db8293a4bd01e385eb9ef90da30f01a2f74097642745ac39d327565b42084916e14139f1e7b60287f96ed164406aca8fb9ede19c8b6f2195668185c240c221fccc8955bd03b11dacc548cf85c89cc088c482a989edaab28119ea006392d398458ed8b92a81df07bf173603c40940317202f27f1aba7faec52d5829a85a98909759ff3f687a13c0dfa54921b35ecbc86440d21ca1e0a41807161fce7c59d9a21e7fcc384c655a88926df74aedc43ed99babb3314a62d4ae31a969f3a4b135c238e4d3e1f4a6f7e11b4305698bec128813e379988ac1ffb24781227cb8d97a84ec0bbcf91b2c0"}, {0xc0, 0x1, 0x2, "593bf8786e6e1c68fb27e9fff7bc4ea0ba202ec94b07b079ff05a373c3907013babc470bc0558c161dfa5dc757d075b3f56b1a6f8209ef968f95314a4450c5cdf7da7743b222ef033a448e44df3ac7a645068fc801f70bbd9c1a07e16f07f53257cd8b27cd45a225dfdb7a73abbf9d15b9cfdd874e5ada8cc28f83ad7ea19b8b587ab4e07263fd911a8c44a8bcc20814e9d5b03ac6391020902f89e90efc2680b8ca61f1c6abd4ff00ad97ef121923aa"}, {0x100, 0x10a, 0x4, "c294d5e3ae0d178447eaabc79fde4b259fd9b4380538b7ecd2a258dfbba0a67e771e4bb163d70e08136a1e569c43710d11cf350146035b48692deda8d30aba26bb485a47d38346259525a135512a2db14ceb4573620dedabed5e0834b51d5528813f542062d865008f3c3e292ec19a4e7d324ff74b348c7894889f584a439d12109543d1c8a141bb6b9a5035bb0f147bc4778225ac14c4fbf5cd81ec070a99bc919cbd6cf7e08a92fff476f003a1b04385b677934c73eb8107d6f8eb7d01dece6b55a49cd9cc89c3461ffca91e77bf37f537ce0232099f6b19d25bd38b7d2707a289ae696a04b3c8ef79f1"}], 0x520}}, {{&(0x7f0000001b40)=@l2tp6={0xa, 0x0, 0x800, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x81, 0x1}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001bc0)="5e11ba8294e4d245aff2fbc10f6807fba316ef079c439052ab61e06db8502567dede7e4a52cc0e762819fcc7d5bbd87602fe9a0b5b639698042846bbf1888a107c1287372f29456bb60d81e6f569bb8009a95c7a4abf780aa15f292f320d1cc820bf948b5318cfb3f463cd52b044f025a320daabbc3be3f2f1e73bf37779896b260140a89b7cc355c4de9d2deb1f895d104c1d5aa060d7de4b76c1640fd50550bc73643b9d54033283bb88580b0db100b85c4bfb266a02a753b74846e8a7062f338cc82c85019bfb3b96c3251950cf38a432c928eb3fae0df082398894d02ae417afcbf54ad6c6c1b54b81c47610b00b4290", 0xf2}], 0x1}}, {{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000001d00)="8afbb6eb6473c0d475f376cffd657cce0050b315f5db7fcfe660155c20a761c85d709d5c9ac081af838952052d5d1d97541da276cc39fa1719a4b75b735d3d001228f9ed5573a3d8f4c546e05a64432ff33b5fde9bbb042c25fb43f8d538312e4ae3649502803fc8f4542319290a9da97b1462346ac4099bc3187447f3be4e2a12af7eb68853f9390e3e3147ffadf003", 0x90}, {&(0x7f0000001dc0)}, {&(0x7f0000001e00)="d1d554eee87ca537ea110d39e5006f65aff235ee53accb8d892a36bb34c71cc2b13d1b7c99f1bbaa2cb3c20fa9bae472b290f59a7529e7055124850640921d347ec3bb2c2177c89ead0bd1da94eebb918aa33f83fee4fb5329d267045e34a99525dae431b7fd557082525108eebb569a430a3606e1749e27330746028f025e4ff5c8aa6ddff4d1dc34e724a4ed8de27f9ec5efe20933d4dfde56002c73d0663a2c9b82de5cde835565c02102860d7a7f02ea910a5e0ac2fb06caae085915e19ec0c90a209dcd81aff0e8236c1b808e8d1916e7a8", 0xd4}, {&(0x7f0000001f00)="1be723290cf3cd9cfd2356b7fcf167aa7bb6ff8ae8ccb259d2a3e7190e6a40566ae76727da843a8ffe56f8d4199995de97b219497c0dc5c58b51e35d8c1d12c111edf892f32e4fbbf06e584eaf381224d62fe85465ee42e3e5e371d2a7cfb1c16f9f8f8115c0edaa0a16d26aa157b10cdaf63860797db91b895a7f0463c79d3a1e638ca9fec5b37818a1d6c199245fbcda9e9f93cc14343afa51993e1fcf0c0187f33edbaa14fc6d56539f56322d4b76467aeb508deb36088e838191d7f2e18fcc18cbaa49be3d5c1a23", 0xca}, {&(0x7f0000002000)="ce48e1e1d0619089c143fa4a51db66782933a4440ab042e5", 0x18}], 0x5, &(0x7f00000020c0)=[{0xd8, 0x3a, 0x3ff, "64f4bd88a17235bd81f09b32fd7ef139d781105b0d5d0077fc05afcf2ce34594c6688e8d1eada7df0a011ec5c7120a1c2d5f98ec54eabc8cd169de9d946afa8f20c7d9ad32d64abd1afaf4f921c7a555a95ba881c9b776dea184f34af23f38dbf78831d0fab863ad72c9621cc280abfdb69a5906ed80a68946eec2700f99b23e00cb4841a44324119be8565efdddb7549eb4f88eec5fae6eeddf6dd4242f71c58ffe3518270bd7c51545efec4505d55bc89331f6ec386d15d7118ab72d3bb64e8464f86e20e6"}], 0xd8}}], 0x4, 0x50) tkill(r1, 0x1000000000013) ptrace$setregs(0xd, r1, 0x5deb, &(0x7f0000000000)="806853d043a3a29b72228003c6e85a8830a95bf70126011d0d053415caa4310aa09398156221") r4 = gettid() ptrace$cont(0x9, r1, 0x7, 0x400) tkill(r4, 0x40) writev(r0, 0x0, 0x0) [ 116.235661][ T9382] ? dup_mmap+0x39e/0x9d0 [ 116.239615][ T9386] loop5: detected capacity change from 0 to 136 [ 116.239994][ T9382] __should_failslab+0x81/0x90 [ 116.240082][ T9382] should_failslab+0x5/0x20 [ 116.255531][ T9382] kmem_cache_alloc+0x46/0x2e0 [ 116.260295][ T9382] ? __vma_link_rb+0x3c2/0x3e0 [ 116.265090][ T9382] ? up_write+0x25/0xc0 [ 116.269285][ T9382] dup_mmap+0x39e/0x9d0 [ 116.272751][ T9384] loop4: detected capacity change from 0 to 264192 [ 116.273439][ T9382] dup_mm+0x7c/0x210 [ 116.283857][ T9382] copy_process+0x1203/0x2e00 [ 116.288614][ T9382] kernel_clone+0x14b/0x680 [ 116.293144][ T9382] __se_sys_clone3+0x194/0x1d0 [ 116.298014][ T9382] ? __cond_resched+0x11/0x40 [ 116.302936][ T9382] ? fput+0x2d/0x130 [ 116.306859][ T9382] ? ksys_write+0x157/0x180 [ 116.311445][ T9382] ? fpregs_assert_state_consistent+0x7d/0x90 [ 116.317520][ T9382] ? exit_to_user_mode_prepare+0x65/0x190 [ 116.323256][ T9382] __x64_sys_clone3+0x2d/0x40 [ 116.328035][ T9382] do_syscall_64+0x4a/0x90 [ 116.332512][ T9382] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 116.338391][ T9382] RIP: 0033:0x4665f9 [ 116.342264][ T9382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.361903][ T9382] RSP: 002b:00007f7130de4188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 116.370345][ T9382] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 116.378321][ T9382] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000080 13:56:17 executing program 1 (fault-call:1 fault-nth:96): set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 116.386282][ T9382] RBP: 00007f7130de41d0 R08: 0000000000000000 R09: 0000000000000000 [ 116.394480][ T9382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 116.402446][ T9382] R13: 00007ffd69a9f00f R14: 00007f7130de4300 R15: 0000000000022000 13:56:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6}], 0x0, &(0x7f0000000080)) [ 116.435919][ T9384] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 116.479598][ T9384] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 116.486177][ T9412] FAULT_INJECTION: forcing a failure. [ 116.486177][ T9412] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 116.499901][ T9384] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,noquota,auto_da_alloc=0x00000,errors=continue. Quota mode: none. [ 116.502079][ T9412] CPU: 0 PID: 9412 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 13:56:17 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB]) 13:56:17 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x400000000000000) 13:56:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:17 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x600000000000000) [ 116.526081][ T9412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.532508][ T9414] ISOFS: Unable to identify CD-ROM format. [ 116.536262][ T9412] Call Trace: [ 116.536273][ T9412] dump_stack+0x137/0x19d [ 116.549685][ T9412] should_fail+0x23c/0x250 [ 116.554108][ T9412] __alloc_pages_nodemask+0xe7/0x310 [ 116.562694][ T9412] alloc_pages_current+0x21d/0x310 [ 116.567805][ T9412] pte_alloc_one+0x29/0xb0 [ 116.572236][ T9412] __pte_alloc+0x2f/0x210 [ 116.576569][ T9412] copy_pte_range+0x128e/0x1460 [ 116.581466][ T9412] ? __alloc_pages_nodemask+0x17a/0x310 [ 116.587012][ T9412] copy_page_range+0x5ca/0x8d0 [ 116.591775][ T9412] ? __vma_link_rb+0x3c2/0x3e0 [ 116.596536][ T9412] ? up_write+0x25/0xc0 [ 116.600685][ T9412] dup_mmap+0x6bb/0x9d0 [ 116.604837][ T9412] dup_mm+0x7c/0x210 [ 116.608712][ T9412] copy_process+0x1203/0x2e00 [ 116.613365][ T9412] kernel_clone+0x14b/0x680 [ 116.617922][ T9412] __se_sys_clone3+0x194/0x1d0 [ 116.622665][ T9412] ? __cond_resched+0x11/0x40 [ 116.627407][ T9412] ? fput+0x2d/0x130 [ 116.631285][ T9412] ? ksys_write+0x157/0x180 [ 116.635831][ T9412] ? fpregs_assert_state_consistent+0x7d/0x90 [ 116.641904][ T9412] ? exit_to_user_mode_prepare+0x65/0x190 [ 116.650475][ T9412] __x64_sys_clone3+0x2d/0x40 [ 116.655161][ T9412] do_syscall_64+0x4a/0x90 [ 116.659576][ T9412] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 116.665588][ T9412] RIP: 0033:0x4665f9 13:56:18 executing program 1 (fault-call:1 fault-nth:97): set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000100000000002", 0x2d}, {&(0x7f0000000140)="f8ff32d6fe55e334ccea", 0xa, 0x10000}], 0x1, &(0x7f0000011000)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x100, 0x48) [ 116.669495][ T9412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.689396][ T9412] RSP: 002b:00007f7130de4188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 116.698012][ T9412] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 116.705972][ T9412] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000080 [ 116.713943][ T9412] RBP: 00007f7130de41d0 R08: 0000000000000000 R09: 0000000000000000 [ 116.721896][ T9412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 116.729986][ T9412] R13: 00007ffd69a9f00f R14: 00007f7130de4300 R15: 0000000000022000 13:56:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, 0x0) 13:56:18 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x700000000000000) 13:56:18 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x800000000000000) [ 116.809942][ T9422] loop5: detected capacity change from 0 to 136 13:56:18 executing program 0: sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, 0x0, 0x0) unshare(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa0d1962ea3760ef9, &(0x7f0000000080)=0x1000, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x200000d5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, &(0x7f0000000000)='^', 0x1, 0xc146d9afd302db96, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) [ 116.853929][ T9440] FAULT_INJECTION: forcing a failure. [ 116.853929][ T9440] name failslab, interval 1, probability 0, space 0, times 0 [ 116.866606][ T9440] CPU: 0 PID: 9440 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 116.874939][ T9440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.876373][ T9439] loop3: detected capacity change from 0 to 136 [ 116.885004][ T9440] Call Trace: [ 116.885014][ T9440] dump_stack+0x137/0x19d [ 116.885041][ T9440] should_fail+0x23c/0x250 13:56:18 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x1000000000000000) [ 116.903296][ T9440] ? dup_mmap+0x39e/0x9d0 [ 116.907637][ T9440] __should_failslab+0x81/0x90 [ 116.912483][ T9440] should_failslab+0x5/0x20 [ 116.917049][ T9440] kmem_cache_alloc+0x46/0x2e0 [ 116.921896][ T9440] ? __vma_link_rb+0x3c2/0x3e0 [ 116.926664][ T9440] ? up_write+0x25/0xc0 [ 116.930816][ T9440] dup_mmap+0x39e/0x9d0 [ 116.934978][ T9440] dup_mm+0x7c/0x210 [ 116.938868][ T9440] copy_process+0x1203/0x2e00 [ 116.943553][ T9440] kernel_clone+0x14b/0x680 [ 116.948050][ T9440] __se_sys_clone3+0x194/0x1d0 [ 116.952824][ T9440] ? __cond_resched+0x11/0x40 [ 116.957521][ T9440] ? fput+0x2d/0x130 [ 116.961504][ T9440] ? ksys_write+0x157/0x180 [ 116.966016][ T9440] ? fpregs_assert_state_consistent+0x7d/0x90 [ 116.972131][ T9440] ? exit_to_user_mode_prepare+0x65/0x190 [ 116.977855][ T9440] __x64_sys_clone3+0x2d/0x40 [ 116.982549][ T9440] do_syscall_64+0x4a/0x90 [ 116.986965][ T9440] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 116.992893][ T9440] RIP: 0033:0x4665f9 13:56:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 116.996796][ T9440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.016399][ T9440] RSP: 002b:00007f7130de4188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 117.024833][ T9440] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 117.032806][ T9440] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000080 [ 117.040863][ T9440] RBP: 00007f7130de41d0 R08: 0000000000000000 R09: 0000000000000000 13:56:18 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB]) 13:56:18 executing program 1 (fault-call:1 fault-nth:98): set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, 0x0) [ 117.048829][ T9440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 117.056796][ T9440] R13: 00007ffd69a9f00f R14: 00007f7130de4300 R15: 0000000000022000 [ 117.074665][ T9442] loop4: detected capacity change from 0 to 264192 [ 117.090482][ T9442] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:56:18 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x1010000000000000) [ 117.100509][ T9442] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 117.153693][ T9469] FAULT_INJECTION: forcing a failure. [ 117.153693][ T9469] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 117.166961][ T9469] CPU: 1 PID: 9469 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 117.175286][ T9469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.185349][ T9469] Call Trace: [ 117.188628][ T9469] dump_stack+0x137/0x19d [ 117.192962][ T9469] should_fail+0x23c/0x250 [ 117.197460][ T9469] __alloc_pages_nodemask+0xe7/0x310 [ 117.202294][ T9475] loop4: detected capacity change from 0 to 264192 [ 117.202749][ T9469] alloc_pages_current+0x21d/0x310 [ 117.213259][ T9468] loop5: detected capacity change from 0 to 136 [ 117.214330][ T9469] pte_alloc_one+0x29/0xb0 [ 117.222400][ T9478] loop3: detected capacity change from 0 to 136 [ 117.224983][ T9469] __pte_alloc+0x2f/0x210 [ 117.235542][ T9469] copy_pte_range+0x128e/0x1460 [ 117.240403][ T9469] ? __alloc_pages_nodemask+0x17a/0x310 [ 117.245985][ T9469] copy_page_range+0x5ca/0x8d0 [ 117.250841][ T9469] ? __vma_link_rb+0x3c2/0x3e0 [ 117.255635][ T9469] ? up_write+0x25/0xc0 [ 117.259904][ T9469] dup_mmap+0x6bb/0x9d0 [ 117.264053][ T9469] dup_mm+0x7c/0x210 [ 117.267942][ T9469] copy_process+0x1203/0x2e00 [ 117.272611][ T9469] kernel_clone+0x14b/0x680 [ 117.277241][ T9469] __se_sys_clone3+0x194/0x1d0 [ 117.282012][ T9469] ? __cond_resched+0x11/0x40 [ 117.286705][ T9469] ? fput+0x2d/0x130 [ 117.290608][ T9469] ? ksys_write+0x157/0x180 [ 117.295226][ T9469] ? fpregs_assert_state_consistent+0x7d/0x90 [ 117.301393][ T9469] ? exit_to_user_mode_prepare+0x65/0x190 [ 117.307123][ T9469] __x64_sys_clone3+0x2d/0x40 [ 117.311794][ T9469] do_syscall_64+0x4a/0x90 [ 117.316205][ T9469] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.322194][ T9469] RIP: 0033:0x4665f9 [ 117.326083][ T9469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.345747][ T9469] RSP: 002b:00007f7130de4188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 13:56:18 executing program 1 (fault-call:1 fault-nth:99): set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:18 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x1800000000000000) 13:56:18 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x1d00000000000000) [ 117.354246][ T9469] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 117.362211][ T9469] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000080 [ 117.370233][ T9469] RBP: 00007f7130de41d0 R08: 0000000000000000 R09: 0000000000000000 [ 117.378217][ T9469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 117.386244][ T9469] R13: 00007ffd69a9f00f R14: 00007f7130de4300 R15: 0000000000022000 13:56:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, 0x0) 13:56:18 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x2000000000000000) [ 117.434268][ T9475] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 117.455703][ T9492] FAULT_INJECTION: forcing a failure. [ 117.455703][ T9492] name failslab, interval 1, probability 0, space 0, times 0 [ 117.468342][ T9492] CPU: 0 PID: 9492 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 117.476668][ T9492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.486715][ T9492] Call Trace: [ 117.487228][ T9475] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 117.490056][ T9492] dump_stack+0x137/0x19d [ 117.504854][ T9492] should_fail+0x23c/0x250 [ 117.509292][ T9492] ? dup_mmap+0x39e/0x9d0 [ 117.513643][ T9492] __should_failslab+0x81/0x90 [ 117.518410][ T9492] should_failslab+0x5/0x20 [ 117.522916][ T9492] kmem_cache_alloc+0x46/0x2e0 [ 117.527677][ T9492] ? __vma_link_rb+0x3c2/0x3e0 [ 117.532440][ T9492] ? up_write+0x25/0xc0 [ 117.536592][ T9492] dup_mmap+0x39e/0x9d0 [ 117.540745][ T9492] dup_mm+0x7c/0x210 [ 117.544666][ T9492] copy_process+0x1203/0x2e00 [ 117.549340][ T9492] kernel_clone+0x14b/0x680 [ 117.553838][ T9492] __se_sys_clone3+0x194/0x1d0 [ 117.558598][ T9492] ? __cond_resched+0x11/0x40 [ 117.563284][ T9492] ? fput+0x2d/0x130 [ 117.567155][ T9492] ? ksys_write+0x157/0x180 [ 117.571639][ T9492] ? fpregs_assert_state_consistent+0x7d/0x90 [ 117.577702][ T9492] ? exit_to_user_mode_prepare+0x65/0x190 [ 117.583438][ T9492] __x64_sys_clone3+0x2d/0x40 [ 117.588094][ T9492] do_syscall_64+0x4a/0x90 [ 117.592504][ T9492] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.598390][ T9492] RIP: 0033:0x4665f9 [ 117.602266][ T9492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.621854][ T9492] RSP: 002b:00007f7130de4188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 117.630246][ T9492] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 117.638214][ T9492] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000080 [ 117.646166][ T9492] RBP: 00007f7130de41d0 R08: 0000000000000000 R09: 0000000000000000 [ 117.654171][ T9492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 117.662151][ T9492] R13: 00007ffd69a9f00f R14: 00007f7130de4300 R15: 0000000000022000 [ 117.733497][ T9505] loop3: detected capacity change from 0 to 136 13:56:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:19 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x3f00000000000000) 13:56:19 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB]) 13:56:19 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:19 executing program 3 (fault-call:3 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:19 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)={0x0, "a24cfaba44c7422aa5db6ffdbc982d24b3af3a36832f4cd4837a0f4059e7104d9284a99a7724adc8b35654a0037b39eb5307c42467697d0e5de5c3ddcacfc560"}, 0x48, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffd, 0xfffffffffffffffe, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef01000100000001000000000000000b0000000001000018000000c28500002b0200"/102, 0x66, 0x1}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x541}, {&(0x7f0000000040)="504d4d00042e22a68e1cf1ff08b1946c6170716f3c2503da0bdb87c273647c038157726470c9f999411c39b0573bcabce8de7116a881addb8d3b7aa2d2e6a5168139225e526cd1a026991d95d08bf682c7ac05e62605eda6b96c5a864320736ebe7b8068596c7fde4dbcc4201b710452be", 0x71, 0x10000}], 0x0, &(0x7f0000000380)=ANY=[@ANYRES64=r0]) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x1, 0x2, 0x203, 0x2}) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x0, 0x100) r2 = memfd_create(&(0x7f0000000180)='ext4\x00', 0x5) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/194, 0xc2}, {&(0x7f0000000400)=""/223, 0xdf}], 0x2, 0xfffffff9, 0x3) 13:56:19 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x4026000000000000) [ 117.864752][ T9514] loop4: detected capacity change from 0 to 264192 13:56:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r1, r2) r4 = fork() r5 = fork() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)=0x0) r7 = gettid() tkill(r7, 0x1000000000013) r8 = gettid() ptrace$setregs(0xf, r4, 0x81, &(0x7f0000000440)="a633c49b1c4b46fef57c2bcb00c3698eeeb278893bdc72c6f82560710a32e04b8b08c655f4cd48f37c1e156256078283baecbdaccf383665631f53183b7fe2b5d28a9ff4e1cbff2866f187f712d167c13f0784c205be9fd7d7926183ade71b7b71771e82db5cf3d0f023b3b68c25fc3098182bce67bbd149c5789ad5514e6a4a0bb87dd5f8ab2d93664573646ddf7a0aa9de20e15900655d32c99d6e9a5b417ff5a75d8e1cf8f67d82ae41629470a2ee29ee610e46c8bdeaeea64168fc6faa5ab0152c464e659cfd864c34f4f1efc41e6be5df276d6fd01726056e6bc3e40ad60bce40d5") tkill(r8, 0x1000000000013) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r9, 0x0) preadv(r9, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f00000003c0)={0x824400, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x21}, &(0x7f0000000100)=""/109, 0x6d, &(0x7f0000000180)=""/157, &(0x7f0000000280)=[r0, 0x0, r0, 0x0, r7, r5, r6, r7, r8], 0x9, {r9}}, 0x58) 13:56:19 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025041, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 117.910631][ T9520] loop5: detected capacity change from 0 to 136 [ 117.925527][ T9514] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:56:19 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x4800000000000000) 13:56:19 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota,']) [ 117.954447][ T9535] FAULT_INJECTION: forcing a failure. [ 117.954447][ T9535] name failslab, interval 1, probability 0, space 0, times 0 [ 117.967352][ T9535] CPU: 1 PID: 9535 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 117.975747][ T9535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.976537][ T9514] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 117.985815][ T9535] Call Trace: [ 117.985825][ T9535] dump_stack+0x137/0x19d 13:56:19 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 117.985853][ T9535] should_fail+0x23c/0x250 [ 117.985873][ T9535] __should_failslab+0x81/0x90 [ 117.985895][ T9535] ? __se_sys_memfd_create+0xfb/0x390 [ 118.018452][ T9535] should_failslab+0x5/0x20 [ 118.023042][ T9535] __kmalloc+0x66/0x350 [ 118.027249][ T9535] ? strnlen_user+0x137/0x1c0 [ 118.031930][ T9535] __se_sys_memfd_create+0xfb/0x390 [ 118.037128][ T9535] __x64_sys_memfd_create+0x2d/0x40 [ 118.042328][ T9535] do_syscall_64+0x4a/0x90 [ 118.046743][ T9535] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 118.052649][ T9535] RIP: 0033:0x4665f9 [ 118.056534][ T9535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.076141][ T9535] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 118.084561][ T9535] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004665f9 [ 118.092530][ T9535] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00000000004bee8e [ 118.100496][ T9535] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 118.108459][ T9535] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 118.116423][ T9535] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020000080 [ 118.128006][ T25] kauditd_printk_skb: 16 callbacks suppressed 13:56:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x11, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 118.128017][ T25] audit: type=1326 audit(1619704579.450:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9538 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 118.160461][ T25] audit: type=1326 audit(1619704579.480:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9538 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 13:56:19 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:19 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x4c00000000000000) [ 118.197446][ T25] audit: type=1326 audit(1619704579.510:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9538 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 118.259949][ T25] audit: type=1326 audit(1619704579.510:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9538 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 118.284138][ T25] audit: type=1326 audit(1619704579.510:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9538 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 13:56:19 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x10}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 118.311369][ T9550] loop4: detected capacity change from 0 to 264192 [ 118.315902][ T25] audit: type=1326 audit(1619704579.510:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9538 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 118.322510][ T9562] loop5: detected capacity change from 0 to 136 [ 118.369179][ T9550] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 118.369658][ T25] audit: type=1326 audit(1619704579.510:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9538 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 13:56:19 executing program 3 (fault-call:3 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:19 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x6800000000000000) 13:56:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x12, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 118.400866][ T25] audit: type=1326 audit(1619704579.510:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9538 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 118.425432][ T25] audit: type=1326 audit(1619704579.510:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9538 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 118.451260][ T9550] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 118.463107][ T25] audit: type=1326 audit(1619704579.510:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9538 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 118.502617][ T9550] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,,errors=continue. Quota mode: none. [ 118.529047][ T9584] FAULT_INJECTION: forcing a failure. [ 118.529047][ T9584] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 118.542163][ T9584] CPU: 1 PID: 9584 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 118.550685][ T9584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.560836][ T9584] Call Trace: [ 118.564173][ T9585] loop5: detected capacity change from 0 to 136 [ 118.564205][ T9584] dump_stack+0x137/0x19d [ 118.574748][ T9584] should_fail+0x23c/0x250 [ 118.579198][ T9584] should_fail_usercopy+0x16/0x20 [ 118.584227][ T9584] _copy_from_user+0x1c/0xd0 [ 118.588833][ T9584] __se_sys_memfd_create+0x137/0x390 [ 118.594124][ T9584] __x64_sys_memfd_create+0x2d/0x40 [ 118.599321][ T9584] do_syscall_64+0x4a/0x90 [ 118.603777][ T9584] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 118.609759][ T9584] RIP: 0033:0x4665f9 [ 118.613654][ T9584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.633294][ T9584] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 118.641719][ T9584] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004665f9 [ 118.649693][ T9584] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00000000004bee8e [ 118.657662][ T9584] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 118.665630][ T9584] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 118.673600][ T9584] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020000080 13:56:22 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x10}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:22 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:22 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x6c00000000000000) 13:56:22 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='t']) 13:56:22 executing program 3 (fault-call:3 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x22, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:22 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x7400000000000000) 13:56:22 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='t']) [ 121.005175][ T9609] loop4: detected capacity change from 0 to 264192 [ 121.013283][ T9609] EXT4-fs (loop4): Unrecognized mount option "t" or missing value [ 121.021168][ T9610] loop5: detected capacity change from 0 to 136 [ 121.035402][ T9620] FAULT_INJECTION: forcing a failure. [ 121.035402][ T9620] name failslab, interval 1, probability 0, space 0, times 0 [ 121.048039][ T9620] CPU: 1 PID: 9620 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 121.056413][ T9620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.066483][ T9620] Call Trace: [ 121.069761][ T9620] dump_stack+0x137/0x19d [ 121.074102][ T9620] should_fail+0x23c/0x250 [ 121.078499][ T9620] ? shmem_alloc_inode+0x22/0x30 [ 121.083444][ T9620] __should_failslab+0x81/0x90 [ 121.088191][ T9620] ? shmem_match+0xa0/0xa0 [ 121.092624][ T9620] should_failslab+0x5/0x20 [ 121.097323][ T9620] kmem_cache_alloc+0x46/0x2e0 [ 121.102090][ T9620] ? do_anonymous_page+0x411/0x8b0 [ 121.107184][ T9620] ? fsnotify_perm+0x59/0x2e0 [ 121.111840][ T9620] ? shmem_match+0xa0/0xa0 [ 121.116265][ T9620] shmem_alloc_inode+0x22/0x30 [ 121.121088][ T9620] new_inode_pseudo+0x38/0x1c0 [ 121.125855][ T9620] new_inode+0x21/0x120 [ 121.129994][ T9620] shmem_get_inode+0xa1/0x480 [ 121.134717][ T9620] __shmem_file_setup+0xf1/0x1d0 [ 121.139639][ T9620] shmem_file_setup+0x37/0x40 [ 121.144319][ T9620] __se_sys_memfd_create+0x1eb/0x390 [ 121.149586][ T9620] __x64_sys_memfd_create+0x2d/0x40 [ 121.154825][ T9620] do_syscall_64+0x4a/0x90 [ 121.159271][ T9620] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 121.165175][ T9620] RIP: 0033:0x4665f9 [ 121.169107][ T9620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.188719][ T9620] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 121.197150][ T9620] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004665f9 13:56:22 executing program 3 (fault-call:3 fault-nth:3): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:22 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x41}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 121.205108][ T9620] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00000000004bee8e [ 121.213086][ T9620] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 121.221078][ T9620] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 121.229114][ T9620] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020000080 [ 121.310244][ T9633] FAULT_INJECTION: forcing a failure. [ 121.310244][ T9633] name failslab, interval 1, probability 0, space 0, times 0 [ 121.323210][ T9633] CPU: 0 PID: 9633 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 121.332010][ T9633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.342064][ T9633] Call Trace: [ 121.345343][ T9633] dump_stack+0x137/0x19d [ 121.349721][ T9633] should_fail+0x23c/0x250 [ 121.354145][ T9633] ? security_inode_alloc+0x30/0x180 13:56:22 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x7a00000000000000) 13:56:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept4(r0, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f00000003c0)=0x80, 0x80000) mmap(&(0x7f0000200000/0x2000)=nil, 0x2000, 0x1, 0x10, r1, 0x619fa000) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x40200, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = inotify_init() flistxattr(r2, &(0x7f0000000540)=""/4096, 0x1000) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) setxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000300)=@v1={0x2, "497b28513cfe1270c81df9ce1ecdbe009187d77c"}, 0x15, 0x1) ioctl$TIOCL_SELLOADLUT(r3, 0x541c, &(0x7f0000000180)={0x5, 0xfffffffff7c9890e, 0xfffffffffffffffb, 0xffffffffffffb9d1, 0x20}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000000140)="000000000000000010000000f2a953140c764271ad9be301789147cf010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4755fd1f4655fd1f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000400)="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", 0x123, 0x2200}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00']) 13:56:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x25, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:22 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x60}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 121.359496][ T9633] __should_failslab+0x81/0x90 [ 121.364279][ T9633] should_failslab+0x5/0x20 [ 121.368806][ T9633] kmem_cache_alloc+0x46/0x2e0 [ 121.373630][ T9633] security_inode_alloc+0x30/0x180 [ 121.378750][ T9633] inode_init_always+0x20b/0x420 [ 121.383687][ T9633] ? shmem_match+0xa0/0xa0 [ 121.388114][ T9633] new_inode_pseudo+0x73/0x1c0 [ 121.392883][ T9633] new_inode+0x21/0x120 [ 121.397052][ T9633] shmem_get_inode+0xa1/0x480 [ 121.401739][ T9633] __shmem_file_setup+0xf1/0x1d0 13:56:22 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x8000080000000000) [ 121.406758][ T9633] shmem_file_setup+0x37/0x40 [ 121.411544][ T9633] __se_sys_memfd_create+0x1eb/0x390 [ 121.417016][ T9633] __x64_sys_memfd_create+0x2d/0x40 [ 121.422283][ T9633] do_syscall_64+0x4a/0x90 [ 121.426739][ T9633] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 121.432646][ T9633] RIP: 0033:0x4665f9 [ 121.436546][ T9633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:56:22 executing program 0: mknod(&(0x7f0000000040)='./file0\x00', 0x10e9, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/243, 0xf3}], 0x1, 0x8000, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x44) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) unlink(&(0x7f00000000c0)='./file0\x00') timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13:56:22 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x1f00}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:22 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0xc000000000000000) 13:56:22 executing program 3 (fault-call:3 fault-nth:4): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 121.456163][ T9633] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 121.464582][ T9633] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004665f9 [ 121.472558][ T9633] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00000000004bee8e [ 121.480530][ T9633] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 121.488507][ T9633] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 121.496485][ T9633] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020000080 [ 121.525776][ T9648] loop5: detected capacity change from 0 to 136 [ 121.546991][ T9630] loop4: detected capacity change from 0 to 264192 [ 121.563232][ T9630] EXT4-fs (loop4): Unrecognized mount option "t" or missing value [ 121.567783][ T9671] FAULT_INJECTION: forcing a failure. [ 121.567783][ T9671] name failslab, interval 1, probability 0, space 0, times 0 [ 121.583893][ T9671] CPU: 1 PID: 9671 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 121.592247][ T9671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.602432][ T9671] Call Trace: [ 121.605710][ T9671] dump_stack+0x137/0x19d [ 121.610046][ T9671] should_fail+0x23c/0x250 [ 121.614817][ T9671] ? __d_alloc+0x36/0x370 [ 121.619150][ T9671] __should_failslab+0x81/0x90 [ 121.623952][ T9671] should_failslab+0x5/0x20 [ 121.628466][ T9671] kmem_cache_alloc+0x46/0x2e0 [ 121.633262][ T9671] ? __init_rwsem+0x59/0x70 [ 121.637845][ T9671] __d_alloc+0x36/0x370 [ 121.642163][ T9671] ? current_time+0xdb/0x190 [ 121.646796][ T9671] d_alloc_pseudo+0x1a/0x50 [ 121.651470][ T9671] alloc_file_pseudo+0x63/0x130 [ 121.656341][ T9671] __shmem_file_setup+0x14c/0x1d0 [ 121.661504][ T9671] shmem_file_setup+0x37/0x40 [ 121.666236][ T9671] __se_sys_memfd_create+0x1eb/0x390 [ 121.672347][ T9671] __x64_sys_memfd_create+0x2d/0x40 [ 121.678299][ T9671] do_syscall_64+0x4a/0x90 [ 121.682723][ T9671] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 121.688695][ T9671] RIP: 0033:0x4665f9 [ 121.692569][ T9671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.712376][ T9671] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 13:56:23 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='t']) 13:56:23 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x2000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:23 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0xc024000000000000) 13:56:23 executing program 0: set_mempolicy(0x3, &(0x7f0000000000)=0x7fff, 0x104) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) set_mempolicy(0x8000, &(0x7f0000000040)=0x1, 0x7) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @remote}, 0x10) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @remote}, 0x10) 13:56:23 executing program 3 (fault-call:3 fault-nth:5): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 121.720796][ T9671] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004665f9 [ 121.728854][ T9671] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00000000004bee8e [ 121.738313][ T9671] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 121.746291][ T9671] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 121.754260][ T9671] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020000080 [ 121.873255][ T9689] FAULT_INJECTION: forcing a failure. [ 121.873255][ T9689] name failslab, interval 1, probability 0, space 0, times 0 [ 121.879202][ T9691] loop4: detected capacity change from 0 to 264192 [ 121.885904][ T9689] CPU: 0 PID: 9689 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 121.900756][ T9689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.916570][ T9689] Call Trace: [ 121.919848][ T9689] dump_stack+0x137/0x19d [ 121.924240][ T9689] should_fail+0x23c/0x250 [ 121.928734][ T9689] ? __alloc_file+0x2e/0x1a0 [ 121.933340][ T9689] __should_failslab+0x81/0x90 [ 121.938106][ T9689] should_failslab+0x5/0x20 [ 121.942606][ T9689] kmem_cache_alloc+0x46/0x2e0 [ 121.947367][ T9689] ? inode_doinit_with_dentry+0x36f/0x940 [ 121.953085][ T9689] __alloc_file+0x2e/0x1a0 [ 121.957496][ T9689] alloc_empty_file+0xcd/0x1c0 [ 121.962302][ T9689] alloc_file+0x3a/0x280 [ 121.966613][ T9689] alloc_file_pseudo+0xe2/0x130 [ 121.971487][ T9689] __shmem_file_setup+0x14c/0x1d0 [ 121.976617][ T9689] shmem_file_setup+0x37/0x40 [ 121.981295][ T9689] __se_sys_memfd_create+0x1eb/0x390 [ 121.986793][ T9689] __x64_sys_memfd_create+0x2d/0x40 [ 121.992140][ T9689] do_syscall_64+0x4a/0x90 [ 121.996569][ T9689] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 122.002535][ T9689] RIP: 0033:0x4665f9 13:56:23 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x3000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:23 executing program 0: mount(&(0x7f0000000000)=@md0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)='ntfs\x00', 0x160008, &(0x7f00000001c0)='*{\\{\x00') mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 122.006427][ T9689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 122.026142][ T9689] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 122.034824][ T9689] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004665f9 [ 122.043581][ T9689] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00000000004bee8e [ 122.051555][ T9689] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 122.059535][ T9689] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 13:56:23 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0xf6ffffff00000000) 13:56:23 executing program 3 (fault-call:3 fault-nth:6): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:23 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x4000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 122.067506][ T9689] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020000080 [ 122.076052][ T9699] loop5: detected capacity change from 0 to 136 [ 122.098093][ T9691] EXT4-fs (loop4): Unrecognized mount option "t" or missing value 13:56:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 122.165509][ T881] blk_update_request: I/O error, dev loop1, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 122.176889][ T9710] isofs_fill_super: bread failed, dev=loop1, iso_blknum=16, block=32 13:56:23 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encry']) 13:56:23 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0xfeffffff00000000) 13:56:23 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x4100}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 122.223691][ T9727] FAULT_INJECTION: forcing a failure. [ 122.223691][ T9727] name failslab, interval 1, probability 0, space 0, times 0 [ 122.236363][ T9727] CPU: 1 PID: 9727 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 122.244697][ T9727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.254759][ T9727] Call Trace: [ 122.258041][ T9727] dump_stack+0x137/0x19d [ 122.262442][ T9727] should_fail+0x23c/0x250 [ 122.266892][ T9727] ? security_file_alloc+0x30/0x190 13:56:23 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x101800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000002300)) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x13, r2, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/146, 0x92}, {&(0x7f0000001200)=""/218, 0xda}, {&(0x7f0000001300)=""/4096, 0x1000}], 0x4, 0x2fe2, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2284, &(0x7f0000000100)) [ 122.272098][ T9727] __should_failslab+0x81/0x90 [ 122.276898][ T9727] should_failslab+0x5/0x20 [ 122.281440][ T9727] kmem_cache_alloc+0x46/0x2e0 [ 122.286278][ T9727] ? __alloc_file+0x2e/0x1a0 [ 122.290869][ T9727] security_file_alloc+0x30/0x190 [ 122.295895][ T9727] __alloc_file+0x83/0x1a0 [ 122.300318][ T9727] alloc_empty_file+0xcd/0x1c0 [ 122.305085][ T9727] alloc_file+0x3a/0x280 [ 122.307882][ T881] blk_update_request: I/O error, dev loop1, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 122.309327][ T9727] alloc_file_pseudo+0xe2/0x130 [ 122.309352][ T9727] __shmem_file_setup+0x14c/0x1d0 [ 122.327872][ T9715] isofs_fill_super: bread failed, dev=loop1, iso_blknum=16, block=32 [ 122.330150][ T9727] shmem_file_setup+0x37/0x40 [ 122.342870][ T9727] __se_sys_memfd_create+0x1eb/0x390 [ 122.348178][ T9727] __x64_sys_memfd_create+0x2d/0x40 [ 122.353372][ T9727] do_syscall_64+0x4a/0x90 [ 122.357786][ T9727] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 122.363735][ T9727] RIP: 0033:0x4665f9 [ 122.367620][ T9727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 122.387226][ T9727] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 122.395648][ T9727] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004665f9 [ 122.403665][ T9727] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00000000004bee8e [ 122.411784][ T9727] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff 13:56:23 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0xffff030000000000) 13:56:23 executing program 3 (fault-call:3 fault-nth:7): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:23 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x6000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="200000003f00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010000000000ddd86ae43cc8d7e9f4655f00000000000000000100beb98389d4410000000000009207", 0x63, 0x400}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="e6"]) [ 122.419755][ T9727] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 122.427727][ T9727] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020000080 [ 122.440162][ T9728] loop5: detected capacity change from 0 to 136 13:56:23 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0xffffff0f00000000) [ 122.496842][ T9747] loop4: detected capacity change from 0 to 264192 [ 122.519439][ T9747] EXT4-fs (loop4): Unrecognized mount option "test_dummy_encry" or missing value [ 122.533006][ T9755] FAULT_INJECTION: forcing a failure. [ 122.533006][ T9755] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:56:23 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x8fff}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:23 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0xffffffff00000000) [ 122.546269][ T9755] CPU: 1 PID: 9755 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 122.554633][ T9755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.564689][ T9755] Call Trace: [ 122.568043][ T9755] dump_stack+0x137/0x19d [ 122.572389][ T9755] should_fail+0x23c/0x250 [ 122.576821][ T9755] __alloc_pages_nodemask+0xe7/0x310 [ 122.582117][ T9755] alloc_pages_vma+0x3c3/0x5e0 [ 122.586883][ T9755] shmem_getpage_gfp+0x980/0x1410 [ 122.591914][ T9755] ? mls_context_isvalid+0x76/0x1e0 [ 122.597167][ T9755] shmem_write_begin+0x7e/0x100 [ 122.602030][ T9755] generic_perform_write+0x196/0x3a0 [ 122.607327][ T9755] ? file_update_time+0x1bd/0x3e0 [ 122.612370][ T9755] __generic_file_write_iter+0x161/0x300 [ 122.613996][ T9764] loop5: detected capacity change from 0 to 136 [ 122.618079][ T9755] ? generic_write_checks+0x250/0x290 [ 122.618105][ T9755] generic_file_write_iter+0x75/0x130 [ 122.635019][ T9755] vfs_write+0x69d/0x770 [ 122.639308][ T9755] __x64_sys_pwrite64+0xf5/0x150 [ 122.644231][ T9755] do_syscall_64+0x4a/0x90 [ 122.648749][ T9755] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 122.654643][ T9755] RIP: 0033:0x419797 [ 122.658518][ T9755] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 122.678146][ T9755] RSP: 002b:00007f4f4c084f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 122.686575][ T9755] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 13:56:24 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encry']) 13:56:24 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0xff8f}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 122.694558][ T9755] RDX: 0000000000000006 RSI: 0000000020010600 RDI: 0000000000000005 [ 122.702510][ T9755] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 122.710470][ T9755] R10: 0000000000008800 R11: 0000000000000293 R12: 0000000000000005 [ 122.718441][ T9755] R13: 0000000000000005 R14: 0000000020001500 R15: 0000000000000000 13:56:24 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x20010}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) dup2(r1, r3) sendmsg$sock(r0, &(0x7f0000000480)={&(0x7f0000000240)=@hci={0x1f, 0x0, 0x3}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=[@timestamping={{0x14, 0x1, 0x25, 0x348}}, @mark={{0x14}}, @timestamping={{0x14}}], 0x48}, 0x0) 13:56:24 executing program 3 (fault-call:3 fault-nth:8): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 122.753778][ T9755] loop3: detected capacity change from 0 to 136 [ 122.766248][ T9755] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:56:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:24 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ptrace(0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x80) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0), 0xffffffffffffffff) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, 0xffffffffffffffff, 0x1f, &(0x7f0000000200)="c1b5a8de96c0147b5b5a0078e2dfb1f52376770722f6f68875b949f88a3966c5de9e9d99a45b0c315558ac871bd2117e2da5cc3cbc640ac9d2f287947c384a792e9e9b89975e359f461a212cb6a5b11a391d374bd02a27e623c0508876ad5ab3f970099a155ddb5d952cf1c26de314389543575559a5781f574d3cd120af57f44908eb50c242e76438d68f3420875be736be0f36b14d26d07792d0ba51abcdae47") pipe(&(0x7f00000000c0)) 13:56:24 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x80000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:24 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='dots,nfs,dots,dots,dmask=01777777777777777777772,dots']) open$dir(&(0x7f0000000000)='./file0\x00', 0x501080, 0x90) 13:56:24 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) socket(0x23, 0x4, 0xffff) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 122.835045][ T9793] loop4: detected capacity change from 0 to 264192 [ 122.885791][ T9793] EXT4-fs (loop4): Unrecognized mount option "test_dummy_encry" or missing value [ 122.900932][ T9813] FAULT_INJECTION: forcing a failure. [ 122.900932][ T9813] name failslab, interval 1, probability 0, space 0, times 0 [ 122.913553][ T9813] CPU: 1 PID: 9813 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 122.921888][ T9813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.931956][ T9813] Call Trace: [ 122.935235][ T9813] dump_stack+0x137/0x19d [ 122.939626][ T9813] should_fail+0x23c/0x250 [ 122.944042][ T9813] ? xas_create+0x96b/0xb30 [ 122.948631][ T9813] __should_failslab+0x81/0x90 [ 122.953403][ T9813] should_failslab+0x5/0x20 [ 122.955710][ T9802] loop5: detected capacity change from 0 to 136 [ 122.957922][ T9813] kmem_cache_alloc+0x46/0x2e0 [ 122.968947][ T9813] xas_create+0x96b/0xb30 [ 122.973297][ T9813] ? memcg_check_events+0x23/0x3b0 [ 122.978416][ T9813] xas_create_range+0x146/0x360 [ 122.983316][ T9813] shmem_add_to_page_cache+0x3ad/0x650 [ 122.988956][ T9813] shmem_getpage_gfp+0xbdc/0x1410 [ 122.994050][ T9813] shmem_write_begin+0x7e/0x100 [ 122.998998][ T9813] generic_perform_write+0x196/0x3a0 [ 123.004298][ T9813] ? file_update_time+0x1bd/0x3e0 [ 123.009408][ T9813] __generic_file_write_iter+0x161/0x300 [ 123.015043][ T9813] ? generic_write_checks+0x250/0x290 [ 123.020414][ T9813] generic_file_write_iter+0x75/0x130 [ 123.025792][ T9813] vfs_write+0x69d/0x770 [ 123.030095][ T9813] __x64_sys_pwrite64+0xf5/0x150 [ 123.035069][ T9813] do_syscall_64+0x4a/0x90 [ 123.039484][ T9813] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 123.045394][ T9813] RIP: 0033:0x419797 [ 123.049290][ T9813] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 123.068990][ T9813] RSP: 002b:00007f4f4c084f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 123.077510][ T9813] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 123.085482][ T9813] RDX: 0000000000000006 RSI: 0000000020010600 RDI: 0000000000000005 [ 123.093519][ T9813] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 123.101505][ T9813] R10: 0000000000008800 R11: 0000000000000293 R12: 0000000000000005 [ 123.109500][ T9813] R13: 0000000000000005 R14: 0000000020001500 R15: 0000000000000000 13:56:24 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encry']) 13:56:24 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x100000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 123.180038][ T9813] loop3: detected capacity change from 0 to 136 13:56:24 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x3c}, 0x0, @in=@multicast1, 0x0, 0x0, 0x0, 0x2}}, 0xe8) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) sendto$inet6(r1, &(0x7f0000000000)="0391cd7ef11bd1da9fdfe54b980bdcbbb9300dc8241347a9ca94f3a9a8bf3f73cd2534a36b38de52ecd4187279a097a1c06594b4bb3c0b15f925e09911a3f463d843562272", 0x45, 0x20004800, &(0x7f0000000080)={0xa, 0x4e21, 0x7, @empty, 0x8}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 123.226927][ T9813] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:56:24 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x300000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:24 executing program 3 (fault-call:3 fault-nth:9): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 123.275334][ T9844] loop4: detected capacity change from 0 to 264192 [ 123.291946][ T9850] loop5: detected capacity change from 0 to 136 [ 123.300484][ T9844] EXT4-fs (loop4): Unrecognized mount option "test_dummy_encry" or missing value [ 123.335963][ T9855] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 123.344205][ T9855] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 13:56:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 123.377344][ T9865] FAULT_INJECTION: forcing a failure. [ 123.377344][ T9865] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 123.390464][ T9865] CPU: 1 PID: 9865 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 123.398802][ T9865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.408940][ T9865] Call Trace: [ 123.412220][ T9865] dump_stack+0x137/0x19d [ 123.416562][ T9865] should_fail+0x23c/0x250 [ 123.421016][ T9865] should_fail_usercopy+0x16/0x20 [ 123.426094][ T9865] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 123.432169][ T9865] ? shmem_write_begin+0x7e/0x100 [ 123.437242][ T9865] generic_perform_write+0x1e4/0x3a0 [ 123.442716][ T9865] ? file_update_time+0x1bd/0x3e0 [ 123.447746][ T9865] __generic_file_write_iter+0x161/0x300 [ 123.453386][ T9865] ? generic_write_checks+0x250/0x290 [ 123.459283][ T9865] generic_file_write_iter+0x75/0x130 [ 123.464657][ T9865] vfs_write+0x69d/0x770 [ 123.468908][ T9865] __x64_sys_pwrite64+0xf5/0x150 [ 123.473860][ T9865] do_syscall_64+0x4a/0x90 [ 123.478330][ T9865] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 123.480316][ T9871] loop5: detected capacity change from 0 to 136 [ 123.484227][ T9865] RIP: 0033:0x419797 [ 123.484246][ T9865] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 123.514026][ T9865] RSP: 002b:00007f4f4c084f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 13:56:24 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x400000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:24 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,n']) [ 123.522546][ T9865] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 123.530528][ T9865] RDX: 0000000000000006 RSI: 0000000020010600 RDI: 0000000000000005 [ 123.538499][ T9865] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 123.546468][ T9865] R10: 0000000000008800 R11: 0000000000000293 R12: 0000000000000005 [ 123.554444][ T9865] R13: 0000000000000005 R14: 0000000020001500 R15: 0000000000000000 13:56:24 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x504f01}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 123.590757][ T9865] loop3: detected capacity change from 0 to 136 [ 123.622336][ T9865] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:56:25 executing program 3 (fault-call:3 fault-nth:10): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 123.637330][ T9855] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 123.645598][ T9855] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 13:56:25 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x600000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 123.695921][ T9885] loop4: detected capacity change from 0 to 264192 [ 123.719368][ T9885] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 123.726968][ T9885] EXT4-fs (loop4): Unrecognized mount option "n" or missing value [ 123.756410][ T9897] FAULT_INJECTION: forcing a failure. [ 123.756410][ T9897] name failslab, interval 1, probability 0, space 0, times 0 [ 123.769086][ T9897] CPU: 1 PID: 9897 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 123.777415][ T9897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.787475][ T9897] Call Trace: [ 123.790758][ T9897] dump_stack+0x137/0x19d [ 123.795201][ T9897] should_fail+0x23c/0x250 [ 123.799622][ T9897] ? getname_flags+0x84/0x3d0 [ 123.804296][ T9897] __should_failslab+0x81/0x90 [ 123.809094][ T9897] should_failslab+0x5/0x20 [ 123.813603][ T9897] kmem_cache_alloc+0x46/0x2e0 [ 123.818450][ T9897] getname_flags+0x84/0x3d0 [ 123.822949][ T9897] ? vfs_write+0x50c/0x770 [ 123.827389][ T9897] getname+0x15/0x20 [ 123.831299][ T9897] do_sys_openat2+0x5b/0x250 [ 123.835892][ T9897] __x64_sys_openat+0xef/0x110 [ 123.840654][ T9897] do_syscall_64+0x4a/0x90 [ 123.845067][ T9897] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 123.851022][ T9897] RIP: 0033:0x4196e4 [ 123.854910][ T9897] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 123.874582][ T9897] RSP: 002b:00007f4f4c084ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 123.882998][ T9897] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004196e4 [ 123.891015][ T9897] RDX: 0000000000000002 RSI: 00007f4f4c085000 RDI: 00000000ffffff9c [ 123.899061][ T9897] RBP: 00007f4f4c085000 R08: 0000000000000000 R09: ffffffffffffffff 13:56:25 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,n']) 13:56:25 executing program 3 (fault-call:3 fault-nth:11): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:25 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0xc0631d}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 123.907079][ T9897] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 123.915108][ T9897] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 124.000673][ T9910] FAULT_INJECTION: forcing a failure. [ 124.000673][ T9910] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 124.013764][ T9910] CPU: 1 PID: 9910 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 124.022104][ T9910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.032212][ T9910] Call Trace: [ 124.035590][ T9910] dump_stack+0x137/0x19d [ 124.039960][ T9910] should_fail+0x23c/0x250 [ 124.044384][ T9910] should_fail_usercopy+0x16/0x20 13:56:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfe, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:25 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480), 0x200401, 0x0) r3 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000001140)={0x14, r3, 0xa1da88959761b763}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="100026bd7000fedbdf25060000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000006000400030000008128dbc18f0e052337fee8dd91a507f5ef2b54d2cfe00aeaa2f504aa747413f1470f15972415239a66202e63cf9787b5be7df1ec10550a76000000000000000000000019511226293f80c1b4899671ff02cd58465ded12f58840eb4821c8bc8651d112b91151d6c7f441eb016db39d5628f5de694b5c14d40c5b00b0ad94acae9be7e0b7e6748013bb1de5e24c9352c8fd095bf9b358ec90bb"], 0x44}, 0x1, 0x0, 0x0, 0xc0}, 0x8000) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0xfc, r4, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x24004080}, 0x40) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000700)={0xc8, r0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [{@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0xfffffffffffffe93}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci}, {@pci}]}, 0xc8}, 0x1, 0x0, 0x0, 0x8800}, 0x20000082) set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) r6 = signalfd(r1, &(0x7f0000000100)={[0xf59]}, 0x8) sendfile(r5, r6, &(0x7f0000000140)=0x6, 0x9) 13:56:25 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x1000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 124.049430][ T9910] strncpy_from_user+0x21/0x250 [ 124.054351][ T9910] getname_flags+0xb8/0x3d0 [ 124.058860][ T9910] ? vfs_write+0x50c/0x770 [ 124.063282][ T9910] getname+0x15/0x20 [ 124.067179][ T9910] do_sys_openat2+0x5b/0x250 [ 124.071885][ T9910] __x64_sys_openat+0xef/0x110 [ 124.076713][ T9910] do_syscall_64+0x4a/0x90 [ 124.081209][ T9910] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.087125][ T9910] RIP: 0033:0x4196e4 [ 124.091043][ T9910] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 124.110653][ T9910] RSP: 002b:00007f4f4c084ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 124.119072][ T9910] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004196e4 [ 124.127067][ T9910] RDX: 0000000000000002 RSI: 00007f4f4c085000 RDI: 00000000ffffff9c [ 124.135064][ T9910] RBP: 00007f4f4c085000 R08: 0000000000000000 R09: ffffffffffffffff [ 124.143107][ T9910] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 13:56:25 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x14f5000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 124.151100][ T9910] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 124.171255][ T9919] loop4: detected capacity change from 0 to 264192 [ 124.190556][ T9925] loop5: detected capacity change from 0 to 136 13:56:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x126, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:25 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,n']) [ 124.197817][ T9919] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 124.205368][ T9919] EXT4-fs (loop4): Unrecognized mount option "n" or missing value [ 124.235098][ T9924] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 13:56:25 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x10000200}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 124.243317][ T9924] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 13:56:25 executing program 3 (fault-call:3 fault-nth:12): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:25 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x1d63c000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 124.284717][ T9938] loop5: detected capacity change from 0 to 136 [ 124.322347][ T9924] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9924 comm=syz-executor.2 13:56:25 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x8802, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000140)) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f00000000c0)) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000180)={{r3}, 0xe03b, 0x4, 0x274e}) [ 124.365389][ T9932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9932 comm=syz-executor.2 [ 124.393204][ T9948] loop4: detected capacity change from 0 to 264192 [ 124.405027][ T9948] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:56:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x127, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:25 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x1f000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 124.412558][ T9948] EXT4-fs (loop4): Unrecognized mount option "n" or missing value [ 124.418200][ T9960] FAULT_INJECTION: forcing a failure. [ 124.418200][ T9960] name failslab, interval 1, probability 0, space 0, times 0 [ 124.433294][ T9960] CPU: 1 PID: 9960 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 124.441714][ T9960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.451772][ T9960] Call Trace: [ 124.455052][ T9960] dump_stack+0x137/0x19d [ 124.459427][ T9960] should_fail+0x23c/0x250 [ 124.463846][ T9960] ? __alloc_file+0x2e/0x1a0 [ 124.468443][ T9960] __should_failslab+0x81/0x90 [ 124.473338][ T9960] should_failslab+0x5/0x20 [ 124.477886][ T9960] kmem_cache_alloc+0x46/0x2e0 [ 124.482785][ T9960] __alloc_file+0x2e/0x1a0 [ 124.487204][ T9960] alloc_empty_file+0xcd/0x1c0 [ 124.491973][ T9960] path_openat+0x6a/0x20b0 [ 124.496396][ T9960] ? iov_iter_advance+0x291/0xe10 [ 124.501500][ T9960] ? shmem_write_end+0x37d/0x3d0 [ 124.506449][ T9960] ? balance_dirty_pages_ratelimited+0xb1/0x280 13:56:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x64, r2, 0xc0f, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:syslog_conf_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2={0xff, 0x2, '\x00', 0x2}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x2}}]}, 0x64}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x15}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x5}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x64}, 0x1, 0x0, 0x0, 0x40011}, 0x40) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_LISTALL(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES32], 0x28}}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r5) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r5) sendmsg$NL802154_CMD_SET_CCA_MODE(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r7, 0x1}, 0x14}}, 0x0) sendmsg$NL802154_CMD_SET_TX_POWER(r4, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r7, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x200480d4}, 0x20000890) [ 124.512706][ T9960] ? generic_perform_write+0x332/0x3a0 [ 124.518172][ T9960] do_filp_open+0xd9/0x1f0 [ 124.522911][ T9960] ? __virt_addr_valid+0x15a/0x1a0 [ 124.528062][ T9960] ? __check_object_size+0x253/0x310 [ 124.533356][ T9960] ? alloc_fd+0x36d/0x3c0 [ 124.537697][ T9960] do_sys_openat2+0xa3/0x250 [ 124.542372][ T9960] __x64_sys_openat+0xef/0x110 [ 124.547220][ T9960] do_syscall_64+0x4a/0x90 [ 124.551658][ T9960] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.557621][ T9960] RIP: 0033:0x4196e4 13:56:25 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') set_mempolicy(0x3, &(0x7f0000000000)=0xffffffffffffff81, 0x5) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x71}], 0x1, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0xd00) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x81, 0x400, 0x0, 'queue1\x00', 0x10001}) [ 124.561516][ T9960] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 124.581349][ T9960] RSP: 002b:00007f4f4c084ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 124.589773][ T9960] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004196e4 [ 124.597752][ T9960] RDX: 0000000000000002 RSI: 00007f4f4c085000 RDI: 00000000ffffff9c [ 124.605804][ T9960] RBP: 00007f4f4c085000 R08: 0000000000000000 R09: ffffffffffffffff 13:56:25 executing program 3 (fault-call:3 fault-nth:13): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:26 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquo']) 13:56:26 executing program 0: r0 = epoll_create1(0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x1800) r2 = socket(0x1, 0x80000, 0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)={0x4}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f0000000100)={0x8000200e}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x1}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) epoll_wait(r0, &(0x7f0000000140)=[{}], 0x1, 0x0) [ 124.613944][ T9960] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 124.621919][ T9960] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 124.697048][ T9976] loop5: detected capacity change from 0 to 136 [ 124.702275][ T9981] FAULT_INJECTION: forcing a failure. [ 124.702275][ T9981] name failslab, interval 1, probability 0, space 0, times 0 [ 124.715898][ T9981] CPU: 0 PID: 9981 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 124.724235][ T9981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.734287][ T9981] Call Trace: [ 124.737565][ T9981] dump_stack+0x137/0x19d [ 124.741912][ T9981] should_fail+0x23c/0x250 [ 124.746331][ T9981] ? security_file_alloc+0x30/0x190 [ 124.751588][ T9981] __should_failslab+0x81/0x90 [ 124.756354][ T9981] should_failslab+0x5/0x20 [ 124.760868][ T9981] kmem_cache_alloc+0x46/0x2e0 [ 124.765665][ T9981] ? __alloc_file+0x2e/0x1a0 [ 124.770310][ T9981] security_file_alloc+0x30/0x190 [ 124.775331][ T9981] __alloc_file+0x83/0x1a0 [ 124.779794][ T9981] alloc_empty_file+0xcd/0x1c0 [ 124.784554][ T9981] path_openat+0x6a/0x20b0 [ 124.788966][ T9981] ? iov_iter_advance+0x291/0xe10 [ 124.793987][ T9981] ? shmem_write_end+0x37d/0x3d0 [ 124.798923][ T9981] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 124.805208][ T9981] ? generic_perform_write+0x332/0x3a0 [ 124.810665][ T9981] do_filp_open+0xd9/0x1f0 [ 124.815083][ T9981] ? __virt_addr_valid+0x15a/0x1a0 [ 124.820218][ T9981] ? __check_object_size+0x253/0x310 [ 124.825505][ T9981] ? alloc_fd+0x36d/0x3c0 [ 124.829835][ T9981] do_sys_openat2+0xa3/0x250 [ 124.834422][ T9981] __x64_sys_openat+0xef/0x110 [ 124.839215][ T9981] do_syscall_64+0x4a/0x90 13:56:26 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x20000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:26 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x4000, &(0x7f0000000080)=0x1, 0x7fffffff) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x6082, 0x0) [ 124.843689][ T9981] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.849582][ T9981] RIP: 0033:0x4196e4 [ 124.853466][ T9981] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 124.873158][ T9981] RSP: 002b:00007f4f4c084ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 124.881576][ T9981] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004196e4 [ 124.889546][ T9981] RDX: 0000000000000002 RSI: 00007f4f4c085000 RDI: 00000000ffffff9c 13:56:26 executing program 3 (fault-call:3 fault-nth:14): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:26 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x41000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 124.897517][ T9981] RBP: 00007f4f4c085000 R08: 0000000000000000 R09: ffffffffffffffff [ 124.905545][ T9981] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 124.913529][ T9981] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 13:56:26 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0xf5ffffff}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x130, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 124.980387][ T9986] loop4: detected capacity change from 0 to 264192 [ 125.011878][T10011] FAULT_INJECTION: forcing a failure. [ 125.011878][T10011] name failslab, interval 1, probability 0, space 0, times 0 13:56:26 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) syz_open_dev$sg(&(0x7f0000000080), 0x8001, 0x201) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 125.024567][T10011] CPU: 1 PID: 10011 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 125.032994][T10011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.037459][ T9986] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 125.043052][T10011] Call Trace: [ 125.043062][T10011] dump_stack+0x137/0x19d [ 125.043089][T10011] should_fail+0x23c/0x250 [ 125.050581][ T9986] EXT4-fs (loop4): Unrecognized mount option "noquo" or missing value [ 125.070692][T10011] ? loop_set_status_from_info+0x3a0/0x3a0 13:56:26 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0xff8f0000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 125.076527][T10011] __should_failslab+0x81/0x90 [ 125.081307][T10011] ? __kthread_create_on_node+0x7a/0x290 [ 125.086993][T10011] should_failslab+0x5/0x20 [ 125.091529][T10011] kmem_cache_alloc_trace+0x49/0x310 [ 125.096862][T10011] ? loop_set_status_from_info+0x3a0/0x3a0 [ 125.102675][T10011] __kthread_create_on_node+0x7a/0x290 [ 125.108482][T10011] ? __cond_resched+0x11/0x40 [ 125.113238][T10011] ? __blkdev_get+0x8c/0x6c0 [ 125.117833][T10011] ? loop_set_status_from_info+0x3a0/0x3a0 [ 125.123662][T10011] kthread_create_on_node+0x72/0xa0 13:56:26 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8000, &(0x7f0000000080)=0x1ff, 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x480800, 0x0) 13:56:26 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0xfffffff5}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 125.129018][T10011] loop_configure+0x597/0xcb0 [ 125.133697][T10011] ? mntput+0x45/0x70 [ 125.137707][T10011] lo_ioctl+0x555/0x11f0 [ 125.142123][T10011] ? path_openat+0x19ab/0x20b0 [ 125.146892][T10011] ? putname+0xa5/0xc0 [ 125.150961][T10011] ? ___cache_free+0x3c/0x300 [ 125.155700][T10011] ? blkdev_common_ioctl+0x9c3/0x1040 [ 125.161083][T10011] ? selinux_file_ioctl+0x8e0/0x970 [ 125.166287][T10011] ? lo_release+0x120/0x120 [ 125.170792][T10011] blkdev_ioctl+0x1d0/0x3c0 [ 125.175299][T10011] block_ioctl+0x6d/0x80 [ 125.179543][T10011] ? blkdev_iopoll+0x70/0x70 [ 125.184130][T10011] __se_sys_ioctl+0xcb/0x140 [ 125.187782][T10020] loop5: detected capacity change from 0 to 136 [ 125.188719][T10011] __x64_sys_ioctl+0x3f/0x50 [ 125.188743][T10011] do_syscall_64+0x4a/0x90 [ 125.203942][T10011] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.209838][T10011] RIP: 0033:0x4663b7 13:56:26 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquo']) [ 125.213726][T10011] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.233333][T10011] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 125.241825][T10011] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 125.249887][T10011] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 125.257857][T10011] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 125.265828][T10011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 125.273827][T10011] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 125.346285][T10044] loop4: detected capacity change from 0 to 264192 [ 125.354663][T10044] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 125.362243][T10044] EXT4-fs (loop4): Unrecognized mount option "noquo" or missing value 13:56:26 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000000)={@empty, @loopback, @private0, 0xa3, 0x81, 0xfffc, 0x500, 0x0, 0x40000004}) sendmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x28, 0x29, 0x2, "49663ca08e8cc74f380c4a7491701c706f"}], 0x28}}], 0x2, 0x0) 13:56:26 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x8, 0x0, 0x0}, 0x58) 13:56:26 executing program 3 (fault-call:3 fault-nth:15): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:26 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x101) set_mempolicy(0x1, &(0x7f0000000080)=0x1000, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x204, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:26 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquo']) [ 125.639207][T10064] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 125.647422][T10064] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 125.657168][T10061] loop4: detected capacity change from 0 to 264192 [ 125.657985][T10060] FAULT_INJECTION: forcing a failure. [ 125.657985][T10060] name failslab, interval 1, probability 0, space 0, times 0 [ 125.675462][T10061] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:56:27 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x10, 0x0, 0x0}, 0x58) 13:56:27 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x30, 0x0, 0x0}, 0x58) 13:56:27 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x200200, 0x0) 13:56:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) r2 = accept$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000300)=0x1d4d, 0x4) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e21, @loopback}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x2, 0x4) socket$inet(0x2, 0x2, 0x3ff) r3 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)="92c111c372f4739981428fbd4c9083a25c011c6f8cd010670a1991b1f2bacb60fda3122730fe961af5c624a8d0d313c9f74d116e4c2cc388fd094da923dbd21d868ad8ff1aeda647f2458f9fb725e2a97bd6e0b965242a744a6c57610d4813da9a7a4bd266e921232540f547eb03905a63ba4bb0fb8a01424f", 0x79, 0x24048880, &(0x7f0000000240)={0x2, 0x4e24, @local}, 0x10) connect$inet(r3, &(0x7f0000000440)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e21, @empty}, 0x10) [ 125.676327][T10060] CPU: 0 PID: 10060 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 125.683893][T10061] EXT4-fs (loop4): Unrecognized mount option "noquo" or missing value [ 125.692253][T10060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.692266][T10060] Call Trace: [ 125.692273][T10060] dump_stack+0x137/0x19d [ 125.715255][T10063] loop5: detected capacity change from 0 to 136 [ 125.718080][T10060] should_fail+0x23c/0x250 [ 125.718106][T10060] ? __kernfs_new_node+0x6a/0x330 [ 125.733829][T10060] __should_failslab+0x81/0x90 [ 125.738621][T10060] should_failslab+0x5/0x20 [ 125.743143][T10060] kmem_cache_alloc+0x46/0x2e0 [ 125.747905][T10060] __kernfs_new_node+0x6a/0x330 [ 125.752754][T10060] ? __cgroup_account_cputime+0xb6/0x1e0 [ 125.758501][T10060] ? rb_insert_color+0x7e/0x310 [ 125.763351][T10060] kernfs_create_dir_ns+0x5e/0x140 [ 125.768466][T10060] internal_create_group+0x138/0x850 [ 125.773748][T10060] ? check_preempt_wakeup+0x22f/0x360 [ 125.779104][T10060] sysfs_create_group+0x1b/0x20 [ 125.783937][T10060] loop_configure+0xa21/0xcb0 [ 125.788619][T10060] lo_ioctl+0x555/0x11f0 [ 125.792906][T10060] ? path_openat+0x19ab/0x20b0 [ 125.797739][T10060] ? putname+0xa5/0xc0 [ 125.801910][T10060] ? ___cache_free+0x3c/0x300 [ 125.806566][T10060] ? blkdev_common_ioctl+0x9c3/0x1040 [ 125.811931][T10060] ? selinux_file_ioctl+0x8e0/0x970 [ 125.817153][T10060] ? lo_release+0x120/0x120 [ 125.821661][T10060] blkdev_ioctl+0x1d0/0x3c0 [ 125.826148][T10060] block_ioctl+0x6d/0x80 [ 125.830372][T10060] ? blkdev_iopoll+0x70/0x70 [ 125.834941][T10060] __se_sys_ioctl+0xcb/0x140 [ 125.839527][T10060] __x64_sys_ioctl+0x3f/0x50 [ 125.844097][T10060] do_syscall_64+0x4a/0x90 [ 125.848493][T10060] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.854370][T10060] RIP: 0033:0x4663b7 [ 125.858278][T10060] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.878128][T10060] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:56:27 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:27 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x41, 0x0, 0x0}, 0x58) [ 125.886529][T10060] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 125.894493][T10060] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 125.903649][T10060] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 125.911630][T10060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 125.919641][T10060] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 125.927631][T10060] loop3: detected capacity change from 0 to 136 13:56:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2cf, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:27 executing program 3 (fault-call:3 fault-nth:16): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 125.987301][T10060] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 126.022217][T10094] loop4: detected capacity change from 0 to 264192 13:56:27 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x60, 0x0, 0x0}, 0x58) 13:56:27 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x3, &(0x7f0000000080), 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 126.030634][T10094] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 126.063210][T10104] loop5: detected capacity change from 0 to 136 [ 126.102998][T10094] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 126.127608][T10117] FAULT_INJECTION: forcing a failure. [ 126.127608][T10117] name failslab, interval 1, probability 0, space 0, times 0 [ 126.132098][T10094] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 126.140282][T10117] CPU: 1 PID: 10117 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 126.161651][T10117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.171702][T10117] Call Trace: 13:56:27 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x1f00, 0x0, 0x0}, 0x58) 13:56:27 executing program 2: getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:27 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquot']) 13:56:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2d8, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:27 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x2000, 0x0, 0x0}, 0x58) [ 126.174978][T10117] dump_stack+0x137/0x19d [ 126.179330][T10117] should_fail+0x23c/0x250 [ 126.183744][T10117] ? __kernfs_new_node+0x6a/0x330 [ 126.188770][T10117] __should_failslab+0x81/0x90 [ 126.193585][T10117] should_failslab+0x5/0x20 [ 126.198088][T10117] kmem_cache_alloc+0x46/0x2e0 [ 126.202861][T10117] ? __cond_resched+0x11/0x40 [ 126.207545][T10117] __kernfs_new_node+0x6a/0x330 [ 126.212393][T10117] ? idr_alloc_cyclic+0x249/0x2d0 [ 126.217426][T10117] ? rb_insert_color+0x7e/0x310 [ 126.222316][T10117] kernfs_new_node+0x5b/0xd0 [ 126.226930][T10117] __kernfs_create_file+0x45/0x1a0 [ 126.232074][T10117] sysfs_add_file_mode_ns+0x1c1/0x250 [ 126.237449][T10117] internal_create_group+0x2e4/0x850 [ 126.242793][T10117] sysfs_create_group+0x1b/0x20 [ 126.247652][T10117] loop_configure+0xa21/0xcb0 [ 126.252333][T10117] lo_ioctl+0x555/0x11f0 [ 126.256613][T10117] ? path_openat+0x19ab/0x20b0 [ 126.261379][T10117] ? putname+0xa5/0xc0 [ 126.265441][T10117] ? ___cache_free+0x3c/0x300 [ 126.270113][T10117] ? blkdev_common_ioctl+0x9c3/0x1040 [ 126.275491][T10117] ? selinux_file_ioctl+0x8e0/0x970 [ 126.280720][T10117] ? lo_release+0x120/0x120 [ 126.285231][T10117] blkdev_ioctl+0x1d0/0x3c0 [ 126.289804][T10117] block_ioctl+0x6d/0x80 [ 126.294135][T10117] ? blkdev_iopoll+0x70/0x70 [ 126.298727][T10117] __se_sys_ioctl+0xcb/0x140 [ 126.303457][T10117] __x64_sys_ioctl+0x3f/0x50 [ 126.308098][T10117] do_syscall_64+0x4a/0x90 [ 126.312556][T10117] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.318429][T10117] RIP: 0033:0x4663b7 [ 126.322394][T10117] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.341980][T10117] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 126.350382][T10117] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 126.358331][T10117] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 126.366299][T10117] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 126.374275][T10117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 126.382234][T10117] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 126.391249][T10117] loop3: detected capacity change from 0 to 136 [ 126.405621][T10117] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 126.419418][T10138] loop5: detected capacity change from 0 to 136 [ 126.464401][T10146] loop4: detected capacity change from 0 to 264192 [ 126.472617][T10146] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 126.480216][T10146] EXT4-fs (loop4): Unrecognized mount option "noquot" or missing value 13:56:28 executing program 0: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'filter\x00', 0x18030000, [0x0, 0x0, 0x1, 0x101, 0x100000]}, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000080)='./file1\x00', 0x40000000, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="696f6368610f03056e9b5339bb33322c00"]) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x0) 13:56:28 executing program 2: set_mempolicy(0x2, &(0x7f0000000080)=0x4, 0x404) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) r1 = openat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0xc0, 0x44, 0x11}, 0x18) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000140)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r3 = syz_open_pts(r2, 0x0) dup2(r3, r2) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$KDSKBENT(r4, 0x4b47, &(0x7f0000000180)={0x82, 0x81, 0x9}) 13:56:28 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x3000, 0x0, 0x0}, 0x58) 13:56:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2d9, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:28 executing program 3 (fault-call:3 fault-nth:17): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:28 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquot']) 13:56:28 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) 13:56:28 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x4000, 0x0, 0x0}, 0x58) [ 126.888195][T10163] loop5: detected capacity change from 0 to 136 [ 126.969901][T10170] loop4: detected capacity change from 0 to 264192 [ 126.976994][T10169] FAULT_INJECTION: forcing a failure. [ 126.976994][T10169] name failslab, interval 1, probability 0, space 0, times 0 [ 126.992232][T10169] CPU: 1 PID: 10169 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 127.000665][T10169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.010718][T10169] Call Trace: [ 127.013993][T10169] dump_stack+0x137/0x19d [ 127.018395][T10169] should_fail+0x23c/0x250 [ 127.022831][T10169] ? __kernfs_new_node+0x6a/0x330 [ 127.027866][T10169] __should_failslab+0x81/0x90 [ 127.032663][T10169] should_failslab+0x5/0x20 [ 127.037244][T10169] kmem_cache_alloc+0x46/0x2e0 [ 127.042035][T10169] __kernfs_new_node+0x6a/0x330 [ 127.046892][T10169] ? __cond_resched+0x11/0x40 [ 127.051594][T10169] ? mutex_lock+0x9/0x30 [ 127.055838][T10169] kernfs_new_node+0x5b/0xd0 [ 127.060480][T10169] __kernfs_create_file+0x45/0x1a0 [ 127.065617][T10169] sysfs_add_file_mode_ns+0x1c1/0x250 [ 127.071007][T10169] internal_create_group+0x2e4/0x850 [ 127.076335][T10169] sysfs_create_group+0x1b/0x20 [ 127.081189][T10169] loop_configure+0xa21/0xcb0 [ 127.085871][T10169] lo_ioctl+0x555/0x11f0 [ 127.090111][T10169] ? path_openat+0x19ab/0x20b0 [ 127.094877][T10169] ? putname+0xa5/0xc0 [ 127.098948][T10169] ? ___cache_free+0x3c/0x300 [ 127.103634][T10169] ? blkdev_common_ioctl+0x9c3/0x1040 [ 127.109018][T10169] ? selinux_file_ioctl+0x8e0/0x970 [ 127.114221][T10169] ? lo_release+0x120/0x120 [ 127.118795][T10169] blkdev_ioctl+0x1d0/0x3c0 [ 127.123299][T10169] block_ioctl+0x6d/0x80 [ 127.127600][T10169] ? blkdev_iopoll+0x70/0x70 [ 127.132191][T10169] __se_sys_ioctl+0xcb/0x140 [ 127.136853][T10169] __x64_sys_ioctl+0x3f/0x50 [ 127.141447][T10169] do_syscall_64+0x4a/0x90 [ 127.145863][T10169] ? irqentry_exit_to_user_mode+0x5/0x20 [ 127.151507][T10169] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.157462][T10169] RIP: 0033:0x4663b7 [ 127.158114][T10210] loop5: detected capacity change from 0 to 136 13:56:28 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x4100, 0x0, 0x0}, 0x58) 13:56:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:28 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4000) io_setup(0x202, &(0x7f0000000200)=0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000001c0)={0x0, 0x2, 0x3, 0x400001299}) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0xffff7f0800000500, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a000000}]) 13:56:28 executing program 2: set_mempolicy(0x0, &(0x7f0000000000)=0x2, 0x401) set_mempolicy(0x8000, &(0x7f0000000080)=0x7, 0x7) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:28 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x6000, 0x0, 0x0}, 0x58) 13:56:28 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) [ 127.161379][T10169] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.161400][T10169] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 127.195702][T10169] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 127.203751][T10169] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 127.211722][T10169] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 127.219730][T10169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 127.227703][T10169] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 127.238558][T10169] loop3: detected capacity change from 0 to 136 [ 127.238585][T10170] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 127.252600][T10170] EXT4-fs (loop4): Unrecognized mount option "noquot" or missing value 13:56:28 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x8fff, 0x0, 0x0}, 0x58) 13:56:28 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_io_uring_setup(0x4381, &(0x7f00000010c0)={0x0, 0x4413, 0x73, 0x2, 0x1b6}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000001140), &(0x7f0000001180)) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) vmsplice(r0, &(0x7f0000001080)=[{&(0x7f0000000080)="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", 0x1000}], 0x1, 0xb) 13:56:28 executing program 3 (fault-call:3 fault-nth:18): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 127.264102][T10169] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:56:28 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquot']) 13:56:28 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0xff8f, 0x0, 0x0}, 0x58) 13:56:28 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{0x79f, 0xf0, 0xc5, 0x37f}, {0x3ff, 0x2, 0x9, 0x2}, {0x1, 0x0, 0x81, 0x9}, {0x5c1, 0x1, 0x1, 0x1}]}, 0x10) 13:56:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x402, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 127.396805][T10236] FAULT_INJECTION: forcing a failure. [ 127.396805][T10236] name failslab, interval 1, probability 0, space 0, times 0 [ 127.409541][T10236] CPU: 0 PID: 10236 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 127.417978][T10236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.428040][T10236] Call Trace: [ 127.431405][T10236] dump_stack+0x137/0x19d [ 127.435820][T10236] should_fail+0x23c/0x250 [ 127.440246][T10236] ? __kernfs_new_node+0x6a/0x330 [ 127.445282][T10236] __should_failslab+0x81/0x90 [ 127.450153][T10236] should_failslab+0x5/0x20 [ 127.454670][T10236] kmem_cache_alloc+0x46/0x2e0 [ 127.459444][T10236] __kernfs_new_node+0x6a/0x330 [ 127.464337][T10236] ? __cond_resched+0x11/0x40 [ 127.469129][T10236] ? mutex_lock+0x9/0x30 [ 127.473379][T10236] kernfs_new_node+0x5b/0xd0 [ 127.477979][T10236] __kernfs_create_file+0x45/0x1a0 [ 127.483121][T10236] sysfs_add_file_mode_ns+0x1c1/0x250 [ 127.488501][T10236] internal_create_group+0x2e4/0x850 13:56:28 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x20010, 0x0, 0x0}, 0x58) [ 127.493797][T10236] sysfs_create_group+0x1b/0x20 [ 127.498653][T10236] loop_configure+0xa21/0xcb0 [ 127.503381][T10236] lo_ioctl+0x555/0x11f0 [ 127.507622][T10236] ? path_openat+0x19ab/0x20b0 [ 127.512455][T10236] ? putname+0xa5/0xc0 [ 127.516523][T10236] ? ___cache_free+0x3c/0x300 [ 127.521274][T10236] ? blkdev_common_ioctl+0x9c3/0x1040 [ 127.526697][T10236] ? selinux_file_ioctl+0x8e0/0x970 [ 127.531912][T10236] ? lo_release+0x120/0x120 [ 127.536833][T10236] blkdev_ioctl+0x1d0/0x3c0 [ 127.541345][T10236] block_ioctl+0x6d/0x80 [ 127.545591][T10236] ? blkdev_iopoll+0x70/0x70 [ 127.550220][T10236] __se_sys_ioctl+0xcb/0x140 [ 127.554846][T10236] __x64_sys_ioctl+0x3f/0x50 [ 127.559447][T10236] do_syscall_64+0x4a/0x90 [ 127.563970][T10236] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.569867][T10236] RIP: 0033:0x4663b7 [ 127.573831][T10236] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.591439][T10252] loop4: detected capacity change from 0 to 264192 [ 127.593443][T10236] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 127.593468][T10236] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 127.593481][T10236] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 127.593494][T10236] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 127.632311][T10236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 127.640304][T10236] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 127.650182][T10236] loop3: detected capacity change from 0 to 136 [ 127.656460][T10254] loop5: detected capacity change from 0 to 136 13:56:29 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendto$packet(r0, &(0x7f0000000000)="709c3dbe3ae554dde47fa440e5f8f05a566db94e6ff0f0cb92488c27fa7ba8e11b1478f0a6924836e162e0", 0x2b, 0x4004044, &(0x7f0000000080)={0x11, 0x6, 0x0, 0x1, 0x9, 0x6, @multicast}, 0x14) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="0201a6ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa60000000900000087771f72003007000500000000000000008000ca55aa", 0x40, 0x1c0}]) 13:56:29 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x5) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 13:56:29 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x80000, 0x0, 0x0}, 0x58) 13:56:29 executing program 3 (fault-call:3 fault-nth:19): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:29 executing program 4 (fault-call:1 fault-nth:0): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x406, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 127.773927][T10285] FAULT_INJECTION: forcing a failure. [ 127.773927][T10285] name failslab, interval 1, probability 0, space 0, times 0 [ 127.775340][T10282] FAULT_INJECTION: forcing a failure. [ 127.775340][T10282] name failslab, interval 1, probability 0, space 0, times 0 [ 127.786576][T10285] CPU: 0 PID: 10285 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 127.807642][T10285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.817689][T10285] Call Trace: [ 127.821065][T10285] dump_stack+0x137/0x19d [ 127.825394][T10285] should_fail+0x23c/0x250 [ 127.829820][T10285] __should_failslab+0x81/0x90 [ 127.834594][T10285] ? __se_sys_memfd_create+0xfb/0x390 [ 127.839971][T10285] should_failslab+0x5/0x20 [ 127.844486][T10285] __kmalloc+0x66/0x350 [ 127.848696][T10285] ? strnlen_user+0x137/0x1c0 [ 127.853376][T10285] __se_sys_memfd_create+0xfb/0x390 [ 127.858571][T10285] __x64_sys_memfd_create+0x2d/0x40 [ 127.863794][T10285] do_syscall_64+0x4a/0x90 [ 127.868314][T10285] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.874209][T10285] RIP: 0033:0x4665f9 [ 127.878136][T10285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.897743][T10285] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 127.906179][T10285] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 127.914147][T10285] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee8e [ 127.922110][T10285] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 127.930080][T10285] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 127.938046][T10285] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000a80 [ 127.946017][T10282] CPU: 1 PID: 10282 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 127.954439][T10282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.964520][T10282] Call Trace: [ 127.967806][T10282] dump_stack+0x137/0x19d [ 127.972146][T10282] should_fail+0x23c/0x250 [ 127.976571][T10282] ? __kernfs_new_node+0x6a/0x330 [ 127.981593][T10282] __should_failslab+0x81/0x90 [ 127.986363][T10282] should_failslab+0x5/0x20 [ 127.990873][T10282] kmem_cache_alloc+0x46/0x2e0 [ 127.995648][T10282] __kernfs_new_node+0x6a/0x330 [ 128.000550][T10282] ? __cond_resched+0x11/0x40 [ 128.005236][T10282] ? mutex_lock+0x9/0x30 [ 128.009910][T10282] kernfs_new_node+0x5b/0xd0 [ 128.014511][T10282] __kernfs_create_file+0x45/0x1a0 [ 128.019644][T10282] sysfs_add_file_mode_ns+0x1c1/0x250 [ 128.025024][T10282] internal_create_group+0x2e4/0x850 [ 128.030390][T10282] sysfs_create_group+0x1b/0x20 [ 128.035311][T10282] loop_configure+0xa21/0xcb0 [ 128.040067][T10282] lo_ioctl+0x555/0x11f0 [ 128.044335][T10282] ? path_openat+0x19ab/0x20b0 [ 128.049112][T10282] ? putname+0xa5/0xc0 [ 128.053180][T10282] ? ___cache_free+0x3c/0x300 [ 128.057859][T10282] ? blkdev_common_ioctl+0x9c3/0x1040 [ 128.063263][T10282] ? selinux_file_ioctl+0x8e0/0x970 [ 128.068467][T10282] ? lo_release+0x120/0x120 [ 128.073097][T10282] blkdev_ioctl+0x1d0/0x3c0 [ 128.077607][T10282] block_ioctl+0x6d/0x80 [ 128.081856][T10282] ? blkdev_iopoll+0x70/0x70 [ 128.086485][T10282] __se_sys_ioctl+0xcb/0x140 [ 128.091087][T10282] __x64_sys_ioctl+0x3f/0x50 [ 128.095788][T10282] do_syscall_64+0x4a/0x90 [ 128.100272][T10282] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.106243][T10282] RIP: 0033:0x4663b7 13:56:29 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x100000, 0x0, 0x0}, 0x58) 13:56:29 executing program 2: set_mempolicy(0x1, &(0x7f00000000c0)=0x2000000000000004, 0x3) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xc8001, 0x0) set_mempolicy(0x8000, &(0x7f0000000080)=0x3ff, 0x7) socket$inet6(0xa, 0x3, 0xf3) 13:56:29 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f000000dfaa)="5500000019007f5300fe01b2a4a280930a60000cffa84302910000003900090035000c00060000002d00150005000000000000dc1338d54400009b84136ef75afb83de4411000500c43ab891d40000200000000000", 0x55}], 0x1}, 0x0) 13:56:29 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x300000, 0x0, 0x0}, 0x58) 13:56:29 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x8eaf) 13:56:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@local}, 0x14) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x35}}, 0x14) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13) 13:56:29 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x400000, 0x0, 0x0}, 0x58) [ 128.110130][T10282] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.129883][T10282] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 128.138297][T10282] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 128.146274][T10282] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 128.154315][T10282] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 128.162333][T10282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 13:56:29 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x8, 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) sendto$inet(r1, &(0x7f00000001c0)="cc0c75938d1f59c1d15987f021a9175419ba101c2927609464be6a2485831474b6d87ca2b7555c6c5bb0d9fdf01600056861de1256af90bbacef93022fd54627b80d251c370f34eb26c793cb9b9b3d75a23f0716c3ee2749bec258fe590fb839cd30060aca423b21241dddc28e78fd13fb2416380952f7ef0b8c37d3e2cceace4600a0378539be787133ec45ef0954b3e44e5b4e15f143c74c2bb303d1af04757a1af7af6ea6d0c3cf692cec602c8b7611ef8647db6792e2bd92e1735dbfbc2c2b28d887e49e1002f2e9ff040b4582220201bc5e67dacc26ebdd61f942a9a9ba6a", 0xe1, 0x4080, &(0x7f0000000140)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x22}}, 0x10) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@loopback, @loopback}, 0xc) setsockopt$inet_tcp_int(r0, 0x6, 0xeedfc66c3f17f56c, &(0x7f0000000040)=0xc7, 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x200, 0x490100) setsockopt$inet_tcp_int(r3, 0x6, 0x9, &(0x7f0000000100)=0x2, 0x4) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 13:56:29 executing program 3 (fault-call:3 fault-nth:20): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 128.170309][T10282] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 128.179674][T10282] loop3: detected capacity change from 0 to 136 [ 128.189540][T10282] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 128.199251][T10287] loop5: detected capacity change from 0 to 136 [ 128.278399][T10331] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 128.302219][T10337] FAULT_INJECTION: forcing a failure. [ 128.302219][T10337] name failslab, interval 1, probability 0, space 0, times 0 [ 128.314911][T10337] CPU: 1 PID: 10337 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 128.323327][T10337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.333463][T10337] Call Trace: [ 128.336739][T10337] dump_stack+0x137/0x19d [ 128.341104][T10337] should_fail+0x23c/0x250 [ 128.345527][T10337] ? __kernfs_new_node+0x6a/0x330 [ 128.350573][T10337] __should_failslab+0x81/0x90 [ 128.355467][T10337] should_failslab+0x5/0x20 [ 128.359988][T10337] kmem_cache_alloc+0x46/0x2e0 [ 128.364752][T10337] __kernfs_new_node+0x6a/0x330 [ 128.369622][T10337] ? __cond_resched+0x11/0x40 [ 128.374393][T10337] ? mutex_lock+0x9/0x30 [ 128.378701][T10337] kernfs_new_node+0x5b/0xd0 [ 128.383298][T10337] __kernfs_create_file+0x45/0x1a0 [ 128.384426][T10346] FAULT_INJECTION: forcing a failure. [ 128.384426][T10346] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 128.388557][T10337] sysfs_add_file_mode_ns+0x1c1/0x250 [ 128.388586][T10337] internal_create_group+0x2e4/0x850 [ 128.412248][T10337] sysfs_create_group+0x1b/0x20 [ 128.417142][T10337] loop_configure+0xa21/0xcb0 [ 128.421861][T10337] lo_ioctl+0x555/0x11f0 [ 128.426102][T10337] ? path_openat+0x19ab/0x20b0 [ 128.430980][T10337] ? putname+0xa5/0xc0 [ 128.435047][T10337] ? ___cache_free+0x3c/0x300 [ 128.439719][T10337] ? blkdev_common_ioctl+0x9c3/0x1040 [ 128.445086][T10337] ? selinux_file_ioctl+0x8e0/0x970 [ 128.450277][T10337] ? lo_release+0x120/0x120 [ 128.454806][T10337] blkdev_ioctl+0x1d0/0x3c0 [ 128.459310][T10337] block_ioctl+0x6d/0x80 [ 128.463614][T10337] ? blkdev_iopoll+0x70/0x70 [ 128.468244][T10337] __se_sys_ioctl+0xcb/0x140 [ 128.472831][T10337] __x64_sys_ioctl+0x3f/0x50 [ 128.477432][T10337] do_syscall_64+0x4a/0x90 [ 128.481858][T10337] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.487747][T10337] RIP: 0033:0x4663b7 [ 128.491644][T10337] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.511248][T10337] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 128.519704][T10337] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 13:56:29 executing program 4 (fault-call:1 fault-nth:1): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:29 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x504f01, 0x0, 0x0}, 0x58) 13:56:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 128.527676][T10337] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 128.535714][T10337] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 128.543682][T10337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 128.551660][T10337] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 128.559665][T10346] CPU: 0 PID: 10346 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 128.565694][T10337] loop3: detected capacity change from 0 to 136 [ 128.568090][T10346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.568103][T10346] Call Trace: [ 128.568111][T10346] dump_stack+0x137/0x19d [ 128.577465][T10337] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 128.584379][T10346] should_fail+0x23c/0x250 [ 128.584406][T10346] should_fail_usercopy+0x16/0x20 [ 128.609410][T10346] _copy_from_user+0x1c/0xd0 [ 128.614016][T10346] __se_sys_memfd_create+0x137/0x390 [ 128.619303][T10346] __x64_sys_memfd_create+0x2d/0x40 [ 128.624573][T10346] do_syscall_64+0x4a/0x90 13:56:30 executing program 2: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) [ 128.629011][T10346] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.634912][T10346] RIP: 0033:0x4665f9 [ 128.638862][T10346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.658473][T10346] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 128.666894][T10346] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 13:56:30 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x600000, 0x0, 0x0}, 0x58) 13:56:30 executing program 3 (fault-call:3 fault-nth:21): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 128.674870][T10346] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee8e [ 128.683945][T10346] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 128.691923][T10346] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 128.699996][T10346] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000a80 [ 128.708378][T10344] loop5: detected capacity change from 0 to 136 [ 128.798001][T10366] FAULT_INJECTION: forcing a failure. [ 128.798001][T10366] name failslab, interval 1, probability 0, space 0, times 0 [ 128.810651][T10366] CPU: 1 PID: 10366 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 128.819068][T10366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.829125][T10366] Call Trace: [ 128.832404][T10366] dump_stack+0x137/0x19d [ 128.836756][T10366] should_fail+0x23c/0x250 [ 128.841233][T10366] ? __kernfs_new_node+0x6a/0x330 [ 128.846263][T10366] __should_failslab+0x81/0x90 [ 128.851046][T10366] should_failslab+0x5/0x20 [ 128.855568][T10366] kmem_cache_alloc+0x46/0x2e0 [ 128.860361][T10366] __kernfs_new_node+0x6a/0x330 [ 128.865310][T10366] ? __cond_resched+0x11/0x40 [ 128.870039][T10366] ? mutex_lock+0x9/0x30 [ 128.874314][T10366] kernfs_new_node+0x5b/0xd0 [ 128.878921][T10366] __kernfs_create_file+0x45/0x1a0 [ 128.884125][T10366] sysfs_add_file_mode_ns+0x1c1/0x250 [ 128.890716][T10366] internal_create_group+0x2e4/0x850 [ 128.896030][T10366] sysfs_create_group+0x1b/0x20 [ 128.900900][T10366] loop_configure+0xa21/0xcb0 [ 128.905584][T10366] lo_ioctl+0x555/0x11f0 [ 128.909831][T10366] ? path_openat+0x19ab/0x20b0 [ 128.914599][T10366] ? putname+0xa5/0xc0 [ 128.918762][T10366] ? ___cache_free+0x3c/0x300 [ 128.923442][T10366] ? blkdev_common_ioctl+0x9c3/0x1040 [ 128.928880][T10366] ? selinux_file_ioctl+0x8e0/0x970 [ 128.934083][T10366] ? lo_release+0x120/0x120 [ 128.938595][T10366] blkdev_ioctl+0x1d0/0x3c0 [ 128.943152][T10366] block_ioctl+0x6d/0x80 [ 128.947399][T10366] ? blkdev_iopoll+0x70/0x70 [ 128.951991][T10366] __se_sys_ioctl+0xcb/0x140 [ 128.956589][T10366] __x64_sys_ioctl+0x3f/0x50 [ 128.961240][T10366] do_syscall_64+0x4a/0x90 [ 128.965686][T10366] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.971746][T10366] RIP: 0033:0x4663b7 [ 128.975636][T10366] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:56:30 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) 13:56:30 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0xc0631d, 0x0, 0x0}, 0x58) 13:56:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:30 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x3, &(0x7f0000000040)=0x8, 0x9) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) set_mempolicy(0x0, &(0x7f00000000c0)=0xffffffffffff8000, 0x1) 13:56:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000001140)={0x14, r1, 0xa1da88959761b763}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x13c, r1, 0x800, 0x5, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0xe54f229f906a9da2}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8}}]}, 0x13c}, 0x1, 0x0, 0x0, 0x4004840}, 0x4001) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x2e}, @void, @void}}}, 0xc0}}, 0x0) socket$netlink(0x10, 0x3, 0xa) 13:56:30 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x1000000, 0x0, 0x0}, 0x58) [ 128.995257][T10366] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 129.003738][T10366] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 129.011780][T10366] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 129.020012][T10366] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 129.027982][T10366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 129.035953][T10366] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 129.048294][T10366] loop3: detected capacity change from 0 to 136 [ 129.057912][T10366] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 129.065776][T10382] loop5: detected capacity change from 0 to 136 [ 129.090666][T10397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10397 comm=syz-executor.0 [ 129.103525][T10397] netlink: 67 bytes leftover after parsing attributes in process `syz-executor.0'. 13:56:30 executing program 4 (fault-call:1 fault-nth:2): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:30 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x14f5000, 0x0, 0x0}, 0x58) 13:56:30 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 13:56:30 executing program 3 (fault-call:3 fault-nth:22): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x604, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r2, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) r4 = syz_io_uring_complete(0x0) linkat(r3, &(0x7f0000000080)='./file0\x00', r4, &(0x7f0000000140)='./file0\x00', 0x1400) close(r0) [ 129.142630][T10399] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10399 comm=syz-executor.0 [ 129.155590][T10399] netlink: 67 bytes leftover after parsing attributes in process `syz-executor.0'. [ 129.251503][T10413] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 129.260896][T10415] FAULT_INJECTION: forcing a failure. [ 129.260896][T10415] name failslab, interval 1, probability 0, space 0, times 0 [ 129.273549][T10415] CPU: 1 PID: 10415 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 129.282216][T10415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.292272][T10415] Call Trace: [ 129.295556][T10415] dump_stack+0x137/0x19d [ 129.299899][T10415] should_fail+0x23c/0x250 [ 129.304323][T10415] ? shmem_alloc_inode+0x22/0x30 [ 129.309339][T10415] __should_failslab+0x81/0x90 [ 129.314198][T10415] ? shmem_match+0xa0/0xa0 [ 129.317352][T10413] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 129.318621][T10415] should_failslab+0x5/0x20 [ 129.331188][T10415] kmem_cache_alloc+0x46/0x2e0 [ 129.334785][T10416] FAULT_INJECTION: forcing a failure. [ 129.334785][T10416] name failslab, interval 1, probability 0, space 0, times 0 [ 129.336002][T10415] ? do_anonymous_page+0x411/0x8b0 [ 129.353700][T10415] ? fsnotify_perm+0x59/0x2e0 [ 129.358435][T10415] ? shmem_match+0xa0/0xa0 [ 129.362854][T10415] shmem_alloc_inode+0x22/0x30 [ 129.367666][T10415] new_inode_pseudo+0x38/0x1c0 [ 129.372451][T10415] new_inode+0x21/0x120 [ 129.376607][T10415] shmem_get_inode+0xa1/0x480 [ 129.381278][T10415] __shmem_file_setup+0xf1/0x1d0 [ 129.386258][T10415] shmem_file_setup+0x37/0x40 [ 129.391004][T10415] __se_sys_memfd_create+0x1eb/0x390 [ 129.396375][T10415] __x64_sys_memfd_create+0x2d/0x40 13:56:30 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x4000, &(0x7f0000000080)=0x6, 0xdc000000000000) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:30 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x10000200, 0x0, 0x0}, 0x58) [ 129.401570][T10415] do_syscall_64+0x4a/0x90 [ 129.405981][T10415] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.411872][T10415] RIP: 0033:0x4665f9 [ 129.415757][T10415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.435451][T10415] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 129.444105][T10415] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 129.452157][T10415] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee8e [ 129.460127][T10415] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 129.468093][T10415] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 129.476059][T10415] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000a80 [ 129.484077][T10416] CPU: 0 PID: 10416 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 129.489633][T10414] loop5: detected capacity change from 0 to 136 [ 129.492544][T10416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.492558][T10416] Call Trace: [ 129.492565][T10416] dump_stack+0x137/0x19d [ 129.492589][T10416] should_fail+0x23c/0x250 [ 129.520857][T10416] ? __kernfs_new_node+0x6a/0x330 [ 129.526001][T10416] __should_failslab+0x81/0x90 [ 129.526028][T10416] should_failslab+0x5/0x20 [ 129.535270][T10416] kmem_cache_alloc+0x46/0x2e0 [ 129.540054][T10416] __kernfs_new_node+0x6a/0x330 [ 129.544910][T10416] ? __cond_resched+0x11/0x40 [ 129.549656][T10416] ? mutex_lock+0x9/0x30 [ 129.553915][T10416] kernfs_new_node+0x5b/0xd0 [ 129.558510][T10416] __kernfs_create_file+0x45/0x1a0 [ 129.563623][T10416] sysfs_add_file_mode_ns+0x1c1/0x250 [ 129.569084][T10416] internal_create_group+0x2e4/0x850 [ 129.574402][T10416] sysfs_create_group+0x1b/0x20 [ 129.579296][T10416] loop_configure+0xa21/0xcb0 [ 129.583968][T10416] lo_ioctl+0x555/0x11f0 [ 129.588206][T10416] ? path_openat+0x19ab/0x20b0 [ 129.592991][T10416] ? putname+0xa5/0xc0 [ 129.597054][T10416] ? ___cache_free+0x3c/0x300 [ 129.601729][T10416] ? blkdev_common_ioctl+0x9c3/0x1040 [ 129.607161][T10416] ? selinux_file_ioctl+0x8e0/0x970 [ 129.612531][T10416] ? lo_release+0x120/0x120 [ 129.617031][T10416] blkdev_ioctl+0x1d0/0x3c0 [ 129.621547][T10416] block_ioctl+0x6d/0x80 [ 129.625800][T10416] ? blkdev_iopoll+0x70/0x70 [ 129.630393][T10416] __se_sys_ioctl+0xcb/0x140 [ 129.635027][T10416] __x64_sys_ioctl+0x3f/0x50 [ 129.639644][T10416] do_syscall_64+0x4a/0x90 [ 129.644059][T10416] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.650010][T10416] RIP: 0033:0x4663b7 [ 129.653897][T10416] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.673503][T10416] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 129.681992][T10416] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 129.689991][T10416] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 13:56:31 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000480)=[{&(0x7f00000002c0)="7af72404be81c4e4094daffc99f77ff06f86207c04ef6139b22de1934c1fe4552b3c174eaac2a62aec815bb4a85fb94a8f2202a64ed372aa61335d3e459dd51115e2fc7b907e28952d41022b3d64abc19d5ef75b05ac32db5062a1d3e89a40a5c4040b7fda6bee4d27f2c4ce372edfb68ef3703099adba6622d9acf7e0726e82008dfcbd1938973dbe3eba7c9091cc94d14b478b4aeaf4b9ce246896b96c51f0902a7b071856c16d91a9", 0xaa, 0x100000001}, {&(0x7f0000000200)="2e0854a9b0fb8b7e1ca74465d71167a20aac", 0x12, 0x3ff}, {&(0x7f00000003c0)="cc87bfa9736a97cd4f086992661c6d1402689d0ca2f4785b77afd6bb7fd379f61c230cc8547eb62e53b54bd090fc4c8a71f4b598d9eeea3f4515b65d259dd9bc531b72b1a2bb837f58c94a136b810d8d854982dd54730a4354d52dc5f96e57cd2117a1a767f789d056bfa923a112ed250582dd237ffe491ea35ce2272966ebd120e7bab4e176132d47d907766e9d9f61a1bd7bd1b065", 0x96, 0x6}, {&(0x7f0000000600)="0343b608c592d269ab5d6dbcab852e6f3c658c437f1a08073ae973cafb374762fa974ab14ebd8f7f8c8b0687182bd9eae32f63db7647c1cf6a36651a46bb1ffcff324bc08ae22761d4ce18255ce208c16c34961eedff95678ea9adee98e0a66864c81e3453b079eddf69b83422f3d0a7e68c5b6ff6a29a65a3b4a62e5cb2b21c464525c16350503f4ba709de1c4f8735045f338a3ea7632e0b2614ac3a49397363279015f18b4aa60ea35045694ab3aa0e633656e2551d55b71b10900786f73e140f6658a13f216c1a5a91c5ec8d57b9834e9f761f3f446093099cf30b07bc978c422f980a5449e81a47f7c0d8e20fc893258c7c9bdedeb99f", 0xf9, 0x3}], 0x2004010, &(0x7f0000000700)={[{@huge_within_size}, {@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x37]}}}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/-'}}, {@obj_user={'obj_user', 0x3d, 'IPVS\x00'}}, {@audit}, {@seclabel}, {@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '-{['}}, {@appraise}]}) poll(&(0x7f0000000240)=[{r2, 0x80}, {r0, 0x4504}], 0x2, 0x10001) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x1a1) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x20) syz_mount_image$nfs(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x240000, 0x0) close_range(0xffffffffffffffff, r3, 0x2) r4 = getpgid(0x0) migrate_pages(r4, 0x2, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280), r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="8081", 0x2, 0x1600}], 0x81, &(0x7f0000000180)={[{@grpquota}]}) 13:56:31 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x1d63c000, 0x0, 0x0}, 0x58) 13:56:31 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x8000000000405) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x9, 0x100000001) 13:56:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 129.697962][T10416] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 129.705931][T10416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 129.713985][T10416] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 129.723548][T10416] loop3: detected capacity change from 0 to 136 [ 129.737267][T10416] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:56:31 executing program 4 (fault-call:1 fault-nth:3): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:31 executing program 3 (fault-call:3 fault-nth:23): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:31 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x4, 0x7b) set_mempolicy(0x2, &(0x7f0000000080)=0x10001, 0x50) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x2, 0x4, @fd_index=0x6, 0x6, 0x8000, 0x943, 0x1d, 0x1, {0x3}}, 0x3) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x2) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000004c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r2, 0x0, &(0x7f0000000480)={&(0x7f0000000140)=@caif=@rfm={0x25, 0x80, "834834eae8075f26ccb4a36c5bcb232a"}, 0x80, &(0x7f0000000440)=[{&(0x7f00000001c0)="bda2691c1352bd154656d3d24ee37b4cc05b54276bd4c0b256a71555b35b1e0180d8da74711bfe7574ed95c3a3d7149417e52a47d605ef3bc45398d9e6152b7422f38f18a7bd84a6c9cc2585989999dc6ca4a020ed0152c55a5146c5d7267b222c81036325ba1f8e", 0x68}, {&(0x7f0000000240)="8e86e0fd4b7d7b64730e9ec566c93f0c9a334b3cc225705d456efc59f72c5a70c42ca99880d37cf88a4c46f219419a90b646ed37215aaf8ce8fe5f592a9ff498067b88f3aafaf814a417ad36edb9027df67e6d3133f73aa09d54edba6715e971220a29cffa229d439d0c9ac376906d141f2421d6ae889b7c0aa02b38ece0f42b3e17b76b4a4462caba726fdcf4217f9102630238387a8bf93e0b0bda1cbaf7e1b1b3700004461fe6b42e8c8b83f834919b3ec2b4b65301fed6ded075f89766476bfcda64ffc0a54760a066f5407364532cc99e477f32", 0xd6}, {&(0x7f0000000340)="dc867e01322052a887781116d7041cb6b10260ae693d8e0786c61bc43c1aeed6fb4f2a0c92bde45af3ae607eaed896d30194c04609cfbee3d03f8ff3f56ce565b1f7223080dba445d2dae42553d3624443201c428fb991ceb99d22e97f971fef3be8c7ccc20e8c3984b385bbbcf10353152856c7a26309ab6b3c7c84b385a1e0aaf87ebc7f6f69d1c4e1577839d79c12dc9a82b2c8eaea804bda94d6b5ce637f81b18af7b8eebda07f43907b", 0xac}, {&(0x7f0000000400)="b76cb218236c1321bcebbb226e4969bdca199517ed87acdfb3c30d33bc3b7c1275", 0x21}], 0x4}, 0x0, 0x0, 0x0, {0x0, r3}}, 0x9) set_mempolicy(0x4000, &(0x7f00000000c0)=0x9d, 0xec3b) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:31 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x1f000000, 0x0, 0x0}, 0x58) 13:56:31 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x6bd5, 0x0, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000180), 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0xc0401, 0x0) [ 129.864210][T10457] loop3: detected capacity change from 0 to 136 [ 129.874134][T10457] FAULT_INJECTION: forcing a failure. [ 129.874134][T10457] name failslab, interval 1, probability 0, space 0, times 0 [ 129.886811][T10457] CPU: 1 PID: 10457 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 129.895232][T10457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.905288][T10457] Call Trace: [ 129.908565][T10457] dump_stack+0x137/0x19d [ 129.912901][T10457] should_fail+0x23c/0x250 [ 129.917328][T10457] __should_failslab+0x81/0x90 [ 129.922092][T10457] ? kzalloc+0x1d/0x30 [ 129.922587][T10469] FAULT_INJECTION: forcing a failure. [ 129.922587][T10469] name failslab, interval 1, probability 0, space 0, times 0 [ 129.926170][T10457] should_failslab+0x5/0x20 [ 129.926201][T10457] __kmalloc+0x66/0x350 [ 129.947465][T10457] kzalloc+0x1d/0x30 [ 129.951382][T10457] kobject_get_path+0x7c/0x110 [ 129.956195][T10457] kobject_uevent_env+0x1be/0xc40 [ 129.961220][T10457] kobject_uevent+0x18/0x20 [ 129.965759][T10457] loop_configure+0xb3c/0xcb0 [ 129.970441][T10457] lo_ioctl+0x555/0x11f0 [ 129.974682][T10457] ? path_openat+0x19ab/0x20b0 [ 129.979448][T10457] ? putname+0xa5/0xc0 [ 129.983526][T10457] ? ___cache_free+0x3c/0x300 [ 129.988198][T10457] ? blkdev_common_ioctl+0x9c3/0x1040 [ 129.993567][T10457] ? selinux_file_ioctl+0x8e0/0x970 [ 129.998759][T10457] ? lo_release+0x120/0x120 [ 130.003260][T10457] blkdev_ioctl+0x1d0/0x3c0 [ 130.007834][T10457] block_ioctl+0x6d/0x80 [ 130.012153][T10457] ? blkdev_iopoll+0x70/0x70 [ 130.016803][T10457] __se_sys_ioctl+0xcb/0x140 [ 130.022006][T10457] __x64_sys_ioctl+0x3f/0x50 [ 130.026602][T10457] do_syscall_64+0x4a/0x90 [ 130.031011][T10457] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.036917][T10457] RIP: 0033:0x4663b7 [ 130.040802][T10457] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.060402][T10457] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 130.068819][T10457] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 130.076866][T10457] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 130.084856][T10457] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 130.092820][T10457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 130.100801][T10457] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 130.108811][T10469] CPU: 0 PID: 10469 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 130.117235][T10469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.127380][T10469] Call Trace: [ 130.130658][T10469] dump_stack+0x137/0x19d [ 130.135064][T10469] should_fail+0x23c/0x250 [ 130.139493][T10469] ? security_inode_alloc+0x30/0x180 [ 130.143518][T10457] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 130.144795][T10469] __should_failslab+0x81/0x90 [ 130.144823][T10469] should_failslab+0x5/0x20 [ 130.159948][T10465] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 130.162133][T10469] kmem_cache_alloc+0x46/0x2e0 [ 130.162195][T10469] security_inode_alloc+0x30/0x180 [ 130.170333][T10465] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 130.175073][T10469] inode_init_always+0x20b/0x420 [ 130.175095][T10469] ? shmem_match+0xa0/0xa0 [ 130.189455][T10469] new_inode_pseudo+0x73/0x1c0 [ 130.198894][T10469] new_inode+0x21/0x120 [ 130.207768][T10469] shmem_get_inode+0xa1/0x480 13:56:31 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x20000000, 0x0, 0x0}, 0x58) [ 130.212448][T10469] __shmem_file_setup+0xf1/0x1d0 [ 130.217379][T10469] shmem_file_setup+0x37/0x40 [ 130.222054][T10469] __se_sys_memfd_create+0x1eb/0x390 [ 130.227337][T10469] __x64_sys_memfd_create+0x2d/0x40 [ 130.232537][T10469] do_syscall_64+0x4a/0x90 [ 130.236953][T10469] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.242932][T10469] RIP: 0033:0x4665f9 13:56:31 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x41000000, 0x0, 0x0}, 0x58) [ 130.246815][T10469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.250629][T10470] loop5: detected capacity change from 0 to 136 [ 130.266419][T10469] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 130.266447][T10469] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 130.266459][T10469] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee8e [ 130.266470][T10469] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 130.266481][T10469] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 13:56:31 executing program 3 (fault-call:3 fault-nth:24): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:31 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) [ 130.266492][T10469] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000a80 [ 130.321723][T10465] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 130.329962][T10465] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 13:56:31 executing program 4 (fault-call:1 fault-nth:4): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 130.419629][T10496] FAULT_INJECTION: forcing a failure. [ 130.419629][T10496] name failslab, interval 1, probability 0, space 0, times 0 [ 130.432323][T10496] CPU: 1 PID: 10496 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 130.440766][T10496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.446620][T10500] FAULT_INJECTION: forcing a failure. [ 130.446620][T10500] name failslab, interval 1, probability 0, space 0, times 0 [ 130.450839][T10496] Call Trace: [ 130.450849][T10496] dump_stack+0x137/0x19d [ 130.471025][T10496] should_fail+0x23c/0x250 [ 130.475440][T10496] ? __kernfs_new_node+0x6a/0x330 [ 130.480499][T10496] __should_failslab+0x81/0x90 [ 130.485273][T10496] should_failslab+0x5/0x20 [ 130.489790][T10496] kmem_cache_alloc+0x46/0x2e0 [ 130.494577][T10496] __kernfs_new_node+0x6a/0x330 [ 130.499424][T10496] ? __cond_resched+0x11/0x40 [ 130.504114][T10496] ? mutex_lock+0x9/0x30 [ 130.508353][T10496] kernfs_new_node+0x5b/0xd0 [ 130.512938][T10496] __kernfs_create_file+0x45/0x1a0 [ 130.518066][T10496] sysfs_add_file_mode_ns+0x1c1/0x250 [ 130.523535][T10496] internal_create_group+0x2e4/0x850 [ 130.528822][T10496] sysfs_create_group+0x1b/0x20 [ 130.533674][T10496] loop_configure+0xa21/0xcb0 [ 130.538437][T10496] lo_ioctl+0x555/0x11f0 [ 130.542676][T10496] ? path_openat+0x19ab/0x20b0 [ 130.547432][T10496] ? putname+0xa5/0xc0 [ 130.551492][T10496] ? ___cache_free+0x3c/0x300 [ 130.556163][T10496] ? blkdev_common_ioctl+0x9c3/0x1040 [ 130.561538][T10496] ? selinux_file_ioctl+0x8e0/0x970 [ 130.566752][T10496] ? lo_release+0x120/0x120 [ 130.571336][T10496] blkdev_ioctl+0x1d0/0x3c0 [ 130.575838][T10496] block_ioctl+0x6d/0x80 [ 130.580074][T10496] ? blkdev_iopoll+0x70/0x70 [ 130.584683][T10496] __se_sys_ioctl+0xcb/0x140 [ 130.589290][T10496] __x64_sys_ioctl+0x3f/0x50 [ 130.593877][T10496] do_syscall_64+0x4a/0x90 [ 130.598301][T10496] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.604195][T10496] RIP: 0033:0x4663b7 [ 130.608095][T10496] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.627900][T10496] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 130.636320][T10496] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 130.644295][T10496] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 130.652266][T10496] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 130.660233][T10496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 130.668203][T10496] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 130.676190][T10500] CPU: 0 PID: 10500 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 130.684620][T10500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.694668][T10500] Call Trace: [ 130.697986][T10500] dump_stack+0x137/0x19d [ 130.702350][T10500] should_fail+0x23c/0x250 [ 130.705749][T10496] loop3: detected capacity change from 0 to 136 [ 130.706844][T10500] ? __d_alloc+0x36/0x370 [ 130.717390][T10500] __should_failslab+0x81/0x90 [ 130.722271][T10500] should_failslab+0x5/0x20 [ 130.726774][T10500] kmem_cache_alloc+0x46/0x2e0 [ 130.731549][T10500] ? __init_rwsem+0x59/0x70 [ 130.736051][T10500] __d_alloc+0x36/0x370 [ 130.740305][T10500] ? current_time+0xdb/0x190 [ 130.744892][T10500] d_alloc_pseudo+0x1a/0x50 [ 130.749398][T10500] alloc_file_pseudo+0x63/0x130 [ 130.754248][T10500] __shmem_file_setup+0x14c/0x1d0 [ 130.759364][T10500] shmem_file_setup+0x37/0x40 [ 130.764080][T10500] __se_sys_memfd_create+0x1eb/0x390 [ 130.770010][T10500] __x64_sys_memfd_create+0x2d/0x40 [ 130.775268][T10500] do_syscall_64+0x4a/0x90 [ 130.779683][T10500] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.785645][T10500] RIP: 0033:0x4665f9 [ 130.789533][T10500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.809141][T10500] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 13:56:32 executing program 2: munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x8001, &(0x7f0000000080)=0x904, 0x3) 13:56:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:32 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0xf5ffffff, 0x0, 0x0}, 0x58) 13:56:32 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) fcntl$getown(r0, 0x9) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000340)={'security\x00', 0x9f, "c24d0eb16233c30d53076e2a8ff995ddc9b5c08cfb15b8d33ab62b98f6163410ea919d6094309edc6c0ef7de3cf24b9b1c9af03af62525fe22dba28e3d2299e2669212dc9184f440944bf9d6186bac9c0500978bf43056ba7e0156945558ed23ecc9b3d5306ae759b1737af8dc686c2e30df84fc029570c805c43c88c341e07013aba7da6f62a430ad4503afa06a26085f4be97f11ddf6c045084e4f558c2b"}, &(0x7f0000000440)=0xc3) truncate(&(0x7f0000000040)='./file0\x00', 0x4) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="808100003fb80000d7f4655fd7f4655fd7f4655f00000000000001000c00000010000800000000000af30300040000000000000000000000010000001200000001001f000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="80"]) getpeername(r0, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f00000001c0)=0x80) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000300)=0x14) 13:56:32 executing program 2: r0 = eventfd(0x8) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000040)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) r2 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x4, 0x408000) close_range(r1, r2, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x4000, &(0x7f0000000080)=0xa3a, 0xb1) 13:56:32 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0xff8f0000, 0x0, 0x0}, 0x58) [ 130.817557][T10500] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 130.825607][T10500] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee8e [ 130.833574][T10500] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 130.841974][T10500] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 130.849960][T10500] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000a80 13:56:32 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x540, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000140)=0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0xb1d000) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x6) 13:56:32 executing program 4 (fault-call:1 fault-nth:5): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:32 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x4000, &(0x7f0000000080)=0x2, 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x195000, 0x0) [ 130.901140][T10514] loop5: detected capacity change from 0 to 136 [ 130.911376][T10496] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:56:32 executing program 3 (fault-call:3 fault-nth:25): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:32 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0xfffffff5, 0x0, 0x0}, 0x58) 13:56:32 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x1b1061f000, 0x0, 0x0}, 0x58) [ 131.010053][T10536] FAULT_INJECTION: forcing a failure. [ 131.010053][T10536] name failslab, interval 1, probability 0, space 0, times 0 [ 131.022908][T10536] CPU: 1 PID: 10536 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 131.031334][T10536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.041629][T10536] Call Trace: [ 131.044912][T10536] dump_stack+0x137/0x19d [ 131.049255][T10536] should_fail+0x23c/0x250 [ 131.053672][T10536] ? __alloc_file+0x2e/0x1a0 13:56:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 131.058299][T10536] __should_failslab+0x81/0x90 [ 131.063069][T10536] should_failslab+0x5/0x20 [ 131.067582][T10536] kmem_cache_alloc+0x46/0x2e0 [ 131.072378][T10536] ? inode_doinit_with_dentry+0x36f/0x940 [ 131.078171][T10536] __alloc_file+0x2e/0x1a0 [ 131.082593][T10536] alloc_empty_file+0xcd/0x1c0 [ 131.087366][T10536] alloc_file+0x3a/0x280 [ 131.091602][T10536] alloc_file_pseudo+0xe2/0x130 [ 131.096462][T10536] __shmem_file_setup+0x14c/0x1d0 [ 131.101495][T10536] shmem_file_setup+0x37/0x40 [ 131.106178][T10536] __se_sys_memfd_create+0x1eb/0x390 [ 131.111471][T10536] __x64_sys_memfd_create+0x2d/0x40 [ 131.115340][T10539] loop3: detected capacity change from 0 to 136 [ 131.116688][T10536] do_syscall_64+0x4a/0x90 [ 131.116716][T10536] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.123038][T10539] FAULT_INJECTION: forcing a failure. [ 131.123038][T10539] name failslab, interval 1, probability 0, space 0, times 0 [ 131.127342][T10536] RIP: 0033:0x4665f9 13:56:32 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000001, 0x401) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x157180, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x5f) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x440582, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$INCFS_IOC_CREATE_FILE(r2, 0xc058671e, &(0x7f0000002380)={{'\x00', 0x3}, {0x1}, 0x80, 0x0, 0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="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", 0x129, 0x0, &(0x7f0000000340)={0x2, 0x200d, {0x1, 0xc, 0x1000, "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", 0x1000, "cb848a7bd20bea58555716959345a511eb3037992d4b589cfa56e7e9f6ee90152443738f78376203e9552e946de40cbe3c90e348e4eeb0becbe48f09864777019eb21e8040acce61f0f973d8262f68efbd850f847d4e0262e46463de178869b723bc827e44f87ffea56d1f42769b02c590fcc6e4b96d368944c003779f19adbc5ab1aa72048b1bf67be7f2fb3162447d1153874fb5f3dd4646eb0af4f8478058e21d3fad59f5f3ccc1371698af6a28a310d3ee4c00538959641a3e8af445b6719af1715a444e4623221b532d6a5323e4cd346c10bd79ee86ec0144712988e51aa4b34b887bfb8a5ecaf8f48edd6ecc9784f26932892185173bceb08a43973afde49875962b898d0efd31da02453c0ce09bc4daef202767518ece5bd738ae27e22400bdd9101d08f26ef852d3b78d896e1ffc5dab66f2be60511a474dd7277f2d5ef03b4dfbf9bf92a5ae67e1523ac4d5bb20560856a1f320c280fc6a7dce0e0a0f14056e028fbd020b668ec5e1dc68467e0e92c7e9af7714f64d6520a9063b8529b2e3b875eab56fc4cac1c3ba60824473d57b91eacaf5539471487ac8ad455a58143a2e03b27047eef423121264aefeb43c8b9c3b3069378029dc5427f47fc94ae1691a69dc0e7c3109851d5c421d94cf225122a60e1f8ea234dfee152f3def168fc004ec8fe37e93d70ccb2142ee7044ff0d219eca1ec979eaf1c3b0fefdcc1d9a6029a8515f3120f180e7351609681594874e83af1da5ccae4755c8a0c6473bb8643aca75f3d463b307e1ffefeb102b34dd0710df364abd12d630876d31f103c4e501828e91265d164979bdafd1e88b1b79ad64ba2bd4c90cbe47ef709b8f59469c281441f94878d81590b023e0f93b46ae32b95b2bb859f25085b471f28d8af19e0afe4bb3616925e1d305b6c577150cfac7a625a8815353d3470a316221f69255bc3eb92ce64d074a6fa9319d02e06798b77d061454ab51d33b9b7c1bd2ba37bacf94bb2f0fa49f6c52ef2ab90fc510c52288a066533d358024360aff78457a9456aec1059b75942f105159ac4f429ddf76f7c9d6296a9ecc0413a19bd08d83ac67169297e0018f83a12ed9a10ea00ce6607c31abc34b5f7c752dec88a45a87eecb9dc9d23fc120dbb2a9ec85937ca8c921b3b8fce0d5a725316ae50a90c376bd58029b3d0042b2a0b49e5305b5e36df76f2307a6ccf50ea08c10f7acb68001b2a436f1c92805a30f0383fb5137533335bd507c928717d3b04e3ed70604f9f920be4fc24d9ab1acc607123ddf1189e79d05fcbdac047bb173b9fa85e32368515af6c166b84e2fba352582ce061e424d9bac5d31d9ee674972c83eb73bac17e5d69b473b081fba3916b41804c299e04cffa47f0ccf265d0abf16592aafe3c2a8c93b0c3d0f2a1dfef83b85b94e734ec10b7f20a315990cbe0ff8be96b404637ccce2286710c41e8db1df68c1a0500c1920e89880c91709dde4ab95ada2ecef0927503d8baedccdd17cd9b84a8058c6aba995dabc587573a00ff1e1e6db9b233dacb5b197378fb8e173477458564e90d1985b232165b7eb347551b29c1f234f44969fc08239c6be76f5d6a31a5fc24a074f3553549796d64df9d8a449438cefb86eff324350f53b1fb5b03d2ae73139d700309d850c0aac87dc4d75442fe3d56fe91f938ee3091ac42a3068cc6d6e3fe1febeb1ed3a815aee0224961d5e5f64de76b0ed577a52c77dd922eb1fb177f3c51790f773f361120bbfcb250a914d8b7f57feef326d394b3eddc5cc1ea2c5f0bc706f60b5be637ef046036ce8da4506a47d49384d8a62a1572eb8295c99946cfc3449e83dbbbb15f1c94c5b83935a87c7e8b4a3c7906db67630d3d54fbd68fcb52baff0a3deeb124df6b3e3b8c3c6d25b015756df58ce09a3b1604a8e351d3802b3a47f87c0a12e84e586e90f29e3d23d39afedbb0166476fd5a32b54abc02f36a513d06c4684263aec22c22bbeb94939d2edff269358b6b2ffa2c429ddbf34b9da21b82e24259c61511f9648bbaba8f63003cbdb864fbd4d3b7ba07afa1350ccde0c273a5ad917bb513b281482ed6ff18634af7a153f2569f28520e755b193999bc62c80de912677cb18faf123ab7013836753440da40ed813d208051b1a35288454bb9c37e8eabff7d74aaf410a164ab332d61903ee1eb316c8d273061c92a150da7a123bf1ab141f6c706408b07a43977c85f15c76f52ca6e1501e1d74a7866b68c173eded77768c89fe85327f11c5f038ec00cdfbe90a897b6c312c1187dedb21fb6b79658c189b6ff7ff93989904e5dc0b8f4bdf2fdf644e488a5f35fcf325d12fb7d20b432b1a6a51cd409ac95786e29e7f491355a213a46d42838565f2ceaca9579c07f8c5a3e1899fc500fce16e8bb8f0bedc070fa9c578ec974b7d4052542431937283329fee17c09e4a57e76c9f8f6001184f0d91f45688d6cdf4bf26da884710ec8d1e4197cf6374456a0199ce0a7d751ab1db280942e1235d82714421ed5f4fba2cea26881638e8f08a1e4718e29fa551ad15f05fa4b71d81ec1408641f109b5ddc20d8ade630d36afa08523e32f465036e85360b8b21dcfc7591d38eef79536f82b5f7cbebe16ba8f3fe845b9b2eac392c553b58a7a04a223c813551edab644bec300ef664467732b50428146f86ce1bbcbad1c4cb9094ff94ce4ece19c74b61d1f82bbfd2dce4e7fde5a8c898c025898173ffefba0f363d50f50677867d6a5b614b56f65d300956e1664a258c0225a6aaaa26ee6fbebcfd03af85ed137992ec61ed9693d5a1cf6988b6ef400f2697dae158d6ca42c380cd80fcfb3d0bd6e527523b30532014421f06c7ac25001c9fc69f8cc105c0ac23a9fe442351fd2ea2127b02fbbe51fe8dcb53b27410fd74af0c086865c603114b39bd692b6f523c78bd0cfe50187427a48d727249b8de3450c0c7cfa6f8953be2670496cf7ebf10868b7b3a9d30fdafcc4d0ff8f927d3fd1d6148958700d106fca0d0785240f7d21696f8242c8507e9aa616df0b30b6bf09982ff02f8e0696a6309d406dfa326aa777a2fdc274229d4410e432c4ad3bf763d418e77d97cdeef508b6e684d693c85ad9cff0dfcfd75ec8f4703412ef37754785466eac7c22889419034bc8845900567b2bf45191ded02575602e98c917d5f59c1cbc53bde1d34d7cc5dad871ff7e131db06fcc32898835d4a2507df9abc54e93bca65df9d96a49aa712d574567d9d24988c426e4aa586ad1f8b6cd0dc42bb0aaa2224c873abe8490b0ba606984190e6323fa8567d87a15ba2202a08bbd05355c7cb9ef3a7a04bf4994c984cd2ffef21dddf0966765c0a804c689d64d9fb352a3866a343e012200c4fbe541ae68623b74a4c6e1e9d38baf787bf189034df9d23c4abe884d13c256a96767554d21c064e75a3d7b0df103dd55d12264411978baee6ff65e7b26305d1b6a016bb394c13e5bff68643c55d49984489f3c3e897e8bfd9f13a65a49ebf0fcbc938921b9edb9f648474e02c089fbbf7955cd0f7cb5f21236d900ae5ad8202ec2451b7a558c8c02abaf7850dba011bd4b1057620df1c6ab34e05eb7d37cfc0ae402b7e651726af4a86205c3dce9ffb7b0d5cfa0158a343cf42b230dd086184b0cf1059e356d4a86c97b8b89d157b52d2c1fbe716bfd86bc88b15729940086fdc9f1b671391b67ba702fbf114bbe26bfb60f9be4dee9fb6c06aa00f27227fb37f918bef61079e47a63b616295dea0ec60023264175a3630c0b2b23522ae84f3b5f0eb88e371575b30c2fc01f8f8e1b2dc08bf2e33076cc716454acf451bf3a4daf4e2a503221e1629209c96e4613052e0af993d8e376a752d557d8714cb5aea68bcdc33bbbaae7eb7fe1ec06d8d48217cbb7d44fe0c375e9f677c544a976ba990fd74fff7a243d950ff94d333baef9045186e25771b960a4fa1947363fd0b8d893dfe6eb2a68db96ac04b03606ac616c3ef6e1ef6b98f7a16354ee385c6102f2f3795a18b07bf5502155cd01ee060b8879a5ba2d642af967332d296d5d2ec47af7f491adef7f0b371c44f3e0b1c9e5394e47eb523687af1450de29988b8568a7dd0d54f3bea13374302d8eab4add09e3eeb6268311d124869cb03d50d7e28abf80708cba5a741687068082fbcc40a2614dff8a65937c61f26cfb6a3a244ed7aff7555912d23294aa620abc02c4f9c3f0d7759bba0394d577dcc647da9056e801034c97fc4b2efb5c19c741bbfcfc3e1aa814d101258de722aa082f0fd92f8df97f1105060055bad0276175c65886cc9bcb7428697825029d8b6e74637398ba5305cd4a8728a005600d5e559d1ad954f167c00e7059b6567aba526efa1207992e0fc828abdd259f4fe8a167aeb248207c58c088d6dea28e3c2931f427ea0e24cddd85100fb9f03da506bb7e051d6edc1f8b4f66af9fb62a30277b0cc75dadd4c93c062e4cc4a18c578666a1f6827b4d197dacad6a7df2de27af533b6f31631816d4f4545be06c57fdf2283a1ea88d0fa6df3ee1e8a7e130af486dba270c533e7c630460c370fb26d2122c1ca5f85afe8dbf833a280ccd9e9b5462fd2e3ab031bd19967bac33f80f392df2ef95c49f1cf824399e1dafbe3af6773d196c944c378d2950930816ab30f3527a17ae8de44d4e8571f4458cccc72f24c465d77582d47be9e5c46a8b699794a754dcca8678b6c55c99a63dfddff2eab7e5cf9252b98fe0cf3b0bca2b4191d65ca65947dea42f54e5d408096f531f85c7bde601257ce13043a8cff2fb0c378e3566652fc6d3127654bfdc81c91aa527ce4de1bdd5c6477fef723a91086b5cc644e7a11363cf1a13b01df599d5cc42efac649efe67857e3082d7c55dd673430f7d6c6529653cfb81bc9f21c886e9c39b1b2b95873d6cf807ab70dcc167b3285cf43c4e6be0f18c8cb44e66a75b200f87b04bc4983b50f2cb8b0476f8c93041cec8e31e47fb34a4206330199d8d688eabe96b43c7784f5e9d68b0e3e891c63531870a38e5ad46ad758cb3b62674889dadeebcb43bed559434a3de84d67811772929e0c72ad13983abe1759fd7ff50d1746aef3f6d117e79ca11f495f15cf92c0ca1f991cc9e80d427f5a03c314812644bde7ba632675c9d9e75fada085f2a3336f74d744e97f218aca46c0248180da9c2fca9d9d8b8713618339f470531ce7aa27613eafc872ac7bf4ffdf294475ed61718b3e1c32b0cfd19dbd8b9c2bf751c3b811413514697f1c7010bbe93f064bf7c3161844f378a0ac916cc9edbc8b48eca468920a2f6198c835702107c8781f34fc7f103ac19c5bab892d28b3b48d77785fe52424713786a7068287ef4fba757e12204424fab134b8914c79bf9f9d55670c42379ec5487e63ddc4aa99bc9c2658d9f31213538ebb31079fd773721ab5abfda0b62ac86dbd343b7ee0691a406accb9c170ef1db02f6ad326d21d3cffe99ff675a74f40c3e66ae03a00245af97ef9349bb663608c61e0d8898a852dc8915b6b5f61a3416b4ab23007a3056d5164967fb5d14f9c16c6e028268c69db1bfa24127c97460517f4682b1e9cd44d534b9328845b63db6170b86ea4bb81dd5e92522bd71fbb0674a61e2fde3e22925cf0ad3e9771548de27c8356fd0feb9a037f2e4d296914b124a006f78f35e57e66ddc4d183846f6693d896c05819318d7e45848277914776b23d97ad6887c60f78bb723fa8d50a9dc81b8fd483d8655683ea6d55d873da78c96950818368012d3cd60619c59aaa7595c9f91aea91c014ee21f59b9ddad1236b578675"}, 0x9, "4d26731331b0b9e93a"}, 0x2022}) r3 = syz_open_pts(r1, 0x0) dup2(r3, r1) ioctl$TCSBRKP(r1, 0x5425, 0x7f) 13:56:32 executing program 4 (fault-call:1 fault-nth:6): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 131.127363][T10536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.169331][T10536] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 131.177747][T10536] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 131.185721][T10536] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee8e [ 131.193699][T10536] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 131.201686][T10536] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 131.209654][T10536] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000a80 [ 131.217680][T10539] CPU: 0 PID: 10539 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 131.226107][T10539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.236149][T10539] Call Trace: [ 131.239425][T10539] dump_stack+0x137/0x19d [ 131.243766][T10539] should_fail+0x23c/0x250 [ 131.248178][T10539] __should_failslab+0x81/0x90 [ 131.252993][T10539] ? kzalloc+0x1d/0x30 [ 131.257123][T10539] should_failslab+0x5/0x20 [ 131.261624][T10539] __kmalloc+0x66/0x350 [ 131.265786][T10539] kzalloc+0x1d/0x30 [ 131.269662][T10539] kobject_get_path+0x7c/0x110 [ 131.274471][T10539] kobject_uevent_env+0x1be/0xc40 [ 131.279508][T10539] kobject_uevent+0x18/0x20 [ 131.284014][T10539] loop_configure+0xb3c/0xcb0 [ 131.288671][T10539] lo_ioctl+0x555/0x11f0 [ 131.292914][T10539] ? path_openat+0x19ab/0x20b0 [ 131.297674][T10539] ? putname+0xa5/0xc0 [ 131.301723][T10539] ? ___cache_free+0x3c/0x300 [ 131.306396][T10539] ? blkdev_common_ioctl+0x9c3/0x1040 [ 131.311753][T10539] ? selinux_file_ioctl+0x8e0/0x970 [ 131.316956][T10539] ? lo_release+0x120/0x120 [ 131.321476][T10539] blkdev_ioctl+0x1d0/0x3c0 [ 131.326062][T10539] block_ioctl+0x6d/0x80 [ 131.330287][T10539] ? blkdev_iopoll+0x70/0x70 [ 131.334858][T10539] __se_sys_ioctl+0xcb/0x140 [ 131.339431][T10539] __x64_sys_ioctl+0x3f/0x50 [ 131.344021][T10539] do_syscall_64+0x4a/0x90 [ 131.348454][T10539] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.354331][T10539] RIP: 0033:0x4663b7 [ 131.358204][T10539] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.377860][T10539] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 131.386273][T10539] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 131.394277][T10539] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 131.402266][T10539] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff 13:56:32 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x64) clone(0x40000, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x26, 0xd8, 0x0, 0x3, 0x0, 0x7, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, 0x0, 0x20, 0x8, 0x686bb42c, 0x8, 0x8, 0x1, 0x7, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0xa) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x100000f) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) munlock(&(0x7f0000b53000/0x4000)=nil, 0x4000) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000a75000/0x1000)=nil) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x100000) r1 = shmget(0x3, 0x13000, 0x1000, &(0x7f0000d9b000/0x13000)=nil) shmat(r1, &(0x7f0000ddc000/0x2000)=nil, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) r2 = syz_mount_image$msdos(&(0x7f0000000480), &(0x7f0000000000)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) io_uring_enter(0xffffffffffffffff, 0x4510, 0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000b07000/0x3000)=nil, 0x3000, 0x1000003, 0x8010, 0xffffffffffffffff, 0x10000000) creat(0x0, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x503000, 0x4) fstatfs(r2, &(0x7f0000000200)=""/131) [ 131.410223][T10539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 131.418177][T10539] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 13:56:32 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x400000000000, 0x0, 0x0}, 0x58) [ 131.474608][T10555] FAULT_INJECTION: forcing a failure. [ 131.474608][T10555] name failslab, interval 1, probability 0, space 0, times 0 [ 131.487268][T10555] CPU: 0 PID: 10555 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 131.495721][T10555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.505848][T10555] Call Trace: [ 131.509126][T10555] dump_stack+0x137/0x19d [ 131.513506][T10555] should_fail+0x23c/0x250 [ 131.517989][T10555] ? security_file_alloc+0x30/0x190 [ 131.523195][T10555] __should_failslab+0x81/0x90 [ 131.527971][T10555] should_failslab+0x5/0x20 [ 131.532489][T10555] kmem_cache_alloc+0x46/0x2e0 [ 131.537255][T10555] ? __alloc_file+0x2e/0x1a0 [ 131.541850][T10555] security_file_alloc+0x30/0x190 [ 131.546963][T10555] __alloc_file+0x83/0x1a0 [ 131.551383][T10555] alloc_empty_file+0xcd/0x1c0 [ 131.556152][T10555] alloc_file+0x3a/0x280 [ 131.560401][T10555] alloc_file_pseudo+0xe2/0x130 [ 131.565387][T10555] __shmem_file_setup+0x14c/0x1d0 [ 131.570471][T10555] shmem_file_setup+0x37/0x40 [ 131.575190][T10555] __se_sys_memfd_create+0x1eb/0x390 [ 131.580484][T10555] __x64_sys_memfd_create+0x2d/0x40 [ 131.585697][T10555] do_syscall_64+0x4a/0x90 [ 131.590125][T10555] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.596037][T10555] RIP: 0033:0x4665f9 [ 131.599927][T10555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:56:33 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x7f55fe7a4000, 0x0, 0x0}, 0x58) [ 131.619594][T10555] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 131.628014][T10555] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 131.636060][T10555] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee8e [ 131.644027][T10555] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 131.652041][T10555] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 131.660020][T10555] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000a80 13:56:33 executing program 3 (fault-call:3 fault-nth:26): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:33 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000140)={0xdc, 0xff, 0x20, "54a738cc6d0c21538eda20ed135dba8e30b99e74fadeef0723bd6f715d5fba01144d08a3099d3b7cdd03005aaa63b9d32727479dbf1cf3abba1c8e94d935358c35b07ea407614a8fc5c1e31942ba25163b1b9ac1a461fbca588a282702a0ddabce23d43771e91e764c6f6a5844ad2b9394af862f589f9ca4ad1d2eef69c46c9c7cb5a018ca30663a3678a98f1eaafcf436620507f351019b3deb5adde19d439d013de5f931295e6d8a0c7df2b6fb3ec1e15e5926b1c6e205e1b700403395e8b21981cc3e0ef84a69269758da1d5d5c089f8fc8c10f2acf21f5c72abd"}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "854e32080402000000000000000000000400"}) r1 = syz_open_pts(r0, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_pts(r2, 0x0) dup2(r1, r0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 131.675003][T10557] loop5: detected capacity change from 0 to 136 [ 131.685869][T10539] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:56:33 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x2001000000000, 0x0, 0x0}, 0x58) [ 131.780720][T10593] loop5: detected capacity change from 0 to 136 [ 131.791229][T10591] loop3: detected capacity change from 0 to 136 [ 131.799933][T10591] FAULT_INJECTION: forcing a failure. [ 131.799933][T10591] name failslab, interval 1, probability 0, space 0, times 0 [ 131.812597][T10591] CPU: 1 PID: 10591 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 13:56:33 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000000c0)={0x8, 0x404, 0x16c6, 0x8, 0x7, "2dac34c71d32622c"}) 13:56:33 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000001c0)='./file0\x00', 0x8400007e) read(r1, &(0x7f00000000c0)=""/107, 0x6b) fallocate(r0, 0x0, 0x0, 0x801fffd) r2 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000100)) io_uring_enter(r2, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r2, 0xa, 0x0, r3) 13:56:33 executing program 4 (fault-call:1 fault-nth:7): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 131.821166][T10591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.831237][T10591] Call Trace: [ 131.834514][T10591] dump_stack+0x137/0x19d [ 131.838849][T10591] should_fail+0x23c/0x250 [ 131.843270][T10591] ? skb_clone+0x12c/0x1f0 [ 131.847691][T10591] __should_failslab+0x81/0x90 [ 131.852461][T10591] should_failslab+0x5/0x20 [ 131.857001][T10591] kmem_cache_alloc+0x46/0x2e0 [ 131.861774][T10591] skb_clone+0x12c/0x1f0 [ 131.866051][T10591] netlink_broadcast_filtered+0x50d/0xb90 [ 131.871811][T10591] ? skb_put+0xb9/0xf0 [ 131.875863][T10591] netlink_broadcast+0x35/0x50 [ 131.880852][T10591] kobject_uevent_env+0x8c9/0xc40 [ 131.885909][T10591] kobject_uevent+0x18/0x20 [ 131.890396][T10591] loop_configure+0xb3c/0xcb0 [ 131.895072][T10591] lo_ioctl+0x555/0x11f0 [ 131.899303][T10591] ? path_openat+0x19ab/0x20b0 [ 131.904187][T10591] ? putname+0xa5/0xc0 [ 131.908328][T10591] ? ___cache_free+0x3c/0x300 [ 131.912987][T10591] ? blkdev_common_ioctl+0x9c3/0x1040 [ 131.918358][T10591] ? selinux_file_ioctl+0x8e0/0x970 [ 131.923635][T10591] ? lo_release+0x120/0x120 [ 131.928122][T10591] blkdev_ioctl+0x1d0/0x3c0 [ 131.932615][T10591] block_ioctl+0x6d/0x80 [ 131.936874][T10591] ? blkdev_iopoll+0x70/0x70 [ 131.941460][T10591] __se_sys_ioctl+0xcb/0x140 [ 131.946081][T10591] __x64_sys_ioctl+0x3f/0x50 [ 131.950653][T10591] do_syscall_64+0x4a/0x90 [ 131.955052][T10591] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.960966][T10591] RIP: 0033:0x4663b7 [ 131.964858][T10591] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.984450][T10591] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 131.992846][T10591] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 132.000814][T10591] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 132.008793][T10591] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 132.016751][T10591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 13:56:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 132.024787][T10591] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 132.054910][T10591] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 132.092327][T10613] FAULT_INJECTION: forcing a failure. [ 132.092327][T10613] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 132.105589][T10613] CPU: 1 PID: 10613 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 132.114014][T10613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.124070][T10613] Call Trace: [ 132.127345][T10613] dump_stack+0x137/0x19d [ 132.131723][T10613] should_fail+0x23c/0x250 [ 132.136137][T10613] __alloc_pages_nodemask+0xe7/0x310 [ 132.141462][T10613] alloc_pages_vma+0x3c3/0x5e0 [ 132.146319][T10613] shmem_getpage_gfp+0x980/0x1410 [ 132.151353][T10613] ? mls_context_isvalid+0x76/0x1e0 [ 132.156648][T10613] shmem_write_begin+0x7e/0x100 [ 132.161527][T10613] generic_perform_write+0x196/0x3a0 [ 132.166816][T10613] ? file_update_time+0x1bd/0x3e0 [ 132.171890][T10613] __generic_file_write_iter+0x161/0x300 [ 132.177520][T10613] ? generic_write_checks+0x250/0x290 [ 132.182891][T10613] generic_file_write_iter+0x75/0x130 [ 132.188321][T10613] vfs_write+0x69d/0x770 [ 132.192580][T10613] __x64_sys_pwrite64+0xf5/0x150 [ 132.197517][T10613] do_syscall_64+0x4a/0x90 13:56:33 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x8000000000000, 0x0, 0x0}, 0x58) [ 132.201973][T10613] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.207881][T10613] RIP: 0033:0x419797 [ 132.211837][T10613] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 132.231454][T10613] RSP: 002b:00007fba77623f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 132.239917][T10613] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 132.247915][T10613] RDX: 000000000000003a RSI: 0000000020000080 RDI: 0000000000000004 13:56:33 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x10000000000000, 0x0, 0x0}, 0x58) 13:56:33 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x4400, 0x0) [ 132.255883][T10613] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 132.263856][T10613] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 132.271829][T10613] R13: 0000000000000004 R14: 0000000020000300 R15: 0000000000000000 13:56:33 executing program 3 (fault-call:3 fault-nth:27): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:33 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0xf}, {0x0}, {0x0}, {&(0x7f0000000240)="66530700ae8970948597c525a50146ebbdfe02113de7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4c444cac91cdc8066a4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d64415768423be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a66654c3a9b8d219b0ddb3ce411b0b35bf58a044f5509e3ad9303ae89087124361ca03364b757c2b0e54f93e60e60efc232e3360e248dc7ab948de2be5bc42ba27dfc21003086b5d037c1a2a6a755fa6b0f6e952f15a3c91cbcd75fd2ad88b66ba660546db372b1b277abb9dfa", 0x10e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() ptrace$setregs(0xf, r0, 0x4, &(0x7f0000000380)="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") tkill(r1, 0x1e) 13:56:33 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x30000000000000, 0x0, 0x0}, 0x58) 13:56:33 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x8b) set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x2, &(0x7f00000000c0)=0x1f, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x4dcf80, 0x0) [ 132.303509][T10625] loop5: detected capacity change from 0 to 136 [ 132.338281][T10613] loop4: detected capacity change from 0 to 264192 13:56:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 132.372194][T10613] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 132.396375][T10648] loop3: detected capacity change from 0 to 136 [ 132.408302][T10648] FAULT_INJECTION: forcing a failure. [ 132.408302][T10648] name failslab, interval 1, probability 0, space 0, times 0 [ 132.421015][T10648] CPU: 1 PID: 10648 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 132.429434][T10648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.439573][T10648] Call Trace: [ 132.442849][T10648] dump_stack+0x137/0x19d [ 132.447183][T10648] should_fail+0x23c/0x250 [ 132.451595][T10648] __should_failslab+0x81/0x90 [ 132.456486][T10648] ? call_usermodehelper_setup+0x81/0x160 [ 132.462208][T10648] should_failslab+0x5/0x20 [ 132.466725][T10648] kmem_cache_alloc_trace+0x49/0x310 [ 132.472033][T10648] ? add_uevent_var+0x16e/0x1c0 [ 132.476884][T10648] ? __kfree_skb+0xfe/0x150 [ 132.481386][T10648] call_usermodehelper_setup+0x81/0x160 [ 132.486929][T10648] ? add_uevent_var+0x1c0/0x1c0 [ 132.491781][T10648] kobject_uevent_env+0xb29/0xc40 [ 132.496822][T10648] kobject_uevent+0x18/0x20 [ 132.501568][T10648] loop_configure+0xb3c/0xcb0 [ 132.506244][T10648] lo_ioctl+0x555/0x11f0 [ 132.510485][T10648] ? path_openat+0x19ab/0x20b0 [ 132.515249][T10648] ? putname+0xa5/0xc0 [ 132.519363][T10648] ? ___cache_free+0x3c/0x300 [ 132.524067][T10648] ? blkdev_common_ioctl+0x9c3/0x1040 [ 132.529444][T10648] ? selinux_file_ioctl+0x8e0/0x970 [ 132.534637][T10648] ? lo_release+0x120/0x120 [ 132.539134][T10648] blkdev_ioctl+0x1d0/0x3c0 [ 132.543635][T10648] block_ioctl+0x6d/0x80 [ 132.547876][T10648] ? blkdev_iopoll+0x70/0x70 [ 132.552463][T10648] __se_sys_ioctl+0xcb/0x140 [ 132.557053][T10648] __x64_sys_ioctl+0x3f/0x50 [ 132.561639][T10648] do_syscall_64+0x4a/0x90 [ 132.566054][T10648] entry_SYSCALL_64_after_hwframe+0x44/0xae 13:56:33 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x407afe557f0000, 0x0, 0x0}, 0x58) [ 132.571953][T10648] RIP: 0033:0x4663b7 [ 132.575843][T10648] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.595453][T10648] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 132.603902][T10648] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 132.611892][T10648] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 13:56:34 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0xfa9, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:34 executing program 4 (fault-call:1 fault-nth:8): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:34 executing program 0: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@uname={'uname', 0x3d, 'trans=fd,'}}], [], 0xf}}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, {0x0, 0x86b6}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) close(r2) 13:56:34 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x504f0100000000, 0x0, 0x0}, 0x58) [ 132.619918][T10648] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 132.627991][T10648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 132.635983][T10648] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 13:56:34 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000000)) 13:56:34 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x60000000000000, 0x0, 0x0}, 0x58) 13:56:34 executing program 3 (fault-call:3 fault-nth:28): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 132.683680][T10664] loop5: detected capacity change from 0 to 136 [ 132.709446][T10648] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:56:34 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0xc0631d00000000, 0x0, 0x0}, 0x58) [ 132.769558][T10681] FAULT_INJECTION: forcing a failure. [ 132.769558][T10681] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 132.782682][T10681] CPU: 1 PID: 10681 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 132.791158][T10681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.801248][T10681] Call Trace: [ 132.801413][T10694] loop5: detected capacity change from 0 to 136 [ 132.804528][T10681] dump_stack+0x137/0x19d [ 132.804557][T10681] should_fail+0x23c/0x250 13:56:34 executing program 2: membarrier(0x2, 0x0) set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x42c002, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000140)={0x8, 0x5, 0x5, 0x9, 0x13, "73fba23334191bf6392b99b497c6f3767df8dd"}) set_mempolicy(0x8000, &(0x7f0000000100)=0xf10, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) sendfile(r1, r2, &(0x7f00000000c0)=0x16fb, 0x273) 13:56:34 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0xf061101b000000, 0x0, 0x0}, 0x58) [ 132.819576][T10681] should_fail_usercopy+0x16/0x20 [ 132.824613][T10681] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 132.830681][T10681] ? shmem_write_begin+0x7e/0x100 [ 132.835845][T10681] generic_perform_write+0x1e4/0x3a0 [ 132.841691][T10681] ? file_update_time+0x1bd/0x3e0 [ 132.846719][T10681] __generic_file_write_iter+0x161/0x300 [ 132.852353][T10681] ? generic_write_checks+0x250/0x290 [ 132.857740][T10681] generic_file_write_iter+0x75/0x130 [ 132.863112][T10681] vfs_write+0x69d/0x770 [ 132.867364][T10681] __x64_sys_pwrite64+0xf5/0x150 [ 132.872309][T10681] do_syscall_64+0x4a/0x90 [ 132.876730][T10681] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.882697][T10681] RIP: 0033:0x419797 [ 132.886571][T10681] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 132.906208][T10681] RSP: 002b:00007fba77623f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 13:56:34 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x3c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x9}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0xbfc, 0x4e22, 0x1f, 0x2, 0x20, 0x80, 0x3a, 0x0, 0xffffffffffffffff}, {0x4, 0xddc, 0x2, 0x4f2, 0x0, 0x7, 0x2}, {0x1, 0x1e, 0x9, 0x327}, 0x9, 0x6e6bba, 0x2, 0x0, 0x0, 0x5eb1a02b24b57113}, {{@in=@loopback, 0x4d3, 0x32}, 0x2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3507, 0x2, 0x1, 0x1, 0x5, 0x2, 0x3}}, 0xe8) open_by_handle_at(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x40000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x18) r4 = openat$cgroup_type(r1, &(0x7f0000000040), 0x2, 0x0) ppoll(&(0x7f0000000080)=[{r4, 0x4045}, {r0, 0x4140}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100), 0x8) 13:56:34 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x100000000000000, 0x0, 0x0}, 0x58) [ 132.914619][T10681] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 132.922579][T10681] RDX: 000000000000003a RSI: 0000000020000080 RDI: 0000000000000004 [ 132.930553][T10681] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 132.938587][T10681] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 132.946557][T10681] R13: 0000000000000004 R14: 0000000020000300 R15: 0000000000000000 [ 133.020337][T10703] loop3: detected capacity change from 0 to 136 [ 133.033902][T10703] FAULT_INJECTION: forcing a failure. [ 133.033902][T10703] name failslab, interval 1, probability 0, space 0, times 0 [ 133.046593][T10703] CPU: 0 PID: 10703 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 133.053561][T10681] loop4: detected capacity change from 0 to 264192 [ 133.055034][T10703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.071593][T10703] Call Trace: [ 133.074866][T10703] dump_stack+0x137/0x19d [ 133.079212][T10703] should_fail+0x23c/0x250 [ 133.083631][T10703] ? skb_clone+0x12c/0x1f0 [ 133.088246][T10703] __should_failslab+0x81/0x90 [ 133.093088][T10703] should_failslab+0x5/0x20 [ 133.097591][T10703] kmem_cache_alloc+0x46/0x2e0 [ 133.102362][T10703] skb_clone+0x12c/0x1f0 [ 133.106604][T10703] netlink_broadcast_filtered+0x50d/0xb90 [ 133.112325][T10703] ? skb_put+0xb9/0xf0 [ 133.116431][T10703] netlink_broadcast+0x35/0x50 [ 133.121224][T10703] kobject_uevent_env+0x8c9/0xc40 [ 133.126233][T10703] kobject_uevent+0x18/0x20 [ 133.130790][T10703] loop_configure+0xb3c/0xcb0 [ 133.135453][T10703] lo_ioctl+0x555/0x11f0 [ 133.139737][T10703] ? path_openat+0x19ab/0x20b0 [ 133.144608][T10703] ? putname+0xa5/0xc0 [ 133.148655][T10703] ? ___cache_free+0x3c/0x300 [ 133.153313][T10703] ? blkdev_common_ioctl+0x9c3/0x1040 [ 133.158769][T10703] ? selinux_file_ioctl+0x8e0/0x970 [ 133.163961][T10703] ? lo_release+0x120/0x120 [ 133.168443][T10703] blkdev_ioctl+0x1d0/0x3c0 [ 133.173059][T10703] block_ioctl+0x6d/0x80 [ 133.177283][T10703] ? blkdev_iopoll+0x70/0x70 [ 133.181898][T10703] __se_sys_ioctl+0xcb/0x140 [ 133.186513][T10703] __x64_sys_ioctl+0x3f/0x50 [ 133.191138][T10703] do_syscall_64+0x4a/0x90 [ 133.195562][T10703] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.201437][T10703] RIP: 0033:0x4663b7 [ 133.205372][T10703] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.224964][T10703] RSP: 002b:00007f4f4c084f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 133.233362][T10703] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 133.241336][T10703] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 133.249287][T10703] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 133.257325][T10703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 133.265282][T10703] R13: 0000000000000005 R14: 0000000020001518 R15: 0000000000000001 [ 133.276852][T10681] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 133.293643][T10703] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 133.304709][T10681] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:56:34 executing program 4 (fault-call:1 fault-nth:9): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:34 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x1, &(0x7f00000000c0)=0xffffffffffffff8e, 0xa8) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x4003, &(0x7f0000000080)=0x5, 0x1ff) 13:56:34 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = syz_open_dev$vcsa(&(0x7f0000000080), 0x101, 0x10000) statx(r3, &(0x7f00000000c0)='./file0\x00', 0x0, 0x7ff, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x50}, {0x6}]}, 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:56:34 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x1f00000000000000, 0x0, 0x0}, 0x58) 13:56:34 executing program 3 (fault-call:3 fault-nth:29): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 133.316256][T10681] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:56:34 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) [ 133.402241][T10737] loop5: detected capacity change from 0 to 136 [ 133.409192][T10745] loop3: detected capacity change from 0 to 136 [ 133.433014][T10756] FAULT_INJECTION: forcing a failure. [ 133.433014][T10756] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.438623][T10745] FAULT_INJECTION: forcing a failure. [ 133.438623][T10745] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.446944][T10756] CPU: 1 PID: 10756 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 133.446970][T10756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.446981][T10756] Call Trace: [ 133.446988][T10756] dump_stack+0x137/0x19d [ 133.447012][T10756] should_fail+0x23c/0x250 [ 133.447030][T10756] should_fail_usercopy+0x16/0x20 [ 133.495677][T10756] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 133.501747][T10756] ? shmem_write_begin+0x7e/0x100 [ 133.506860][T10756] generic_perform_write+0x1e4/0x3a0 [ 133.512190][T10756] ? file_update_time+0x1bd/0x3e0 [ 133.517213][T10756] __generic_file_write_iter+0x161/0x300 [ 133.522886][T10756] ? generic_write_checks+0x250/0x290 [ 133.528258][T10756] generic_file_write_iter+0x75/0x130 [ 133.533717][T10756] vfs_write+0x69d/0x770 [ 133.537999][T10756] __x64_sys_pwrite64+0xf5/0x150 [ 133.542939][T10756] do_syscall_64+0x4a/0x90 13:56:34 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x2000000000000000, 0x0, 0x0}, 0x58) [ 133.547392][T10756] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.553363][T10756] RIP: 0033:0x419797 [ 133.557251][T10756] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 133.576992][T10756] RSP: 002b:00007fba77623f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 133.585406][T10756] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 133.593377][T10756] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 13:56:34 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x1) ftruncate(r0, 0x1000) r1 = syz_io_uring_setup(0x33c1, &(0x7f0000000180)={0x0, 0xd75f, 0x8, 0x2, 0x17d, 0x0, r0}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000240)) write(r1, &(0x7f0000000280)="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", 0x1000) lseek(r0, 0x2, 0x6) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0xffffffffffffffff}, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x5}, {}, 0xffffffff, 0xfffffffc}, {{@in6=@mcast1}, 0x0, @in=@multicast2, 0x20000, 0x0, 0x0, 0x0, 0x5, 0x662}}, 0xe8) set_mempolicy(0x3, &(0x7f0000000100)=0x69d0000, 0xff) set_mempolicy(0x1, &(0x7f00000012c0)=0xffffffffffffffd7, 0x0) lseek(r2, 0xffff, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f0000000140)) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x2, 0x4, @fd_index=0x6, 0x6, 0x8000, 0x943, 0x1d, 0x1, {0x3}}, 0x3) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x114, &(0x7f0000001280)=0xffffffff, 0x0, 0x4) [ 133.601345][T10756] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 133.609311][T10756] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 133.617280][T10756] R13: 0000000000000004 R14: 0000000020000318 R15: 0000000000000001 [ 133.625260][T10745] CPU: 0 PID: 10745 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 133.633824][T10745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.643923][T10745] Call Trace: [ 133.647199][T10745] dump_stack+0x137/0x19d [ 133.651538][T10745] should_fail+0x23c/0x250 [ 133.655957][T10745] should_fail_usercopy+0x16/0x20 [ 133.661007][T10745] strncpy_from_user+0x21/0x250 [ 133.666014][T10745] getname_flags+0xb8/0x3d0 [ 133.671384][T10745] do_mkdirat+0x3b/0x200 [ 133.675610][T10745] __x64_sys_mkdir+0x32/0x40 [ 133.680258][T10745] do_syscall_64+0x4a/0x90 [ 133.684785][T10745] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.690664][T10745] RIP: 0033:0x465707 [ 133.694584][T10745] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.715302][T10745] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 133.723704][T10745] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000465707 [ 133.731667][T10745] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 133.739631][T10745] RBP: 00007f4f4c085040 R08: 0000000000000000 R09: ffffffffffffffff 13:56:35 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x4100000000000000, 0x0, 0x0}, 0x58) 13:56:35 executing program 3 (fault-call:3 fault-nth:30): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1020, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 133.747583][T10745] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 133.755588][T10745] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 133.784814][T10756] loop4: detected capacity change from 0 to 264192 [ 133.838396][T10756] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 133.890487][T10756] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 133.901761][T10781] loop3: detected capacity change from 0 to 136 [ 133.908096][T10785] loop5: detected capacity change from 0 to 136 [ 133.915786][T10781] FAULT_INJECTION: forcing a failure. [ 133.915786][T10781] name failslab, interval 1, probability 0, space 0, times 0 [ 133.928572][T10781] CPU: 0 PID: 10781 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 13:56:35 executing program 4 (fault-call:1 fault-nth:10): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:35 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0xf5ffffff00000000, 0x0, 0x0}, 0x58) 13:56:35 executing program 2: set_mempolicy(0x2, &(0x7f0000000000)=0x2000000000020005, 0x401) r0 = fsopen(&(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x88880, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='\xc6\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x0) [ 133.931494][T10756] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 133.937102][T10781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.937118][T10781] Call Trace: [ 133.937125][T10781] dump_stack+0x137/0x19d [ 133.937153][T10781] should_fail+0x23c/0x250 [ 133.937172][T10781] ? __d_alloc+0x36/0x370 [ 133.960219][T10781] __should_failslab+0x81/0x90 [ 133.960250][T10781] should_failslab+0x5/0x20 [ 133.960273][T10781] kmem_cache_alloc+0x46/0x2e0 [ 133.990585][T10781] __d_alloc+0x36/0x370 [ 133.994751][T10781] ? __perf_event_task_sched_out+0xce0/0xd30 [ 134.000814][T10781] ? putname+0xa5/0xc0 [ 134.004881][T10781] d_alloc+0x2a/0x130 [ 134.008870][T10781] __lookup_hash+0x8f/0x180 [ 134.013638][T10781] filename_create+0xdb/0x3c0 [ 134.018328][T10781] do_mkdirat+0x59/0x200 [ 134.022569][T10781] __x64_sys_mkdir+0x32/0x40 [ 134.027162][T10781] do_syscall_64+0x4a/0x90 [ 134.031586][T10781] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.037483][T10781] RIP: 0033:0x465707 [ 134.041374][T10781] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.061021][T10781] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 134.069611][T10781] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000465707 [ 134.077622][T10781] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 134.085752][T10781] RBP: 00007f4f4c085040 R08: 0000000000000000 R09: ffffffffffffffff [ 134.093775][T10781] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 134.102164][T10781] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 134.166779][T10814] FAULT_INJECTION: forcing a failure. [ 134.166779][T10814] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 134.180084][T10814] CPU: 0 PID: 10814 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 134.188516][T10814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.198637][T10814] Call Trace: [ 134.201915][T10814] dump_stack+0x137/0x19d [ 134.206274][T10814] should_fail+0x23c/0x250 [ 134.210676][T10814] __alloc_pages_nodemask+0xe7/0x310 13:56:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x22000, 0x0) syz_io_uring_setup(0x3a7, &(0x7f0000000180)={0x0, 0x23ac, 0x10, 0x3, 0x81, 0x0, r0}, &(0x7f00006cf000/0xb000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x2, 0x4, @fd_index=0x6, 0x6, 0x8000, 0x943, 0x1d, 0x1, {0x3}}, 0x3) syz_io_uring_submit(r1, r3, &(0x7f0000000000)=@IORING_OP_NOP={0x0, 0x2}, 0x1) mmap$IORING_OFF_SQES(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x110, 0xffffffffffffffff, 0x10000000) 13:56:35 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) close_range(r3, r4, 0x0) r5 = signalfd(r1, &(0x7f00000000c0)={[0x100000000]}, 0x8) pidfd_getfd(r2, r5, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r7 = syz_open_pts(r6, 0x0) dup2(r7, r6) r8 = creat(&(0x7f0000000080)='./file0\x00', 0x20) syz_open_pts(r8, 0x0) ioctl$TIOCMBIS(r7, 0x5416, &(0x7f0000000140)=0x802) 13:56:35 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0xff8f000000000000, 0x0, 0x0}, 0x58) 13:56:35 executing program 3 (fault-call:3 fault-nth:31): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1100, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 134.215951][T10814] alloc_pages_vma+0x3c3/0x5e0 [ 134.220704][T10814] shmem_getpage_gfp+0x980/0x1410 [ 134.225833][T10814] shmem_write_begin+0x7e/0x100 [ 134.230681][T10814] generic_perform_write+0x196/0x3a0 [ 134.236077][T10814] ? file_update_time+0x1bd/0x3e0 [ 134.241114][T10814] __generic_file_write_iter+0x161/0x300 [ 134.246779][T10814] ? generic_write_checks+0x250/0x290 [ 134.252253][T10814] generic_file_write_iter+0x75/0x130 [ 134.257714][T10814] vfs_write+0x69d/0x770 [ 134.261967][T10814] __x64_sys_pwrite64+0xf5/0x150 13:56:35 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1400) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7466642c726e64bd283d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',dfltuid=', @ANYRESHEX]) fallocate(r1, 0x1, 0xeb6, 0x6) 13:56:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x685da96344811681) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x8000, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x2102) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x6, 0x0) [ 134.266913][T10814] do_syscall_64+0x4a/0x90 [ 134.271340][T10814] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.277330][T10814] RIP: 0033:0x419797 [ 134.281290][T10814] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 134.301067][T10814] RSP: 002b:00007fba77623f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 134.309597][T10814] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 13:56:35 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x58) [ 134.317571][T10814] RDX: 000000000000001d RSI: 0000000020012b00 RDI: 0000000000000004 [ 134.325567][T10814] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 134.333568][T10814] R10: 0000000000008c80 R11: 0000000000000293 R12: 0000000000000004 [ 134.341548][T10814] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 13:56:35 executing program 2: set_mempolicy(0x1, &(0x7f00000000c0)=0x101, 0x401) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x4000, &(0x7f0000000080)=0xa3, 0x4) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x64, 0x2, 0x4, 0x800, 0x1a, "7be8a24f734f9d101f9771aa990a1235662150"}) r1 = gettid() r2 = gettid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000140)=r2) tkill(r1, 0x1000000000013) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x80, r1}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180)="86148a910a6036fe0443c7d25942f289de5ee309dde992528df95fd9f2f33626e88bcdd66684126436861843f8db2da037d89ca902382cd327be82f1c2a3efb691943561f0883d90a4862672f766a2daa12db599f7ec92ea5469a6e8a9d75a3e10d1944ed7c6f98ddd64412b06c261bd6911628adf6eb14e81e30f686d6f0d44d4eeeb93eb0f6e0c6516c119c33781ecb51db97c003afef62eba2d68784f9eadb1436502de6462ef61b086ad05352f1facad06fffa1c40be", 0xb8, 0x20000000, 0x0, 0x0) [ 134.359467][T10837] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 134.374351][T10837] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 134.390061][T10838] loop3: detected capacity change from 0 to 136 [ 134.396503][T10814] loop4: detected capacity change from 0 to 264192 [ 134.398315][T10839] loop5: detected capacity change from 0 to 136 [ 134.404807][T10814] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 134.426863][T10814] EXT4-fs error (device loop4): ext4_fill_super:4943: inode #2: comm syz-executor.4: iget: root inode unallocated [ 134.434804][T10838] FAULT_INJECTION: forcing a failure. [ 134.434804][T10838] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 134.438953][T10814] EXT4-fs (loop4): get root inode failed [ 134.451958][T10838] CPU: 0 PID: 10838 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 134.457568][T10814] EXT4-fs (loop4): mount failed 13:56:35 executing program 4 (fault-call:1 fault-nth:11): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x10000074, 0x0, 0x3}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x10000008, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(0x0, 0x0, 0xc, r0, 0x0) getpid() r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="1000170017020007002e2f66696c6530"], 0x10) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='-]\x00') write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc", 0x2b1) sendfile(r1, r2, 0x0, 0x1c500) [ 134.466286][T10838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.466299][T10838] Call Trace: [ 134.466307][T10838] dump_stack+0x137/0x19d [ 134.488762][T10838] should_fail+0x23c/0x250 [ 134.493284][T10838] should_fail_usercopy+0x16/0x20 [ 134.498367][T10838] strncpy_from_user+0x21/0x250 [ 134.503214][T10838] getname_flags+0xb8/0x3d0 [ 134.507720][T10838] do_mkdirat+0x3b/0x200 [ 134.511971][T10838] __x64_sys_mkdir+0x32/0x40 [ 134.516560][T10838] do_syscall_64+0x4a/0x90 [ 134.520987][T10838] entry_SYSCALL_64_after_hwframe+0x44/0xae 13:56:35 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x58) [ 134.526962][T10838] RIP: 0033:0x465707 [ 134.530874][T10838] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.550485][T10838] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 134.558955][T10838] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000465707 [ 134.566971][T10838] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 134.574996][T10838] RBP: 00007f4f4c085040 R08: 0000000000000000 R09: ffffffffffffffff [ 134.583008][T10838] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 134.590983][T10838] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 134.604170][T10862] FAULT_INJECTION: forcing a failure. [ 134.604170][T10862] name failslab, interval 1, probability 0, space 0, times 0 [ 134.616815][T10862] CPU: 1 PID: 10862 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 134.625234][T10862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.635291][T10862] Call Trace: [ 134.638569][T10862] dump_stack+0x137/0x19d [ 134.643037][T10862] should_fail+0x23c/0x250 [ 134.647466][T10862] ? xas_create+0x3fb/0xb30 [ 134.652047][T10862] __should_failslab+0x81/0x90 [ 134.656827][T10862] should_failslab+0x5/0x20 [ 134.661400][T10862] kmem_cache_alloc+0x46/0x2e0 [ 134.666168][T10862] xas_create+0x3fb/0xb30 [ 134.670514][T10862] xas_create_range+0x146/0x360 [ 134.675364][T10862] shmem_add_to_page_cache+0x3ad/0x650 [ 134.680876][T10862] shmem_getpage_gfp+0xbdc/0x1410 [ 134.685912][T10862] shmem_write_begin+0x7e/0x100 [ 134.690881][T10862] generic_perform_write+0x196/0x3a0 [ 134.696185][T10862] ? file_update_time+0x1bd/0x3e0 [ 134.701231][T10862] __generic_file_write_iter+0x161/0x300 [ 134.706862][T10862] ? generic_write_checks+0x250/0x290 [ 134.712261][T10862] generic_file_write_iter+0x75/0x130 [ 134.717688][T10862] vfs_write+0x69d/0x770 [ 134.721939][T10862] __x64_sys_pwrite64+0xf5/0x150 [ 134.726915][T10862] do_syscall_64+0x4a/0x90 [ 134.731331][T10862] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.737254][T10862] RIP: 0033:0x419797 [ 134.741154][T10862] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 134.760796][T10862] RSP: 002b:00007fba77623f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 134.769227][T10862] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 13:56:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1200, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:36 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x58) [ 134.777219][T10862] RDX: 000000000000001d RSI: 0000000020012b00 RDI: 0000000000000004 [ 134.785223][T10862] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 134.793250][T10862] R10: 0000000000008c80 R11: 0000000000000293 R12: 0000000000000004 [ 134.801285][T10862] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 13:56:36 executing program 3 (fault-call:3 fault-nth:32): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x156f, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:36 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x41}, 0x58) [ 134.853753][T10872] loop5: detected capacity change from 0 to 136 [ 134.885198][T10862] loop4: detected capacity change from 0 to 264192 [ 134.932888][T10885] loop3: detected capacity change from 0 to 136 [ 134.940573][T10885] FAULT_INJECTION: forcing a failure. [ 134.940573][T10885] name failslab, interval 1, probability 0, space 0, times 0 [ 134.953304][T10885] CPU: 0 PID: 10885 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 134.961756][T10885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.971843][T10885] Call Trace: [ 134.975134][T10885] dump_stack+0x137/0x19d [ 134.979467][T10885] should_fail+0x23c/0x250 [ 134.983937][T10885] ? security_inode_alloc+0x30/0x180 [ 134.989293][T10885] __should_failslab+0x81/0x90 [ 134.994071][T10885] should_failslab+0x5/0x20 [ 134.998588][T10885] kmem_cache_alloc+0x46/0x2e0 [ 135.003364][T10885] security_inode_alloc+0x30/0x180 [ 135.008509][T10885] inode_init_always+0x20b/0x420 [ 135.013441][T10885] ? set_qf_name+0x230/0x230 [ 135.018039][T10885] new_inode_pseudo+0x73/0x1c0 [ 135.022797][T10885] new_inode+0x21/0x120 [ 135.026950][T10885] __ext4_new_inode+0x126/0x2f10 [ 135.031926][T10885] ? avc_has_perm+0x59/0x150 [ 135.036567][T10885] ext4_mkdir+0x28a/0x760 [ 135.040892][T10885] vfs_mkdir+0x2a4/0x370 [ 135.045129][T10885] do_mkdirat+0x11d/0x200 [ 135.049495][T10885] __x64_sys_mkdir+0x32/0x40 [ 135.054082][T10885] do_syscall_64+0x4a/0x90 [ 135.058499][T10885] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 135.064493][T10885] RIP: 0033:0x465707 [ 135.068454][T10885] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 135.088067][T10885] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 135.096479][T10885] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000465707 [ 135.104449][T10885] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 135.112427][T10885] RBP: 00007f4f4c085040 R08: 0000000000000000 R09: ffffffffffffffff [ 135.120402][T10885] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 13:56:36 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x58) [ 135.128389][T10885] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 135.142141][T10862] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 135.155919][T10862] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 135.157822][T10891] loop5: detected capacity change from 0 to 136 13:56:36 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f00}, 0x58) 13:56:36 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x58) [ 135.171265][T10862] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:56:38 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000004, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xa4001, 0x0) 13:56:38 executing program 3 (fault-call:3 fault-nth:33): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:38 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3000}, 0x58) 13:56:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:38 executing program 4 (fault-call:1 fault-nth:12): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:38 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pidfd_send_signal(r0, 0x4, &(0x7f0000000200)={0x37, 0x131, 0x4}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_io_uring_setup(0x7463, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xffffffff, 0x1000000}, &(0x7f00003b2000/0x800000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) r5 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000080)) preadv(r5, &(0x7f00000014c0)=[{&(0x7f0000000280)=""/172, 0xac}, {&(0x7f0000000380)=""/250, 0xfa}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x3, 0xfffffff7, 0xf1) syz_io_uring_submit(r3, r4, &(0x7f0000000340)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x4, 0x0, 0x3ff}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, r1, 0x80, &(0x7f0000000100)=@xdp}, 0x722c) io_uring_enter(r2, 0x4ab0, 0x0, 0x0, 0x0, 0x0) 13:56:38 executing program 0: r0 = socket$inet(0x10, 0x3, 0x4) sendto$inet(r0, &(0x7f00000000c0)="3ea8866ab68a0e60f23bcfa3a3550d2ed6b378fa759f79a79c0ee0813082408d9672ddde930b8041fe5989b8caf08acaf28ac1237abfd8e3295fcc2a6733adfda8c707bd65682a56b61bdf21a415d195075e16b83b02a0532d307b06f36df7c24f7fd41886d7946873dffac0cf94e6980d4a7114964a514c59dd5f9f229517468a3aa20e7612c5711a279d3158c54df49fbb108fe43073940b0eae6b17666af0bb59fbf26fda9291b728869b15773f9d", 0xb0, 0x80, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)="240000002e00074c8bfffd946fa2830022200a0000000000000000e50c1be3a20400007e280000001400ff03c81f8374b4c125a4ffba16a0aa1c0009b3ebea966cf0554e", 0x44}, {&(0x7f0000000240)="971db4e786948f23", 0x8}], 0x2}, 0x0) 13:56:38 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x58) 13:56:38 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$inet6(0xa, 0x4, 0xfffffffa) set_mempolicy(0x1, &(0x7f0000000080)=0xefc, 0x20) set_mempolicy(0x0, &(0x7f00000000c0)=0x9, 0x800) [ 137.472714][T10930] FAULT_INJECTION: forcing a failure. [ 137.472714][T10930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.485867][T10930] CPU: 0 PID: 10930 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 137.494289][T10930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.504343][T10930] Call Trace: [ 137.507656][T10930] dump_stack+0x137/0x19d [ 137.511997][T10930] should_fail+0x23c/0x250 [ 137.516434][T10930] should_fail_usercopy+0x16/0x20 13:56:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x7f, 0x0, 0x7ffc0001}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x0) [ 137.521553][T10930] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 137.527625][T10930] ? shmem_write_begin+0x7e/0x100 [ 137.532744][T10930] generic_perform_write+0x1e4/0x3a0 [ 137.538033][T10930] ? file_update_time+0x1bd/0x3e0 [ 137.540875][T10938] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=46 sclass=netlink_tcpdiag_socket pid=10938 comm=syz-executor.0 [ 137.543056][T10930] __generic_file_write_iter+0x161/0x300 [ 137.543086][T10930] ? generic_write_checks+0x250/0x290 [ 137.567064][T10930] generic_file_write_iter+0x75/0x130 13:56:38 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4100}, 0x58) [ 137.572442][T10930] vfs_write+0x69d/0x770 [ 137.576744][T10930] __x64_sys_pwrite64+0xf5/0x150 [ 137.581767][T10930] do_syscall_64+0x4a/0x90 [ 137.586187][T10930] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 137.592101][T10930] RIP: 0033:0x419797 [ 137.595989][T10930] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 13:56:39 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x40) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 137.615664][T10930] RSP: 002b:00007fba77623f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 137.624108][T10930] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 137.632081][T10930] RDX: 000000000000001d RSI: 0000000020012b00 RDI: 0000000000000004 [ 137.640061][T10930] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 137.648110][T10930] R10: 0000000000008c80 R11: 0000000000000293 R12: 0000000000000004 [ 137.656083][T10930] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 137.669983][T10931] loop5: detected capacity change from 0 to 136 [ 137.676331][T10932] loop3: detected capacity change from 0 to 136 [ 137.683733][T10932] FAULT_INJECTION: forcing a failure. [ 137.683733][T10932] name failslab, interval 1, probability 0, space 0, times 0 [ 137.696459][T10932] CPU: 0 PID: 10932 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 137.701794][ T25] kauditd_printk_skb: 23 callbacks suppressed [ 137.701807][ T25] audit: type=1326 audit(1619704599.010:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10944 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 [ 137.704884][T10932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.704899][T10932] Call Trace: [ 137.704906][T10932] dump_stack+0x137/0x19d [ 137.704938][T10932] should_fail+0x23c/0x250 [ 137.756394][T10932] __should_failslab+0x81/0x90 [ 137.761233][T10932] ? sidtab_sid2str_get+0x9c/0x130 [ 137.766351][T10932] should_failslab+0x5/0x20 [ 137.770858][T10932] __kmalloc_track_caller+0x64/0x350 [ 137.776142][T10932] kmemdup+0x21/0x50 [ 137.780034][T10932] sidtab_sid2str_get+0x9c/0x130 [ 137.784967][T10932] security_sid_to_context_core+0x1cb/0x2d0 [ 137.790861][T10932] security_sid_to_context_force+0x2f/0x40 [ 137.796689][T10932] selinux_inode_init_security+0x496/0x540 [ 137.802525][T10932] security_inode_init_security+0xd7/0x260 [ 137.808565][T10932] ? ext4_init_security+0x40/0x40 [ 137.813692][T10932] ext4_init_security+0x30/0x40 [ 137.818542][T10932] __ext4_new_inode+0x2944/0x2f10 [ 137.823582][T10932] ext4_mkdir+0x28a/0x760 [ 137.827911][T10932] vfs_mkdir+0x2a4/0x370 [ 137.832156][T10932] do_mkdirat+0x11d/0x200 [ 137.836482][T10932] __x64_sys_mkdir+0x32/0x40 [ 137.841095][T10932] do_syscall_64+0x4a/0x90 [ 137.845522][T10932] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 137.851413][T10932] RIP: 0033:0x465707 13:56:39 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6000}, 0x58) [ 137.855330][T10932] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.874970][T10932] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 137.883387][T10932] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000465707 [ 137.891358][T10932] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 137.899395][T10932] RBP: 00007f4f4c085040 R08: 0000000000000000 R09: ffffffffffffffff [ 137.907360][T10932] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 137.915342][T10932] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:39 executing program 3 (fault-call:3 fault-nth:34): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:39 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000003d80)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000003dc0)=0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000004040)=[{{&(0x7f0000000080)=@tipc=@id={0x1e, 0x3, 0x2, {0x4e23}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000004280)="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", 0x10d}, {&(0x7f0000000200)="65a62f008c", 0x5}, {&(0x7f0000000240)="7574f73e9dac681941e6f6f78dabfe7adcb66b41a49ebc057bd714e02ff026858148099dea2d2168fc3468413e91bb159005d883d830c9d21f59056633bbff9888ad204dcef2b86a34bc4f514f94b4f61f5a75a884eb5b09bf02acb6e8e29ebc98ac34", 0x63}, {&(0x7f00000002c0)="d602f38efbacb3dc4a2c421a41e7ce732a3695dda091f340fa9d29d099c8da7dffc826aa88f4f489356a73a87a8638be843f6d0ab1744dc8ae7d327d245bcd24960a13646711f343795b98e63605c171c3888f2715443120881657d545e125a3246f75b94ee793c39f6414e9", 0x6c}, {&(0x7f0000000340)="6637be11333caa78e189daa6e14b233ba124076bc6cfd09162e8c45f65a9ef2f1753a809c9ddb982a42aa63470e993ccf46134040dd2a65c43b9b4231910a4c220974c68d52415410f0e1a2d45b658929bf18b4b3e628958b7bb4ff6ebec3a6815282834f0d548a0b8403dd9a5374ef8ebe1129e406f05fe9cf936a77e052e841bc453d773bad558e7d3bfd00a1a1eb9807195651a1d124b6402afc832539b7a772618e1566ea95deb83beb338f912d7ae9e4d1513858ebb24459659", 0xbc}, {&(0x7f0000000400)="3e4dd58e7741207ffee871630cf46ee3f07eda9735935e5eb118d91d21b95f6ac0d8b1832a1dea8ec3299900b12b4a03484e2f47ea1149c1f1f7836022414b82b5e6086d3a009c76921dc89690193e2d5e8f64342bb19219c50a0598f29b99aea0827d0882c79c59ccecbfcf04366ded4a3f57", 0x73}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="ddc6aee14c00e7e8d5bf2d0d6742547fbf90e8048693c138f66160e77b3a951813818b9b8f58468c90a92b31e46b58bdf8f857ae4655baa065faee3fee2d11e21d9489785007da70f72ddd785dad7c5037aa47ea8f0275e2e79f129e8fe342c833f608ffd51e4793e6a40809a976a47896aec4c930a438c9cdb4", 0x7a}, {&(0x7f0000001500)="f69cfa535ef3086516808f10aba299780a4c0caaf9ad5e73186dd61e31da1ecb8ad65724a5b5d3fc99b51664437ae1ebe3411c9544517e2ab3940092ea1295aecd8ddd56fcdd90ab22b4090936f16514b8d1744e2e84e4f8c8cb2f63d36763fb5f94b8c1837bb069367dc40a5cfc5863dfc87ae41071d4a68584021c7d18bf1a5796eef194ac4617c370cab963a9ff3940876ee83d81df0d4a2f314c684317180cf70a782b29c8f90c3a166dd76cc0dd922907ab973241a1f2c021ee6e814dccca91c1141e96c188fcaa392d084a1d5a965b99f45553ef5d036dc837bcc9be9bb1c8128dd15d", 0xe6}], 0x9, &(0x7f00000016c0)=[{0x60, 0x0, 0x4, "4b433bc3a849883bcfe509df5fc9b86736b159a21bcdb4889f3de44e1226f1fcadab5a19fb61ded644a31bd38a0c6ef818992a9f6ac67c184386e239fd2602b9270984bfe0384a8954f0ff"}, {0x88, 0x109, 0xfffffff8, "cb6345fa62cb2a618dd29d153adeed6e4bf2dc7aecf1166dce28b36c2b16685852e43dc6092c3e1b7620733b0d0d7334e921efe8b8ae51e8223ac8d2816917aff2e9540b990ced1a28c1a341d1ad639103ee7ba5edd4640dbd76ba39c5918fd4bca309efb4b5850f659d84a8aea9cc943375ed"}], 0xe8}}, {{0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f00000017c0)="a59fe47db8692497615f239aaa81045c84332e771f5fabd09b44e5110e4d84113960a3379fef45ec438765ca3000ef3088a375d5e31c00c9f63199c6a4c074762bccd7dfca1beed518e5fb16ee4bb887b15f8d5f9ff7d66e1a828d7dd37c23080f913624aa20d5d2d503211b7980065da5a25f83b9a2dfa863b75624721d40ef35af300959de28cb302e5cfaa9aea2195bb0254464319c3d9918aaf349c2c75be031911ea0f46dfe5b9d7e1464fb6379782261ca9f2fd62e701518e5d5b715729bc6290f09a7294b4d6469caa4929304b87e1950ac1cabaf84cf179a0d256c0b018c35810ca43f1dbe595b0420777153af1419c82621ff5917df4a583dd1e96e3a05efce29b510b8233ded26b3de78e3b50217f34d18e0748ee3d0758affeee44b4ed4f3f976e18245ea1f7638acca7ce23df7f9a9b3cc3ecef0561736ce9e5aa437ea7c21c2ff1981bcdb0fc3876648e3b8dc799bcff54fe89ca2109b22cdabd76ad7bcfc65e42581ae8e9d0a92ccdfb62a4919ea7700e8c34aa3afe242e0dc03d0358b3a78ebf3b1a266639b16383c5a736709500d09c85f32e525dcd7fcf9056fb4c4098c8caa1901d34442ffb8529e716a5b92124c013565abee72f6f851e2fcb9cf99a44ae8ef42f1b3a03e64a1c84557946533b3a6b420e80ff57f3633caa8664d9595f85ebfeb1b097787125d216f5b5d3578d0568516ac3f42e6809d92ca8a3a3c622f0ccd4cc86c48268a98c022282997fc377acfd230d77bbe7785d0cf2bd9968fe98ed820e7bff130ecc248580c4aad333c73121aa6c28028607f02f2a2957e5261750b6324cb044ca5c482f87c8f1b0640b782a5543c6fe72211cae71460adca4615af936d3d548134dbf95b7b101d9f9c8415c69ad1256f5dfde0a65bd1bc604de304c3149ae17c09859c784760581257b50e9f777e49962d268712fa1869dd6ca9c036a000a76a54d0752978c3553fb036caefd4a948631b32d3a5ce10fef19606a3140e0ea6c81b6b6f23ebee7ecaada3c6180d22e1fd390e4f6a5fb3448b7718d7515d82279f737ff59104477e26b498532dea77a7f59c775985e8d47f97436f855b451c555acb5554a83d2500657138b3f79816d1b2f12f2a5327e0a8b14de3967b82b4aae35ebf5e4ac7aa961661665ef0baf4e55e3bee4e7dda18efed50facc6d1fc739f17c10941cbbc9b67dac795556bc629deebbdfc972c6a6452bbf63f56fcc071be8cad714e2da62798e3fd5f87f09f73d42657f29cd4e7587fe22e26e343dd37ef0ec3f3ad79f0485889e1cd45bda4a697fd6adbc87f46823572bd972eaaf3b05afdf10df648c96e85e2c554662463c2275162b3a4de67528396532e5598dde3c1443d25c1cbeb987feda595146c3f05187a41f3ba4ae266769bd5f462d7ba83919399481b774afc04e53d74bbd763a59249878efa9550dd40ad0cd9a26712c7760483be9c3e07be6cc9878d4304ab7134dacae510e77d7ca4a4e617ba5aa38553554b97581e78c135c5702047f8a7734e1162967c5975c408f75205179fa317cf7bc5d5daadb1091bf43d61078ad61aeb98f0edb1e56f72be58a79c51ec2048828867b01f19c5da27ca58f36254647c5936d9aa73fbb71f1621d18f5df3ffa282a05add83618fca8c37135fc15f7befcde70ee32dc6d1e57e7feaa7ff827de970e4358a539170f6f630ead7ec6271f2227c1a9f8f4c539612e74dce8b3a09abd56500f87b65e0314c5bd7bf8802bb24e99122378b7ed7a19d4e1de1c65e1a56c5b0c419782050738bf1fccfebeabc43f6640c1a67bcfdd8d2df8130decbd1ea5adf50ea2676dab4d84419bbd6ecfb99092921be0b7d4de6c7cd23b8de23ff07f2eb91bd13dfdf5a178ee147989c88c368e43a423d4352c178b742f536101b216a7600cbb6c0c1682f427c84d3bf1a127186f15e2467e5ba7d52ec932569502bb7a0fe3b61844575d9c1e3e705d3493b77a58b0cf29d2440fef603c0ab8daf12a2452cbe56eea528753c97b08b0d324586318532bb34e08eaf9be3ea31bdc30af78ef040beda5249c036053003b5ac5cc53ed0ccb6ce05c3b2ec7041d4acd4307edffd58bd2563ec8a0046c5bf2abdddd22d67addd52be50237a72bb03654a9a33bd84dfb18bc7302b8f0b63af7af4a244308c9c98beb285e639892b7aefab1741e771f253312b83cba823e765328df93bbd92f5b88dc95e4b3b627f54a4d0bced364ee379f715bdd46d6248251d39178244df4c08063645f5fd73442f53201a67022c55b9884f57a6b62bfedca9c5ad7af2050b6107ae02053c2c2eebf6868016f5358d9c2c164273f4e03f97c0da850672861f22def0fa1abfd9ae41b9689c90b33cd32b6b5e6a166f164bc952f0ed2414dba907ccb2ae1fd731af502e14f1c14c175fe07c3e0c72dcfceb7507d8bea3e277c2571c340e3ed53ceeffe67ca82d8e1bdfd29649293d67487a615464448a1e5b9fa4c9aecd307e2d0aeb0f5d2d3a9736ca441a7f45088132a0b2a6836145a016270ae61d64758679cae03e09a5b8c6d111758decd1dd936c76f14ea6d73e7b0966bf116eee636e4cb60e5b98cf15aa22fafa720fd9ca5e1f7dca625198a30bf25f38964f640ec8466e477c5879c247e2cd6f3edba7168e631c9412b751123737f70acaae94108ccbdc2b723bcc76562ef7f30be78f8fa948b3410ada12de1fa7bdbe6396d8dd70983fa9eef2391878fc07623ada7cc180daf57a168e3cd71159645c6bd4846b5334d08269d934e1f09c5c156e6a409688b2aa3bb7c626ab5f6f702254d533905f9223ce368b8426d2965ed83a657f75d45039e18d0abd972381dc8b60355bdb7283f6c15ff99cc9c6a60c1aa20bf45372036fc61fefdbccd67b210c01dd8a3c8771835f8d08dd217ba5462ab0927a39a4673671be33cd68954712f612621d40ad90c53426b293514eb1df15d9df3cc090c5ea936119e8e2802cedfe6fcc9a0d77e2ef2f462981c42217560ea39ae1a83f54e2f7063eee500bd10e384ed9f2f8fdf0656fc53e3b1cba5b1f5c4d48a7dfde2fb184b94b8a07b1c89e4c97eca47cc5f83c3d381087e74b71efe2dbacae5b125fe437a025482f05ec4026b55af4d3d3bd20bef255d5e39d4d5830f62181ff5d5830419a07eb4a2e1cbb480bf4fa679bbe303667ce18aaa03faf17e32f5a3a12d5a146ad3775aed6ac34a081930200291133654ceb64d40649dd95de61228ff04e2d0e9e12a7ac90f8556c48c70db5af895340325dfc5ea9c366a603da8c2e24e423b96dda197f994e0c626ebed15f6693572cee56615b747519a93f4baf8489280219a86b3ca1bcde5698c4a70fbafdaba0e9e09e5470295a60f87da4c52b40189595b2a76f31da49124c2c181078120a4510f0bbe7a5212d469c2520a7965574e1a4169c7ca626111a30bb2bbc161c942e1d1d7851343aacc3105c71b6f28c33b29e8ec0b393d9aaba86223fab76a180a7509019e78011c34b7f025c617336e041336653781d1b844812df9a420ebb2983b27d568e4169260fc73f8b84a3a04f0f3b108aac38425dfe12aecbfcdac2427f9038d64feeaaee0e6f7afe6492eb2e8b49e389c2862d6a96397a52cc75c4c0d096e7d2f49848fd0dc3c6895d866849b51b1658f94bce19e5bb7b476aebc048b26a34f1f0ec05f81636d7de24a5bfa074d437abfd84ed50f089ee9b1712188fe952133524f347c8f8f8a4b90a81be6d61c0d9cc5b2afb5a5662d5f7e14cacc368129e8fd8ead72073c2de9641b4df587bf354ce148cec4413590e326145272aa90856a9fdcb57f536e41ff7fc5cdbf7279f37066ae15118ab22dcf68f3ed57b6308c81094e5ab3fa95e2113e7dadb8477ad9f7e79f3512ffb9a4905456f739c501671917022783ad0856b876a203e7cbe3cfe076e401a0772a7b3e4084a9bdc7c374ba861f7ba3240c9bf5d271f2ab68a2fb5710555daeb04c3ca7fd238400bdd8dafc96d5fc3859b9c6b0c4229ddf5026aaed31d12a4f43509b8b0e0f944a8802cd92ef3a98b6d21d8dad5717db1719f6fa1aaa0d7983aa8a7d9d9de5db6e315c1bfac7ff3cebae6deeb112b0760459e8764bad1b5fb9d2531cfa27eaa0b11bd941ec62b04fe51f06a4d62260630c08cd5ecb7ff7238d382d281bfe5b85826855a59b61988f205fd42a4adc6fa6d29444163934baa99be9dfb9b2fa2e9f88ce1182d8b86843bc21118c79211cf476b1115b037427f2ebd7bc566318bf9d510a578597723ab1097bc20baf09baae4653066a2ee379643827b9bb1279d76b45c99dbb54f4b98ecdd27cf296ad6948e4e7b0b080f3c4b9264c863095ac3c8afc2172a49ad011729266a17202bf30928814f33d127d678d41ba87b26bd1b0d4351a78fc13d148638b4cb74953d54914843e390a785574607798fd0a4d7a043c03101d845e1994bb596aa13a64e6cb98c423cf94b8222ad6e54f46131a786efd830dc866a69432aa30950ebcb1d38e6f3c02cc3ed1811e91ee40d6ba1a84de65ef33ac1d7dda4056a5f1a6ab0a6559558cd0abd06473b06d9f29fdbedbbcfdf8a568b57769896936392b732b495a161475a4dbae488b671de9224e710a8eebe92bf8dbf958922299fa2805a6bb7e65b525103fa467df41fef33f0ba532c35c2c59d7d971090a99f8b7a668b83ad74797ddbfbc0d21020aca1980ff4b5a899bc1ff157332b9ce4d78b4bb2e976e1359f5d277fa698b3a0523724b0b31c759b66a57897c0d5415a4ea3b4a1140290dd497a018ea5872f7d3e8dab6c7f58ad87f07dc48b2f39197d018848433f2dcbf6cafa5a60c7594b476436ca6a64937876bcc559dfdcc2a8d1f632f9f16f6d83c164e4eaab7b5b777bf81ee80319acac167d8f83ecf5e2e0b1ad5640bce83123260f57ee52dc7c78b53c3002f6e4348f041c786e9eca59764b09b1c0c17afd08c3201518edf002584e823088c476d5333fac72f4fe6c810f8da4c3cf0c625946bf2f8f2f956a6794fb5b0d2285020a41604e71d7bb6db06ff6f625ec7695682a26a2ec09dee12a6c4b435e197601ab36977cf65ef4294c58a46c6ec2b0d796d777e1272107077a7e0c1394f711291af2eb1ab002afc91dcc6ec0f9f3457ba3b8107fdbe5ef4aaf1ce79dc12f40523ba00781a603dd33f4c2b86a0ba56a95ea3f32164ee8cf833e65651f7640bb4c89f184969d0174aa745a62608aa0d19a9086819f4e149da1049921b601db75181c788114b69c6a6ca87dfdb4bcea5ca857014d5ec16314848b4a26b916d61151bfd166f64069c698ce05c46ad2ea269d32a148806ea567da4c8c23a96eb631f32273f89b60e19f48595582f18b91749f941e1a337c9fb8eb74a2f8ac88d13aae1aa73d1e12c9e17d480b9a65aa278d35a86fe6c90b7c94b1a4fb66d0e8b5b8645127f9a0f977515579b0ffaee6055c3a974ca7ded74419d8a202da730e93b9d18085861aa0a4d0ac909ca7abc615517ce1015e3d6bb3fce64711ec5df4eabd98a7e97ae61d497cffeb58ac630837aad3ffb019856d91c4af54157f69f21baa203e83eb4207961bfb20134ce06b292a322dbf80e1be0ca81d6e14bc99853b53fe003bfd2717e5d562f25ee7c56aa2ef77b8f9c1fb264531f19c25ac8b501969b545def1bb134c925dadf85baf016a154f2da6ac6140a1211fe40569fb353d5eba05a96e1dea3e822a731e8256a35025af76f3e8dd861c6cf8bfd54da1d99eab214baa9ba9b75995abcc3640500"/4096, 0x1000}], 0x1, &(0x7f0000002800)=[{0x1010, 0x102, 0x4, "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"}, {0x10, 0x10d, 0x3f}, {0x40, 0x107, 0x80000000, "d03447272a3303efa0bce4689f56614547f8913a760ec74b6a0db0a221a6ac43bcd0aed2df814315ce8cb1a97dd1"}, {0xb0, 0x29, 0x400, "177bf5a3debd67cc865af5640efb861d35df4e17a87337cb6b90823f2d83a23129ddd2d8ff0271b6c81fbe4f8f21a4f53a0302594f3038c1f84450d660623807cbeccf0f7748eb88f1fa60b4c4c85345a0f61b5a6d7f3ffc699c8ad9c12f7bbac6621cb628603813bb73932061482821a82fc18e9b016e369181e41c9074afe08d92c59c2bbe5d3737e2044fdbb1836e8ba2b9abf8a6f2649e43fc5eb76296"}, {0xf0, 0x108, 0xfff, "21e6eac29c901f71c499d67f0e603b2530b89e1123ee9f25e27b34ae2c763eaf71f8c8785b5af37117a8bae490aa2b1497841b2984890d72ae6467fe18273917f0c7ded5f63256e6529afd9e5b3bf865483d22550f27a3a0e65f0428ad3479b6a73f291929a343e021850150fb1dac5dc9b81c4814842d6cde6c56536ebc93fc5587dcafb8658c11239276470ffc80f604e99e527dae49fe5cce6a743483532790bb6dca1aa60c1b2bff1f54f60045a97c421313e0e7ee0c25507cee31617dffcce70eb372e385fea7f8111af55a71b2d4f03d7086b0c710f85f6498f3"}], 0x1200}}, {{&(0x7f0000003a00)=@isdn={0x22, 0x5, 0x9, 0x7, 0x3}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000003a80)="a5a8abb51f4ad10ef3dc042bb3ee6e6642cff976cfcad7833f6b1755e4c08e1afe9e8a1c0620413b762e391bd1ee04d76c1674c712a8b74518e11c2109e1b088e462fbd8d22f27bc39b1f4c41b204b9e98b61f07deb04ae48924abfbcf7466bbc66a71b4e2bfaff92fffe56f7aab60a14452cace59a961b8ae7beae57873714054d646d0c241e5b99a730da210b1ae838b93f4b7497906f58f633f3f11578a8297e6cf27f21e27f08dce5c64f0ebe70faddb2bbb816e82ef292732e5f787f3250f0b1a17b11c54344518ed1cb30d7fa463261c90c782a5cb043a", 0xda}, {&(0x7f0000003b80)="9ed7d3313314204bee4c1ef7b3c0e30cb236b5d786287231672f84c270c1baf71e833f3f42db97abf51c04d6e5dcd6109335ce657e69db30d911342aa9", 0x3d}, {&(0x7f0000003bc0)="c6aae2f96230419ff1720645ce0618c31b520fff1a2fffcce7aed4001359f7790925e7dbbcf1264a813359ffc4dac2146d80f385431a5d6fa08d2d3de98328dde9344e19aaf7395c371a1760674691e69211f6db382f0b8b62ce1035552f9e0d8bce4f40", 0x64}, {&(0x7f0000003c40)="0207d6d7f65dece2aef0cfcb34c6eeef8aa7d28fe4af0b91bd3a363791fd41591e48922d2ea753061ee64ebcd87e386925917963e9f2169a8745fb0eb24dc28abfaa1cb769e0", 0x46}, {&(0x7f0000003cc0)="11b19668f02d9f18011872e0a2e1", 0xe}], 0x5}}, {{&(0x7f0000003e00)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x3, 0x1, 0x0, {0xa, 0x4e23, 0x200, @mcast1, 0x5b}}}, 0x80, &(0x7f0000004000)=[{&(0x7f0000003e80)="1dbd71a4ba571f0a73b12975ec7418398d67f8092953bae6cd77f8a2f65534a202d60f138e6364da0f1e721fef8abde7b4fdaa14a1a1583cbec85595718f4647259c30f939a840ae8009421436174c4f761d1221c70334bb5a8277bd2a5274ad0f956554362ccd9d443f6e71008d12623b66b4", 0x73}, {&(0x7f0000003f00)="b94defb9127ff6c35e79b42e2f9ec01eb2630b41d87426b208d9cfeeb1052009692d1b52daa2237b85a215274a321a29d48aa962cf619045e7e740617d1c1b342162ca3253c648e58052066dafc0efe1fdbab3e6ee45f257e780ad96c6874f02ed1080c49d40a15b686eee232f6a48c5be838c17fb53a995696eddc02a9065656095c5db0bcff9041be6483565711ef70c343135379b152c69c9d744d9016b3dfdea0ead2e2bb38a4ceb6ac07b1854189fd8de8138dbafa88bea7989ff8245f693e99d80e02d160e0efc27f6d842c097bd5d13a4a52ca605c414aca4060b2a13b974d92a0ea879fdc12e49d94e54", 0xee}], 0x2}}], 0x4, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) mount$9p_unix(&(0x7f0000004140)='./file0\x00', &(0x7f0000004180)='./file0\x00', &(0x7f00000041c0), 0x200000, &(0x7f0000004200)={'trans=unix,', {[{@mmap}, {@mmap}, {@version_9p2000}], [{@dont_measure}, {@appraise}, {@subj_role={'subj_role', 0x3d, '&'}}, {@euid_gt={'euid>', r2}}, {@seclabel}, {@obj_user={'obj_user', 0x3d, '}:)-'}}]}}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000008, 0x13, r3, 0x824dc000) [ 137.938862][T10930] loop4: detected capacity change from 0 to 264192 [ 137.954337][T10930] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 138.009360][T10930] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 138.025095][T10977] loop3: detected capacity change from 0 to 136 [ 138.034030][T10930] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 138.038683][T10977] FAULT_INJECTION: forcing a failure. [ 138.038683][T10977] name failslab, interval 1, probability 0, space 0, times 0 [ 138.059721][T10977] CPU: 1 PID: 10977 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 138.068139][T10977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.078225][T10977] Call Trace: [ 138.081523][T10977] dump_stack+0x137/0x19d [ 138.085864][T10977] should_fail+0x23c/0x250 [ 138.090281][T10977] __should_failslab+0x81/0x90 [ 138.095057][T10977] ? kcalloc+0x32/0x50 [ 138.099200][T10977] should_failslab+0x5/0x20 [ 138.103710][T10977] __kmalloc+0x66/0x350 13:56:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2010, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:39 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8fff}, 0x58) 13:56:39 executing program 4 (fault-call:1 fault-nth:13): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:39 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x144) set_mempolicy(0x0, &(0x7f0000000080)=0x2000000000000003, 0x405) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x632200, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x800680, 0x0) 13:56:39 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xff8f}, 0x58) [ 138.107871][T10977] kcalloc+0x32/0x50 [ 138.111770][T10977] ext4_find_extent+0x21c/0x7f0 [ 138.116628][T10977] ? __cond_resched+0x11/0x40 [ 138.121393][T10977] ext4_ext_map_blocks+0xd9/0x1f00 [ 138.126541][T10977] ? mark_buffer_dirty+0x151/0x200 [ 138.131749][T10977] ? __ext4_handle_dirty_metadata+0x20c/0x590 [ 138.137839][T10977] ? __down_read_common+0x16b/0x5a0 [ 138.143044][T10977] ? percpu_counter_add_batch+0x69/0xd0 [ 138.148595][T10977] ? ext4_es_lookup_extent+0x206/0x490 [ 138.154054][T10977] ext4_map_blocks+0x1be/0xef0 13:56:39 executing program 2: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x1000) set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 138.158815][T10977] ext4_getblk+0xb1/0x3d0 [ 138.163190][T10977] ext4_bread+0x28/0x130 [ 138.167441][T10977] ext4_append+0xd1/0x1c0 [ 138.171839][T10977] ext4_init_new_dir+0x177/0x500 [ 138.176878][T10977] ext4_mkdir+0x329/0x760 [ 138.181211][T10977] vfs_mkdir+0x2a4/0x370 [ 138.185460][T10977] do_mkdirat+0x11d/0x200 [ 138.189791][T10977] __x64_sys_mkdir+0x32/0x40 [ 138.194384][T10977] do_syscall_64+0x4a/0x90 [ 138.198856][T10977] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.204755][T10977] RIP: 0033:0x465707 [ 138.208668][T10977] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 138.212192][T10998] loop5: detected capacity change from 0 to 136 [ 138.228280][T10977] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 138.228314][T10977] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000465707 [ 138.228326][T10977] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 138.228337][T10977] RBP: 00007f4f4c085040 R08: 0000000000000000 R09: ffffffffffffffff [ 138.258976][T10977] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 138.258992][T10977] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 138.288888][T10977] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 138.355702][T11020] FAULT_INJECTION: forcing a failure. [ 138.355702][T11020] name failslab, interval 1, probability 0, space 0, times 0 [ 138.368388][T11020] CPU: 1 PID: 11020 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 138.376953][T11020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.387003][T11020] Call Trace: [ 138.390372][T11020] dump_stack+0x137/0x19d [ 138.394687][T11020] should_fail+0x23c/0x250 [ 138.399182][T11020] ? getname_flags+0x84/0x3d0 [ 138.403849][T11020] __should_failslab+0x81/0x90 [ 138.408628][T11020] should_failslab+0x5/0x20 [ 138.413192][T11020] kmem_cache_alloc+0x46/0x2e0 [ 138.417941][T11020] getname_flags+0x84/0x3d0 [ 138.422426][T11020] ? vfs_write+0x50c/0x770 [ 138.426916][T11020] getname+0x15/0x20 [ 138.430872][T11020] do_sys_openat2+0x5b/0x250 [ 138.435514][T11020] __x64_sys_openat+0xef/0x110 [ 138.440261][T11020] do_syscall_64+0x4a/0x90 [ 138.444688][T11020] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.450600][T11020] RIP: 0033:0x4196e4 [ 138.454504][T11020] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 138.474103][T11020] RSP: 002b:00007fba77623ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 138.482502][T11020] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004196e4 [ 138.490463][T11020] RDX: 0000000000000002 RSI: 00007fba77624000 RDI: 00000000ffffff9c [ 138.498435][T11020] RBP: 00007fba77624000 R08: 0000000000000000 R09: ffffffffffffffff 13:56:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2200, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:39 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20010}, 0x58) 13:56:39 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x1, &(0x7f0000000080)=0x3, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:39 executing program 3 (fault-call:3 fault-nth:35): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:39 executing program 4 (fault-call:1 fault-nth:14): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:39 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x8c, 0x453, 0x100, 0x70bd2b, 0x25dfdbfd, "ee123150d85026e9a005321491f0fd5a41de1732609befe41ff2e2db122080c217819866e78ed711cb0cf7e2a87dbf9124e197a2343841bdc78ac7671b5d451b6fd20b66ce1f48a76897cbc090469172abe592b5a3e1bcc6e59c9fbc7c398b87fb72f9be5942f2d5c98373226c6fd2b7642c6fb9488221e986cb", ["", "", "", "", "", ""]}, 0x8c}, 0x1, 0x0, 0x0, 0x1}, 0x20048888) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="73797a31fa3c3eda5acaf9ff1b9e6d0627a6e61d087687644a3dc5a2c629f265958790321dc6c2b1e010b3b86925ea86ed88bb36ac982c8a4562e5e605224019784206303bb1fcafd748b091727aee90f0282bc62932b3e98cf0d446f85e7820519a936a8d8189d5594e946885eb4e12aa8fdb12437222d1c0198436cc7a20b4c19999a788bce1c739967ac086a83f0f7ebacef3efebf4da3fa4b333e87dbc26ef0b3f1e239c15ac76ce3af7db3d226a78201ce8b417b3a1785d994744594d854f9690ed0d560773e6b216560cdc0c2a624f39f9f69fa8ce9a04c6e79e1cf022a6f013d7cbd9a41e0d556f038d82da51de8c085ea76730d80757387841fe25b1889eb148d044e256663cedddda4cd3ed352e52fbd498568af806b2b40c382247b9b02a19d0d0bd1a240c7ef70d81424b64ef08705513603ba703c647a70b174f77c94f8d4c947d52747eee49cd631e6efc93d62914467b76b01dfd87e34e02724938134ba38809b1c86aa01820f99ee906fb01e5dbde8ae2df7e9f89d62ae22413a1add94aea6cedb5a323754c31eb4203a997995bb6a3abcf7ce9ecf65cf732c9fa22658a1982c1aa42bdeff6472fc1490b385138a19e19a7751525ced0e52d55e7abfe115e469ed5feecc984157382019e0f078c12f64120b069e3dc2f5135e520b6400ba356012fae18c710e3f3040a0c7f33ed52a9e0fba5a4f7baf56f8e55bfc9605860cbb1b8f9246c31ab82fb8c308593196628d005e527527a7bd327d62ce0c2bf949f58f0fa50ecd7e371d1c4b8798f466797e6bed108cc0f818503dbdd58d95c0b06a4461de58fc3f7c25fef99acf8c839e762f3a75bcb0b572ffd5031c7d0655321d540a91c18255054291930551bc22aec54ef8e0d6742135e3370962e1fac9e906af2923609afc1b1d0accfd859727775b24f9b8a29988c4b64840ad9d24a58667bf47f0d5b66e4ece85af5c04b983e020eb17f88b54d6e67815bdc76c6d3c177f7673bde9a111de290bc31faee70342f06b75a34b943a4ca351b9b4598c46dd930d89a71f08b1b3ed0f0b414a62c007e95a5e3e10045cc0ae30f4a2ba2d003fe1faf359c7f34dd60e8ae72a77e780c01430f514169c57f31d1921d1d93ea20da0e831c3b342e87a636761025d7616863395db6e2ef08c80618c2d88f4468eb85a53b2dd5964fe9d26490e43b00418de40efb7e95278ee9a94bfda0e27d3dab904e9fe0853618df45642ca22d9c68bcdd19dcf25e295047980dd9434925eb7f4410616e861ae8845fc323780784320cd9376eb9dade14c611299afc5d24eeefc9e9303de5578cb7fb47f75b33fe19c6ce1699f107f0a9695736206d4163d3a1efcb785198a9afeb586e7d5dc251a55da4567607c5b4c5f442f6316a0a44d9dd21e5a9dbd081ea2fe7cddeb235a14e6718a8acc187674c834e08ca121a9ebfaec129d863d2d847748d53ee489c63446e1ca595c55a6b501a0ab5cf5a71b9dcbeaad742fc1ac57f3801336fa125a9a5e162fabfecff18637fbd8b562d50307ab76993e7757ef2d3fccc1124410b7d9712cc804ae0258f8bbe7728235a4594600c3f9c0720ebc6d310e5367b8334fbe4667b9633c732ffb1eb061c910d64ed310714ce142ddf360dc1195cc653d38f8c836503e2693a959b6e883aa07b51649039b1205553499ed5d72500c246f5255ed652bc908c08f0afbbb44b79bf2b99413a9c0ec0b6092c41fe9271667589038dc0f5df5a85b8dabd0e1fc804ab7c6ef035c897e9ad10747576c4eec509c47cbb4e9070813304690e36936cd8b7847ff9b4e20c28ba1ced4b396ba8fd8b5eb2ddc1bd72a961192047aff6e92f640f6f25bb6684e1735f6b8933aac6e6ca48e1ee0cc5623277b55e6a496d1ccfb53ae9177e113b9530dc8b34a250ad406ad37d30f94d0f76c975c3bfdedfdc5c4fe3dc8095317bb5e75f5a6ceba7269acbd8bda162504eee498ab04604e1775399161e1cbe74ffb26ffb608757227d2cb6e4c55595417184f71de7fe13dadc3556983b7a1229a130b700897e6dd2181edc7b92f17447ad9eea7bd7877f2323a1a4c432d0ee24f29d16c221d0f420e1eda75b94551f5478011fdf5a74d90c6cb4af9b7582d2d1574de0a0a15f1cd242410c2faf7aca6d3651c48b253b869f5feb222eb26c8538c1ae668b91200a7d8ac70ba59d46c7cb7cfe2faac556a36f8b163fee3253cc8d35c4410bc80c9f1d7346f2b6b4cdca12dc8ca7282560cb29dc30f10e22bf0ff16f3d02f8a08e51174cce045689503027bdfc1c97290f82ab1bc05a09922bf222267248a1bd384c32ce24f8b3284a9c3bc7411052af7476a177800b84b47c4b3a924a080e09e9473851197843bc007fb933ecb1875ee044e379aa7de75f7dbf2828e603eaf0e3cb24fe1d41d32f4e4692738156478b48f695f6726371dc9f31104fce89b14ee86cb59fa7d5a0a8984c8458b9d016740dd710b1ef52948d9c69ee69a6e055ec1c8e36d2bf873f28f8e7d5b4c088753b0fe75673be9371bfe82ceac28a9a6261fd618762a5e0478c89bf41c94db7573b4dd555f749f3a5e7d8e2d68c32075cebc4e914d5019f427bf349ace7bb7d1cc8d72b68221fc360a7ea9561fb8a9d1c9e9b24baeee5f46dca714f8073a2416b07d621bdef0353844f3e333d4f77190ae3627b2ba9a61e0ce654e864cc878b69e96d2f3562333468d9e3b1211d3aa17cdce21e3c8741c9ed72c142ad6c0a006779535763070753615a3a11ba4e63c83dbb0131f224e47efa1859cbce9ef25cc6a9cec3a7814e011d53c480c2485ae1b0b377f01c30c14b21123fef7ffe98583af752cae40838bef4bc670d4b36c7b4309dcc2f543d68d318ea22dddb7260c3c75400f66a6b2857c3ba3a2189066cc012f4a9e10075503a25633430d988ad0572eae0218528076a13187aadb1dfdf10d8272f6db6439ea587fa072c5bd7ab1161d0c5d055c9859c14c44dc4a0f9c85b1f7be4a96ea92f4f73db7157ccb2bf16c257253b83a51014a7da4fa9102fd92ed38c1154ac85fba9f0ca1709af3b7e22df6186d10741e8945160b3e11e290e925375898ba27c54e9e836a4f58eadc463c6dca70cfb6d7950ebad82b3b1eb6f02a0f5ca6aa3320b5ddcb28a61cfb76afbf24d3eac4cb27eee10250a7cf140e7941afff50191cc7a022968f000470359ad91242a18679c3c46009e5e7982ca07a762243e8a1cfd817b7af53b204137e84e1311e2b0a8ffba503395a94b06c1754ab4ab1f25f587acfc871201cd950a5cb34c5aea3fd773d9c117c5944480a8125e535a5696c02cfea712ac64ff056aaff684e5fe401fa59633332364f59602b700fe7d5ffba21551c4c50dac237861813e972e633b1d2d3ca00e5c075b1a564d2277c0b9ad9d298658a1319991725ee631692061664bf678a090c9aded96e243da0ea34a9ba708e12a1044aa5fc9daa62a5b2ba1f1aec240b491d3cb05f0184ae102610162fae162e61a5cfd0326542dda097617885aa7858fad1ae6c8b146d074de54c86955f3d08bd5650e6e4879cb517d872e2b63c400e2dc0c19111d82a4d589744366a0a8662ab8c1e00ce58ccb6f20b57ca2922350e3d6b506f66ea500260a1442d4d48d7db4688c6177e9f81e3cf4836fc6a64489ca4f4b92c315efec0d66c44a076f99befbd356b4144319004d55a6253a9ff8ebf3647ab9b035cd1ee0935115537d8879ae1d55003f68f7c57f54ff74c966cb6c157fff2f3529e5229432411064b16d686203428ce1e4c75cc00c58e13ed5a49399701bde4a71526ebe58998e18aaea9bff9b98f609c541f3a5abd3739f642ca5f5ef5e094b599136c5a63fd5109bdd11b38f022a98b8b02e0d39289d85080af50ac16a060e32008200671bcac30d5550765ac42496032f69afd56426cfab3e8722eb88472d98560c1fc60613d1a8b7aee8188002a7bfe2e56bb231803ed419f851d73b7491f7548f6b65eb201fd59d802d966117d5add8a0f27348c18f87537b8eda720853b8d18c383bea8400922046b233404cd9c76e9d7d3290dcb2a4acdfbe9932d037de4bc0637294314138207466e89f9afbe71e1b31f27601be5338d8ad44c7a00601de42792b7324695113c7f32780ccc44086986fee1d80e8d78a2e7f2797870d89f625b01b63eea26bd44ba645d41be4b42048f3a457daadbd411ecf23008d8c0b7d42f2220ace16b4b5f16a039c8182addbd0cdf40a7bf23dd87e200f975d45ef06d2a6cef2d53aaf8e62963b5afc786c1931ec20c88116b986f6e04008b2bb78460a77531f00cdd78c69986696e810073f81674b68f8c193e96b3fbce486f2c009c3e8cdb3947a1f370013aed43f9be6242f99e27c747bc75a2d2e487d29c81c7d4d7e473bb2178257de50f3e9e151cc832209c06915e7c5920322bf4c52695b6c4426f175f77d5a0ad6987f7a3eb5c3aabbe118ee37c36488044a1cef9608a0e8442645344bd54bd1ec4139a53e8aff1f1a36fc9a3acbaddbde173fb943e2b42c93ff333925f081958502d6dcabcb268a447b57409e8e9a56c8af20ff8450b2d301db45b9ab573637ef3b252440f583d1fc97f197d435e221ca706933d2ab67cf6f020f056e2c5fa53a81639c78410c4bc6defeb030aadf4328d2b21aa56dcadbd78a85aee02c0155869278361277fc6cebb64ac7bf64fa7d8258f670e142a23e0528a72078939fa49dfb42e67c3fa3ee17fc106a399c851541c17eb4e3729b682597b4ad3f82d117d188f26d142df8862d22e36d0b5d550a7acad93a1679a7d8a3e910d33bbe9e747b1ba2c1f4114c41d7f65771b4cc96535baed4f40c350a531520cc390e0c61e4b69aab33c543e140dbb76f07c4d229c75fc6b342f8f65c8b585620809bccebf38d11588c920b5052a9c59010ecc99c61541f34a6138a17e7edb6108881d6af0ebdb04fbbfa6c6fcd04f3524677ff900fe43403c52b42d3c64a280b15002649aa15f1f136f81232ff3f5e208fed46b68e256219eba9023832fce142ed529b7f2ae96da7cdff598e12cf7ce2605c9e6d1f24a99306c21df53f5e0ec119de741aece785f578f28e1d720bf9322212b66b1dc5ac929f2c6b457595e5eee5a5e82be8ab7c1b7a2d4f8bcc55455f36c3f908c8f81191a5288d7302fd8142e33ae2e9bea2e160c24b1eb92940ee510895cea70ab4370028b4b41b0f29a4aaececd40396670a83138ff25a3aecf79c40b5d5678f13fe18d4fce2c12ebe22f3211e472a071753af9593c57a7f9418c03667615eef164d5eaaf6ee7795789b3b888d46d373f9d499725cd735d2c806a4474ce55eb359d9a0e5c39a54b3f44a289d1cc3d07c501eda41502a61eefc47c345e1ad0127c255ab3418ac3fc5fe7298457f6fdc3c91fb3fc5b6d08c7dae5322e07cecf247da0a6c2b1eb12c8fee14358db892d65d5a49cdd3fb46eff2d650a6954ec095e55d51b8c723595e8d751affa14e725ca69e28490be139b70c5493951f90842b54bb5e97c0e8f72b6257daf44063c44e8e5a7048a31d24f95fb94848014735606b1799514204ed5cbe52e70eca9b34734505f61e7c6757a3320b3a0fe38971e94558e5bf66852b5b7fd1a1a4dcc286ec3817056b2c01f468ef51a18ffe7e7351a4d1f18ec60f3b9e1d69a5ecfbf406d5d90bb90e52bb422f4f8bd00cf054239a2f22cdc8a5a8672b4af3953fb254adca154e040d6529a5da2f6a6351ec70458a30430461d238adb5ba441cc85e11cca18f391ae13d4069fee98b8e83840f1cd1305bc5a153"], 0x1004) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) [ 138.506391][T11020] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 138.514447][T11020] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 138.517833][ T25] audit: type=1326 audit(1619704599.840:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10944 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 [ 138.596313][T11035] FAULT_INJECTION: forcing a failure. [ 138.596313][T11035] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 138.609402][T11035] CPU: 1 PID: 11035 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 138.617829][T11035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.628007][T11035] Call Trace: [ 138.631301][T11035] dump_stack+0x137/0x19d [ 138.635662][T11035] should_fail+0x23c/0x250 [ 138.640079][T11035] should_fail_usercopy+0x16/0x20 [ 138.645126][T11035] strncpy_from_user+0x21/0x250 [ 138.646242][T11040] loop3: detected capacity change from 0 to 136 [ 138.650031][T11035] getname_flags+0xb8/0x3d0 [ 138.650053][T11035] ? vfs_write+0x50c/0x770 [ 138.666372][T11035] getname+0x15/0x20 [ 138.668131][T11040] FAULT_INJECTION: forcing a failure. [ 138.668131][T11040] name failslab, interval 1, probability 0, space 0, times 0 [ 138.670419][T11035] do_sys_openat2+0x5b/0x250 [ 138.670451][T11035] __x64_sys_openat+0xef/0x110 [ 138.692335][T11035] do_syscall_64+0x4a/0x90 [ 138.696777][T11035] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.702675][T11035] RIP: 0033:0x4196e4 [ 138.706561][T11035] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 138.726160][T11035] RSP: 002b:00007fba77623ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 138.734567][T11035] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004196e4 [ 138.742554][T11035] RDX: 0000000000000002 RSI: 00007fba77624000 RDI: 00000000ffffff9c [ 138.750515][T11035] RBP: 00007fba77624000 R08: 0000000000000000 R09: ffffffffffffffff [ 138.758480][T11035] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 138.766442][T11035] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 138.774482][T11040] CPU: 0 PID: 11040 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 13:56:40 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x58) 13:56:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000300), 0x0, 0x1e4}, {&(0x7f0000000140)='S', 0x1, 0x600}], 0x0, &(0x7f0000010d00)) chdir(&(0x7f0000000040)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x315, 0x800000, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6d, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0xfffffffffffffffe, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local, @mcast1, @mcast2}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f00000013c0)=ANY=[@ANYRES64, @ANYBLOB]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) socket(0xa, 0x1, 0xf5) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='rdma.current\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000400)=ANY=[], 0x208e24b) [ 138.774655][ T25] audit: type=1107 audit(1619704599.930:102): pid=11032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='î1PØP&é 2‘ðýZAÞ2`›ïäòâÛ €Â˜fçŽ×Ë ÷â¨}¿‘$á—¢48A½ÇŠÇg]EoÒ fÎH§h—ËÀF‘r«å’µ£á¼Æ土¼|9‹‡ûrù¾YBòÕɃs"loÒ·d,o¹H‚!é†Ë' [ 138.782894][T11040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.782906][T11040] Call Trace: [ 138.782912][T11040] dump_stack+0x137/0x19d [ 138.782937][T11040] should_fail+0x23c/0x250 [ 138.829392][T11040] __should_failslab+0x81/0x90 13:56:40 executing program 2: set_mempolicy(0x8000, &(0x7f0000000080)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:40 executing program 4 (fault-call:1 fault-nth:15): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 138.831314][ T25] audit: type=1107 audit(1619704599.930:103): pid=11032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='î1PØP&é 2‘ðýZAÞ2`›ïäòâÛ €Â˜fçŽ×Ë ÷â¨}¿‘$á—¢48A½ÇŠÇg]EoÒ fÎH§h—ËÀF‘r«å’µ£á¼Æ土¼|9‹‡ûrù¾YBòÕɃs"loÒ·d,o¹H‚!é†Ë' [ 138.834244][T11040] ? sidtab_sid2str_get+0x9c/0x130 [ 138.834272][T11040] should_failslab+0x5/0x20 [ 138.868252][T11040] __kmalloc_track_caller+0x64/0x350 [ 138.873582][T11040] kmemdup+0x21/0x50 [ 138.881591][T11040] sidtab_sid2str_get+0x9c/0x130 [ 138.886540][T11040] security_sid_to_context_core+0x1cb/0x2d0 13:56:40 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x58) [ 138.892528][T11040] security_sid_to_context_force+0x2f/0x40 [ 138.898334][T11040] selinux_inode_init_security+0x496/0x540 [ 138.904148][T11040] security_inode_init_security+0xd7/0x260 [ 138.910020][T11040] ? ext4_init_security+0x40/0x40 [ 138.915107][T11040] ext4_init_security+0x30/0x40 [ 138.919955][T11040] __ext4_new_inode+0x2944/0x2f10 [ 138.925010][T11040] ext4_mkdir+0x28a/0x760 [ 138.929382][T11040] vfs_mkdir+0x2a4/0x370 [ 138.933674][T11040] do_mkdirat+0x11d/0x200 [ 138.938004][T11040] __x64_sys_mkdir+0x32/0x40 [ 138.942651][T11040] do_syscall_64+0x4a/0x90 [ 138.947070][T11040] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.953027][T11040] RIP: 0033:0x465707 [ 138.956724][T11059] FAULT_INJECTION: forcing a failure. [ 138.956724][T11059] name failslab, interval 1, probability 0, space 0, times 0 [ 138.956915][T11040] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 138.989172][T11040] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 138.997587][T11040] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000465707 [ 139.005556][T11040] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 139.013522][T11040] RBP: 00007f4f4c085040 R08: 0000000000000000 R09: ffffffffffffffff [ 139.021481][T11040] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 139.029444][T11040] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 139.037415][T11059] CPU: 1 PID: 11059 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 139.045898][T11059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.056382][T11059] Call Trace: [ 139.059656][T11059] dump_stack+0x137/0x19d [ 139.064071][T11059] should_fail+0x23c/0x250 [ 139.068489][T11059] ? __alloc_file+0x2e/0x1a0 [ 139.073079][T11059] __should_failslab+0x81/0x90 [ 139.077862][T11059] should_failslab+0x5/0x20 [ 139.082371][T11059] kmem_cache_alloc+0x46/0x2e0 [ 139.087185][T11059] __alloc_file+0x2e/0x1a0 [ 139.091620][T11059] alloc_empty_file+0xcd/0x1c0 [ 139.096387][T11059] path_openat+0x6a/0x20b0 [ 139.100802][T11059] ? iov_iter_advance+0x291/0xe10 [ 139.105831][T11059] ? shmem_write_end+0x37d/0x3d0 [ 139.110770][T11059] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 139.117015][T11059] ? generic_perform_write+0x332/0x3a0 [ 139.122470][T11059] do_filp_open+0xd9/0x1f0 [ 139.126890][T11059] ? __virt_addr_valid+0x15a/0x1a0 [ 139.132000][T11059] ? __check_object_size+0x253/0x310 [ 139.137281][T11059] ? alloc_fd+0x36d/0x3c0 [ 139.141794][T11059] do_sys_openat2+0xa3/0x250 [ 139.146394][T11059] __x64_sys_openat+0xef/0x110 [ 139.151153][T11059] do_syscall_64+0x4a/0x90 [ 139.155583][T11059] ? irqentry_exit_to_user_mode+0x5/0x20 [ 139.161231][T11059] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.167141][T11059] RIP: 0033:0x4196e4 [ 139.171028][T11059] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 139.190631][T11059] RSP: 002b:00007fba77623ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 13:56:40 executing program 3 (fault-call:3 fault-nth:36): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 139.199101][T11059] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004196e4 [ 139.207068][T11059] RDX: 0000000000000002 RSI: 00007fba77624000 RDI: 00000000ffffff9c [ 139.215033][T11059] RBP: 00007fba77624000 R08: 0000000000000000 R09: ffffffffffffffff [ 139.222999][T11059] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 139.230969][T11059] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 139.246933][T11050] loop5: detected capacity change from 0 to 136 [ 139.293730][T11078] loop3: detected capacity change from 0 to 136 [ 139.301095][T11078] FAULT_INJECTION: forcing a failure. [ 139.301095][T11078] name failslab, interval 1, probability 0, space 0, times 0 [ 139.313743][T11078] CPU: 0 PID: 11078 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 139.322166][T11078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.332222][T11078] Call Trace: [ 139.335501][T11078] dump_stack+0x137/0x19d [ 139.339841][T11078] should_fail+0x23c/0x250 [ 139.344258][T11078] __should_failslab+0x81/0x90 [ 139.349037][T11078] ? kcalloc+0x32/0x50 [ 139.353123][T11078] should_failslab+0x5/0x20 [ 139.357640][T11078] __kmalloc+0x66/0x350 [ 139.361799][T11078] ? kcalloc+0x32/0x50 [ 139.365875][T11078] kcalloc+0x32/0x50 [ 139.369772][T11078] ext4_find_extent+0x21c/0x7f0 [ 139.374642][T11078] ? kfree+0xf0/0x1d0 [ 139.378604][T11078] ext4_ext_map_blocks+0xd9/0x1f00 [ 139.383765][T11078] ? __down_write_common+0x45/0x890 [ 139.388943][T11078] ? __down_read_common+0x16b/0x5a0 [ 139.394121][T11078] ? percpu_counter_add_batch+0x69/0xd0 [ 139.399648][T11078] ? ext4_es_lookup_extent+0x206/0x490 [ 139.405104][T11078] ext4_map_blocks+0x70d/0xef0 [ 139.409883][T11078] ext4_getblk+0xb1/0x3d0 [ 139.414210][T11078] ext4_bread+0x28/0x130 [ 139.418523][T11078] ext4_append+0xd1/0x1c0 [ 139.422895][T11078] ext4_init_new_dir+0x177/0x500 [ 139.427880][T11078] ext4_mkdir+0x329/0x760 [ 139.432195][T11078] vfs_mkdir+0x2a4/0x370 [ 139.436426][T11078] do_mkdirat+0x11d/0x200 [ 139.440737][T11078] __x64_sys_mkdir+0x32/0x40 [ 139.445391][T11078] do_syscall_64+0x4a/0x90 [ 139.449902][T11078] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.455781][T11078] RIP: 0033:0x465707 [ 139.459652][T11078] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 139.479245][T11078] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 13:56:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2500, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:40 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r0, 0x4d, 0x7f, 0x8001}) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) 13:56:40 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x300000}, 0x58) 13:56:40 executing program 4 (fault-call:1 fault-nth:16): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) set_mempolicy(0x4000, &(0x7f0000000040)=0x4, 0x2) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190014c04800000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 13:56:40 executing program 3 (fault-call:3 fault-nth:37): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:40 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x58) [ 139.487650][T11078] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000465707 [ 139.495628][T11078] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 139.503579][T11078] RBP: 00007f4f4c085040 R08: 0000000000000000 R09: ffffffffffffffff [ 139.511530][T11078] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 139.519577][T11078] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:40 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x100a00, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000200)=0x9) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1082810, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, '/dev/ttyS3\x00'}}], [{@obj_type={'obj_type', 0x3d, '#(-}'}}, {@subj_type={'subj_type', 0x3d, '/dev/ttyS3\x00'}}, {@hash}, {@fsname={'fsname', 0x3d, '.)'}}]}}) syz_open_pts(r3, 0x0) dup2(r2, r1) ioctl$TIOCSBRK(r2, 0x5427) 13:56:40 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x504f01}, 0x58) [ 139.577793][T11100] FAULT_INJECTION: forcing a failure. [ 139.577793][T11100] name failslab, interval 1, probability 0, space 0, times 0 [ 139.590529][T11100] CPU: 0 PID: 11100 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 139.598976][T11100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.609063][T11100] Call Trace: [ 139.612335][T11100] dump_stack+0x137/0x19d [ 139.616705][T11100] should_fail+0x23c/0x250 [ 139.621122][T11100] ? security_file_alloc+0x30/0x190 [ 139.626326][T11100] __should_failslab+0x81/0x90 [ 139.631104][T11100] should_failslab+0x5/0x20 [ 139.635617][T11100] kmem_cache_alloc+0x46/0x2e0 [ 139.640458][T11100] ? __alloc_file+0x2e/0x1a0 [ 139.644162][T11103] loop5: detected capacity change from 0 to 136 [ 139.645048][T11100] security_file_alloc+0x30/0x190 [ 139.656293][T11100] __alloc_file+0x83/0x1a0 [ 139.660708][T11100] alloc_empty_file+0xcd/0x1c0 [ 139.665510][T11109] loop3: detected capacity change from 0 to 136 [ 139.665571][T11100] path_openat+0x6a/0x20b0 [ 139.665590][T11100] ? iov_iter_advance+0x291/0xe10 [ 139.665608][T11100] ? shmem_write_end+0x37d/0x3d0 [ 139.665628][T11100] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 139.692560][T11100] ? generic_perform_write+0x332/0x3a0 [ 139.698026][T11100] do_filp_open+0xd9/0x1f0 [ 139.702444][T11100] ? __virt_addr_valid+0x15a/0x1a0 [ 139.707581][T11100] ? __check_object_size+0x253/0x310 [ 139.712934][T11100] ? alloc_fd+0x36d/0x3c0 [ 139.717323][T11100] do_sys_openat2+0xa3/0x250 [ 139.721987][T11100] __x64_sys_openat+0xef/0x110 [ 139.726746][T11100] do_syscall_64+0x4a/0x90 [ 139.731172][T11100] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.737062][T11100] RIP: 0033:0x4196e4 [ 139.740973][T11100] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 139.760584][T11100] RSP: 002b:00007fba77623ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 139.768999][T11100] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004196e4 [ 139.776965][T11100] RDX: 0000000000000002 RSI: 00007fba77624000 RDI: 00000000ffffff9c [ 139.784928][T11100] RBP: 00007fba77624000 R08: 0000000000000000 R09: ffffffffffffffff [ 139.792891][T11100] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 139.800911][T11100] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 139.817942][T11109] FAULT_INJECTION: forcing a failure. 13:56:41 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0xc0) fallocate(r2, 0x0, 0x0, 0x1000f4) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 13:56:41 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000004, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:41 executing program 4 (fault-call:1 fault-nth:17): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 139.817942][T11109] name failslab, interval 1, probability 0, space 0, times 0 [ 139.830578][T11109] CPU: 0 PID: 11109 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 139.839047][T11109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.839060][T11109] Call Trace: [ 139.839069][T11109] dump_stack+0x137/0x19d [ 139.856789][T11109] should_fail+0x23c/0x250 [ 139.861237][T11109] ? ext4_mb_new_blocks+0x2e7/0x1f60 [ 139.866598][T11109] __should_failslab+0x81/0x90 [ 139.871403][T11109] should_failslab+0x5/0x20 [ 139.875930][T11109] kmem_cache_alloc+0x46/0x2e0 [ 139.880697][T11109] ext4_mb_new_blocks+0x2e7/0x1f60 [ 139.885865][T11109] ? ext4_find_extent+0x6cf/0x7f0 [ 139.890895][T11109] ? ext4_ext_search_right+0x300/0x540 [ 139.896356][T11109] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 139.902078][T11109] ext4_ext_map_blocks+0x1569/0x1f00 [ 139.907362][T11109] ? __down_read_common+0x16b/0x5a0 [ 139.912537][T11109] ? percpu_counter_add_batch+0x69/0xd0 [ 139.922112][T11109] ? ext4_es_lookup_extent+0x206/0x490 [ 139.927569][T11109] ext4_map_blocks+0x70d/0xef0 [ 139.932389][T11109] ext4_getblk+0xb1/0x3d0 [ 139.936766][T11109] ext4_bread+0x28/0x130 [ 139.941057][T11109] ext4_append+0xd1/0x1c0 [ 139.945395][T11109] ext4_init_new_dir+0x177/0x500 [ 139.950361][T11109] ext4_mkdir+0x329/0x760 [ 139.954749][T11109] vfs_mkdir+0x2a4/0x370 [ 139.958994][T11109] do_mkdirat+0x11d/0x200 [ 139.963343][T11109] __x64_sys_mkdir+0x32/0x40 [ 139.967914][T11109] do_syscall_64+0x4a/0x90 [ 139.972310][T11109] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.978185][T11109] RIP: 0033:0x465707 [ 139.982074][T11109] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 140.001677][T11109] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 140.010071][T11109] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000465707 [ 140.018054][T11109] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 140.026009][T11109] RBP: 00007f4f4c085040 R08: 0000000000000000 R09: ffffffffffffffff [ 140.033995][T11109] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 140.041995][T11109] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2601, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:41 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x600000}, 0x58) 13:56:41 executing program 3 (fault-call:3 fault-nth:38): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:41 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x1f60000000000000, 0x2, &(0x7f0000000340)=[{&(0x7f0000000180)="31149f170fa11797a7660610b8af172822f3339ab0d52a27f4625ce62da89146637de4bdf937e9e83609e35a41f4a4c1321e1e62c53528870fa8093500f31508451b40f3610701bb46fa3604a0e4a33905437d179be3bd816000769670872fb07082a6fc5824cbf86155b290cd201239895f51edceed4995c296721654ffc68e3d78a9887621fa0920447f2f1e3c2cb8", 0x90}, {&(0x7f0000000240)="52686821e81ee64c69b468c33adae86cf389ed4bad4fa571d32815c69cdf419fdc26569c7eb07598ed8436821db15c3a27aa697cd98cfe2de6091adb7c95d94511c093cd1254ddc38d05fb2b0fed49125eba27379137e8105a5093e6091a048c2aa831f54ec54baf722eeb91ef0abc703a7260d8d07aa794ec11730086bbbe863ad42c2d2ff19a509cd3ed48a364066e4facf6c0415c8fde4a420254c0982b58a1bb962373dad67a9f52fdcb10aa277ff172a0b99c11b73538fab4abfa816be08018bdc3d20d36c8aa4d9534fce9ad42ab21d357dddab9eac38fef02a5d7d3bcf1c86840c459e0e1572b10e56ce33a52d823f2f0ff6341", 0xf7, 0x8}], 0x0, &(0x7f0000000380)={[{@nonumtail}, {@utf8no}, {@utf8no}, {@rodir}, {@shortname_win95}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@dont_appraise}]}) write(r1, &(0x7f0000000440)="241098313fa1e4ca7ae9e06d7f62a702c3fb03d11940474f5338639cbec231ea09115833205800938ba088bed3aabc3dc942ce256b22fe7cd1dd1ceb36d31ab931679c96f8c5d68b1163d982055034ce62a283bdf8af33e91aa6240bd4356aeb472f55afde91377126adbf057c806b2ea2739298cf312ed11447e9e0f3f199ed97b290fdf5afc3585bf132144356ebc609da317ee62287fc29df2ba2438e6bed03e78dc6ebfda2e949d811c34d1119134787287572e93558bcdde8450a2711a2a4080800006e211c68a84ce9398ebf0ac6d423a935691a1300758dd51b", 0xdd) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x80980, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000080)={0xb6c, 0x82, 0x6a5, 0x3f, 0x7f, "f70000ff620ef300000000000700", 0x1, 0x1}) [ 140.137621][T11134] FAULT_INJECTION: forcing a failure. [ 140.137621][T11134] name failslab, interval 1, probability 0, space 0, times 0 [ 140.150287][T11134] CPU: 1 PID: 11134 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 140.158719][T11134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.168770][T11134] Call Trace: [ 140.172050][T11134] dump_stack+0x137/0x19d [ 140.176384][T11134] should_fail+0x23c/0x250 [ 140.180795][T11134] ? loop_set_status_from_info+0x3a0/0x3a0 13:56:41 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc0631d}, 0x58) [ 140.186607][T11134] __should_failslab+0x81/0x90 [ 140.191376][T11134] ? __kthread_create_on_node+0x7a/0x290 [ 140.197012][T11134] should_failslab+0x5/0x20 [ 140.201526][T11134] kmem_cache_alloc_trace+0x49/0x310 [ 140.206821][T11134] ? loop_set_status_from_info+0x3a0/0x3a0 [ 140.212743][T11134] __kthread_create_on_node+0x7a/0x290 [ 140.218220][T11134] ? __cond_resched+0x11/0x40 [ 140.222922][T11134] ? __blkdev_get+0x8c/0x6c0 [ 140.227535][T11134] ? loop_set_status_from_info+0x3a0/0x3a0 [ 140.233347][T11134] kthread_create_on_node+0x72/0xa0 [ 140.238549][T11134] loop_configure+0x597/0xcb0 [ 140.243309][T11134] ? mntput+0x45/0x70 [ 140.247290][T11134] lo_ioctl+0x555/0x11f0 [ 140.251533][T11134] ? path_openat+0x19ab/0x20b0 [ 140.256309][T11134] ? putname+0xa5/0xc0 [ 140.260432][T11134] ? ___cache_free+0x3c/0x300 [ 140.265148][T11134] ? blkdev_common_ioctl+0x9c3/0x1040 [ 140.270502][T11134] ? selinux_file_ioctl+0x8e0/0x970 [ 140.275686][T11134] ? lo_release+0x120/0x120 [ 140.280184][T11134] blkdev_ioctl+0x1d0/0x3c0 [ 140.284668][T11134] block_ioctl+0x6d/0x80 [ 140.288892][T11134] ? blkdev_iopoll+0x70/0x70 [ 140.293499][T11134] __se_sys_ioctl+0xcb/0x140 [ 140.298206][T11134] __x64_sys_ioctl+0x3f/0x50 [ 140.303314][T11134] do_syscall_64+0x4a/0x90 [ 140.307728][T11134] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 140.313621][T11134] RIP: 0033:0x4663b7 [ 140.317495][T11134] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:56:41 executing program 4 (fault-call:1 fault-nth:18): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:41 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x58) [ 140.337082][T11134] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 140.345479][T11134] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 140.353451][T11134] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 140.361409][T11134] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 140.369363][T11134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 140.377313][T11134] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 140.398579][T11143] loop2: detected capacity change from 0 to 264192 [ 140.417359][T11145] loop5: detected capacity change from 0 to 136 [ 140.424002][T11142] loop3: detected capacity change from 0 to 136 [ 140.457382][T11142] FAULT_INJECTION: forcing a failure. [ 140.457382][T11142] name failslab, interval 1, probability 0, space 0, times 0 [ 140.466320][T11161] FAULT_INJECTION: forcing a failure. [ 140.466320][T11161] name failslab, interval 1, probability 0, space 0, times 0 [ 140.470051][T11142] CPU: 0 PID: 11142 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 140.491016][T11142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.501164][T11142] Call Trace: [ 140.504453][T11142] dump_stack+0x137/0x19d [ 140.508803][T11142] should_fail+0x23c/0x250 [ 140.513231][T11142] ? ext4_mb_new_blocks+0x6f2/0x1f60 [ 140.518520][T11142] __should_failslab+0x81/0x90 [ 140.523298][T11142] should_failslab+0x5/0x20 [ 140.527811][T11142] kmem_cache_alloc+0x46/0x2e0 [ 140.532689][T11142] ext4_mb_new_blocks+0x6f2/0x1f60 [ 140.537796][T11142] ? ext4_find_extent+0x6cf/0x7f0 [ 140.542814][T11142] ? ext4_ext_search_right+0x300/0x540 [ 140.548271][T11142] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 140.553999][T11142] ext4_ext_map_blocks+0x1569/0x1f00 [ 140.559326][T11142] ? __down_read_common+0x16b/0x5a0 [ 140.564519][T11142] ? percpu_counter_add_batch+0x69/0xd0 [ 140.570091][T11142] ? ext4_es_lookup_extent+0x206/0x490 [ 140.575565][T11142] ext4_map_blocks+0x70d/0xef0 [ 140.580331][T11142] ext4_getblk+0xb1/0x3d0 [ 140.584696][T11142] ext4_bread+0x28/0x130 [ 140.588930][T11142] ext4_append+0xd1/0x1c0 [ 140.593262][T11142] ext4_init_new_dir+0x177/0x500 [ 140.598226][T11142] ext4_mkdir+0x329/0x760 [ 140.602557][T11142] vfs_mkdir+0x2a4/0x370 [ 140.606794][T11142] do_mkdirat+0x11d/0x200 [ 140.611142][T11142] __x64_sys_mkdir+0x32/0x40 [ 140.615751][T11142] do_syscall_64+0x4a/0x90 [ 140.620170][T11142] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 140.626251][T11142] RIP: 0033:0x465707 [ 140.630141][T11142] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 140.649769][T11142] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 13:56:42 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000340)) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x184, 0x1, 0x1, 0xb5e771a1b3939548, 0x0, 0x0, {0x1, 0x0, 0x2}, [@CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x4}, @CTA_TUPLE_REPLY={0x78, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @CTA_MARK_MASK={0x8}, @CTA_LABELS_MASK={0x18, 0x17, [0x10001, 0x9, 0xffffffff, 0x477cd349, 0x400]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x4}, @CTA_PROTOINFO={0x38, 0x4, 0x0, 0x1, @CTA_PROTOINFO_SCTP={0x34, 0x3, 0x0, 0x1, [@CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8, 0x3, 0x1, 0x0, 0xcc23}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x3f}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8, 0x3, 0x1, 0x0, 0x3ff}, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8, 0x2, 0x1, 0x0, 0x200}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x3f}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x81}]}}, @CTA_TUPLE_REPLY={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x35}}, {0x14, 0x4, @mcast2}}}]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x1}, @CTA_TUPLE_REPLY={0x58, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x2b}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x48010}, 0x20008000) r2 = perf_event_open$cgroup(&(0x7f0000000440)={0x3, 0x80, 0xb3, 0x5, 0x1, 0x7, 0x0, 0xc2b2, 0x2, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000400)}, 0x2, 0x7, 0x9, 0x5, 0x401, 0x40, 0xbba4, 0x0, 0x6, 0x0, 0x3}, r1, 0xc, r1, 0x9) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x3f, 0x9, 0x0, 0x3, 0x0, 0x0, 0x5040, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5a, 0x1, @perf_config_ext={0xe6, 0x100000000}, 0x0, 0x376, 0x282843a3, 0x2, 0x1, 0xfb, 0x7, 0x0, 0x1, 0x0, 0xff}, 0xffffffffffffffff, 0x4, r2, 0xa) set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) flock(r2, 0x8) 13:56:42 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x14f5000}, 0x58) [ 140.658184][T11142] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000465707 [ 140.666242][T11142] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 140.674218][T11142] RBP: 00007f4f4c085040 R08: 0000000000000000 R09: ffffffffffffffff [ 140.682190][T11142] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 140.690167][T11142] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 140.698145][T11161] CPU: 1 PID: 11161 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 140.706601][T11161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.716652][T11161] Call Trace: [ 140.719927][T11161] dump_stack+0x137/0x19d [ 140.724332][T11161] should_fail+0x23c/0x250 [ 140.724355][T11161] ? __kernfs_new_node+0x6a/0x330 [ 140.724376][T11161] __should_failslab+0x81/0x90 [ 140.724396][T11161] should_failslab+0x5/0x20 [ 140.743205][T11161] kmem_cache_alloc+0x46/0x2e0 [ 140.747962][T11161] __kernfs_new_node+0x6a/0x330 [ 140.752897][T11161] ? __cgroup_account_cputime+0xb6/0x1e0 [ 140.758514][T11161] ? rb_insert_color+0x7e/0x310 [ 140.763357][T11161] kernfs_create_dir_ns+0x5e/0x140 [ 140.768515][T11161] internal_create_group+0x138/0x850 [ 140.773871][T11161] ? check_preempt_wakeup+0x1bb/0x360 [ 140.779232][T11161] sysfs_create_group+0x1b/0x20 [ 140.784084][T11161] loop_configure+0xa21/0xcb0 [ 140.788753][T11161] lo_ioctl+0x555/0x11f0 [ 140.793030][T11161] ? path_openat+0x19ab/0x20b0 [ 140.797829][T11161] ? putname+0xa5/0xc0 [ 140.801902][T11161] ? ___cache_free+0x3c/0x300 [ 140.806566][T11161] ? blkdev_common_ioctl+0x9c3/0x1040 [ 140.811932][T11161] ? selinux_file_ioctl+0x8e0/0x970 [ 140.817204][T11161] ? lo_release+0x120/0x120 [ 140.821706][T11161] blkdev_ioctl+0x1d0/0x3c0 [ 140.826188][T11161] block_ioctl+0x6d/0x80 [ 140.830437][T11161] ? blkdev_iopoll+0x70/0x70 [ 140.835119][T11161] __se_sys_ioctl+0xcb/0x140 [ 140.839776][T11161] __x64_sys_ioctl+0x3f/0x50 [ 140.844363][T11161] do_syscall_64+0x4a/0x90 [ 140.848770][T11161] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 140.854676][T11161] RIP: 0033:0x4663b7 [ 140.858610][T11161] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 140.878243][T11161] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 140.886675][T11161] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 140.894627][T11161] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 13:56:42 executing program 0: r0 = semget$private(0x0, 0x3, 0x28) semctl$SETVAL(r0, 0x2, 0x10, &(0x7f0000000000)=0x2) [ 140.902593][T11161] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 140.910541][T11161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 140.918491][T11161] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 140.926529][T11161] loop4: detected capacity change from 0 to 264192 13:56:42 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000200}, 0x58) 13:56:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2701, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:42 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1d63c000}, 0x58) 13:56:42 executing program 3 (fault-call:3 fault-nth:39): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 140.964092][T11161] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:56:42 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014", 0x1d, 0x9400}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) truncate(&(0x7f0000000040)='./file0\x00', 0x9) open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/159, 0x9f) 13:56:42 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) getpeername(r0, &(0x7f00000000c0)=@in={0x2, 0x0, @dev}, &(0x7f0000000140)=0x80) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 141.012592][T11161] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 141.052213][T11186] loop5: detected capacity change from 0 to 136 [ 141.061807][T11191] loop3: detected capacity change from 0 to 136 [ 141.072690][T11161] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 141.085756][T11191] FAULT_INJECTION: forcing a failure. [ 141.085756][T11191] name failslab, interval 1, probability 0, space 0, times 0 [ 141.098423][T11191] CPU: 1 PID: 11191 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 13:56:42 executing program 4 (fault-call:1 fault-nth:19): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:42 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f000000}, 0x58) 13:56:42 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x4000, &(0x7f0000000080)=0x7f5, 0x9) set_mempolicy(0x1, &(0x7f00000000c0)=0xfffffffffffffffd, 0x4800) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 141.106908][T11191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.116966][T11191] Call Trace: [ 141.120268][T11191] dump_stack+0x137/0x19d [ 141.124607][T11191] should_fail+0x23c/0x250 [ 141.129024][T11191] ? __es_insert_extent+0x51f/0xe80 [ 141.134258][T11191] __should_failslab+0x81/0x90 [ 141.139025][T11191] should_failslab+0x5/0x20 [ 141.143579][T11191] kmem_cache_alloc+0x46/0x2e0 [ 141.148398][T11191] __es_insert_extent+0x51f/0xe80 [ 141.153441][T11191] ext4_es_insert_extent+0x1bb/0x19d0 [ 141.158855][T11191] ? percpu_counter_add_batch+0x69/0xd0 [ 141.164440][T11191] ? ext4_es_lookup_extent+0x206/0x490 [ 141.170018][T11191] ext4_map_blocks+0xa4c/0xef0 [ 141.174767][T11191] ext4_getblk+0xb1/0x3d0 [ 141.179136][T11191] ext4_bread+0x28/0x130 [ 141.183360][T11191] ext4_append+0xd1/0x1c0 [ 141.187679][T11191] ext4_init_new_dir+0x177/0x500 [ 141.192666][T11191] ext4_mkdir+0x329/0x760 [ 141.196996][T11191] vfs_mkdir+0x2a4/0x370 [ 141.201312][T11191] do_mkdirat+0x11d/0x200 [ 141.205636][T11191] __x64_sys_mkdir+0x32/0x40 [ 141.210218][T11191] do_syscall_64+0x4a/0x90 [ 141.214684][T11191] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 141.220579][T11191] RIP: 0033:0x465707 [ 141.224490][T11191] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 141.244174][T11191] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 141.252623][T11191] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000465707 [ 141.260584][T11191] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 141.268551][T11191] RBP: 00007f4f4c085040 R08: 0000000000000000 R09: ffffffffffffffff [ 141.276552][T11191] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 141.284543][T11191] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3001, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:42 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x58) 13:56:42 executing program 0: unshare(0x40000000) unshare(0x4000400) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000140)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1:\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]-8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 13:56:42 executing program 3 (fault-call:3 fault-nth:40): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:42 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x260400, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)={0xffffffa4, 0x0, 0x0, 0x0, 0xe, "850e00"}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r3 = syz_open_pts(r2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80100, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r5 = syz_open_pts(r4, 0x0) dup2(r5, r4) syz_open_pts(r4, 0x4a0000) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCMBIC(r6, 0x5417, &(0x7f0000000140)=0x58) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x8, 0x8, 0x1f, 0xfa70, 0x1b, "3b41612a6caf93768acdd521b348a6352adaa1"}) dup2(r3, r2) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) r7 = syz_open_pts(r1, 0x0) dup2(r7, r1) ioctl$TIOCEXCL(r1, 0x540c) [ 141.318456][T11191] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 141.385321][T11214] FAULT_INJECTION: forcing a failure. [ 141.385321][T11214] name failslab, interval 1, probability 0, space 0, times 0 [ 141.398014][T11214] CPU: 1 PID: 11214 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 141.406437][T11214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.416497][T11214] Call Trace: [ 141.419797][T11214] dump_stack+0x137/0x19d [ 141.424120][T11214] should_fail+0x23c/0x250 [ 141.428614][T11214] ? radix_tree_node_alloc+0x154/0x1f0 [ 141.434059][T11214] __should_failslab+0x81/0x90 [ 141.438866][T11214] should_failslab+0x5/0x20 [ 141.443388][T11214] kmem_cache_alloc+0x46/0x2e0 [ 141.448199][T11214] ? __list_del_entry_valid+0x54/0xc0 [ 141.453560][T11214] ? find_next_bit+0xc6/0xf0 [ 141.458155][T11214] radix_tree_node_alloc+0x154/0x1f0 [ 141.463450][T11214] idr_get_free+0x22a/0x5d0 [ 141.467984][T11214] idr_alloc_cyclic+0xe3/0x2d0 [ 141.472732][T11214] ? __radix_tree_preload+0x16f/0x190 [ 141.478100][T11214] __kernfs_new_node+0xb4/0x330 [ 141.482964][T11214] ? rb_insert_color+0x7e/0x310 [ 141.487816][T11214] ? kcsan_setup_watchpoint+0x26e/0x470 [ 141.493386][T11214] kernfs_create_dir_ns+0x5e/0x140 [ 141.498529][T11214] internal_create_group+0x138/0x850 [ 141.503832][T11214] ? check_preempt_wakeup+0x22f/0x360 [ 141.509279][T11214] sysfs_create_group+0x1b/0x20 [ 141.514115][T11214] loop_configure+0xa21/0xcb0 [ 141.518790][T11214] lo_ioctl+0x555/0x11f0 [ 141.523111][T11214] ? path_openat+0x19ab/0x20b0 [ 141.527879][T11214] ? putname+0xa5/0xc0 [ 141.531944][T11214] ? ___cache_free+0x3c/0x300 [ 141.536672][T11214] ? blkdev_common_ioctl+0x9c3/0x1040 [ 141.542039][T11214] ? selinux_file_ioctl+0x8e0/0x970 [ 141.547220][T11214] ? lo_release+0x120/0x120 [ 141.551705][T11214] blkdev_ioctl+0x1d0/0x3c0 [ 141.556347][T11214] block_ioctl+0x6d/0x80 [ 141.560620][T11214] ? blkdev_iopoll+0x70/0x70 [ 141.565241][T11214] __se_sys_ioctl+0xcb/0x140 [ 141.569820][T11214] __x64_sys_ioctl+0x3f/0x50 [ 141.574395][T11214] do_syscall_64+0x4a/0x90 [ 141.578843][T11214] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 141.585282][T11214] RIP: 0033:0x4663b7 [ 141.589162][T11214] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 141.608755][T11214] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 141.617179][T11214] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 141.625150][T11214] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 13:56:43 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x41000000}, 0x58) [ 141.633111][T11214] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 141.641090][T11214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 141.649142][T11214] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 141.662186][T11214] loop4: detected capacity change from 0 to 264192 [ 141.672146][T11214] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:56:43 executing program 2: set_mempolicy(0x2, &(0x7f0000000000)=0x2000000000000005, 0x2000000003fd) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x4000, &(0x7f0000000080)=0x3, 0x4) fcntl$lock(r0, 0x25, &(0x7f00000000c0)={0x2, 0x3, 0x3ff, 0x9, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) [ 141.688554][T11219] loop5: detected capacity change from 0 to 136 [ 141.705251][T11214] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:56:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 141.736828][T11214] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 141.755571][T11232] loop3: detected capacity change from 0 to 136 [ 141.765199][T11232] FAULT_INJECTION: forcing a failure. [ 141.765199][T11232] name failslab, interval 1, probability 0, space 0, times 0 [ 141.777836][T11232] CPU: 1 PID: 11232 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 141.786265][T11232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.796323][T11232] Call Trace: [ 141.799606][T11232] dump_stack+0x137/0x19d [ 141.803981][T11232] should_fail+0x23c/0x250 [ 141.808402][T11232] __should_failslab+0x81/0x90 [ 141.813171][T11232] ? __se_sys_mount+0x4e/0x2e0 [ 141.818047][T11232] should_failslab+0x5/0x20 [ 141.822557][T11232] __kmalloc_track_caller+0x64/0x350 [ 141.827881][T11232] ? strnlen_user+0x137/0x1c0 [ 141.832563][T11232] strndup_user+0x73/0x120 13:56:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003780)=[{{&(0x7f0000000200)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000280)=""/139, 0x8b}, {&(0x7f0000000340)=""/155, 0x9b}, {&(0x7f0000000500)=""/164, 0xa4}, {&(0x7f00000005c0)=""/148, 0x94}, {&(0x7f0000000680)=""/168, 0xa8}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000001740)=""/78, 0x4e}, {&(0x7f00000017c0)=""/192, 0xc0}], 0x9, &(0x7f0000001940)=""/119, 0x77}, 0x1}, {{&(0x7f00000019c0)=@sco={0x1f, @none}, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000001a40)=""/150, 0x96}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/219, 0xdb}, {&(0x7f0000002c00)=""/68, 0x44}, {&(0x7f0000002c80)=""/223, 0xdf}, {&(0x7f0000002d80)=""/32, 0x20}, {&(0x7f0000002dc0)=""/86, 0x56}, {&(0x7f0000002e40)=""/69, 0x45}], 0x8, &(0x7f0000002f40)=""/63, 0x3f}, 0x8d21}, {{&(0x7f0000002f80)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f0000003240)=[{&(0x7f0000003000)=""/179, 0xb3}, {&(0x7f00000030c0)=""/251, 0xfb}, {&(0x7f00000031c0)=""/95, 0x5f}], 0x3, &(0x7f0000003280)=""/195, 0xc3}, 0x100}, {{&(0x7f0000003380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000003640)=[{&(0x7f0000003400)=""/18, 0x12}, {&(0x7f0000003440)=""/246, 0xf6}, {&(0x7f0000003540)=""/185, 0xb9}, {&(0x7f0000003600)}], 0x4, &(0x7f0000003680)=""/197, 0xc5}, 0x1}], 0x4, 0x100, &(0x7f0000003880)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f00000038c0)="aef2576bb5fcbf048a7bc3ee674b597a", 0x10) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x18, &(0x7f0000000180)=0x2, 0x4) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r3, &(0x7f0000000040)="05c17351b0043ba81410b0e70b477e99aad4359d2fb0d683b7265893ddadf0613ba277839fb922ccae19b038f60914f3593448e4e2734f8bb9723a2c2359a955924bc8b8b3d5b0aeb995cdff41d4498dd774b8c74186b7c51a8548b53ce116802f884a1aab095d930419456aad9d12e7f80c6683f28173b8e76c987b74f454e37f93dbffb0db253be15c03e3843f1f9312b9a83036d095efbe004736964ac771ebea801a5b078a4891b76b336512b398cc9ae16556d09415c08b5ad6", 0xbc, 0x84, &(0x7f0000000140)={0x2, 0x4e21, @multicast1}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x5) socket$netlink(0x10, 0x3, 0x13) r4 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.self_freezing\x00', 0x0, 0x0) shutdown(r4, 0x0) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39) [ 141.836977][T11232] __se_sys_mount+0x4e/0x2e0 [ 141.841651][T11232] ? mntput+0x45/0x70 [ 141.845641][T11232] ? __fpregs_load_activate+0x103/0x1b0 [ 141.851262][T11232] __x64_sys_mount+0x63/0x70 [ 141.855877][T11232] do_syscall_64+0x4a/0x90 [ 141.860303][T11232] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 141.866198][T11232] RIP: 0033:0x467b1a [ 141.870093][T11232] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:56:43 executing program 4 (fault-call:1 fault-nth:20): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:43 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff}, 0x58) 13:56:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000080)={0x0, 0x0, 0x0, [0x1, 0x8, 0x1, 0xe3e7, 0x5b55dbd4], [0x8, 0x80000000, 0x0, 0x80, 0x2, 0xff, 0x9, 0x8, 0x4, 0x6, 0x0, 0x1ff, 0x100, 0x2, 0xffffffffffffffff, 0xfffffffffffeffff, 0xa, 0x7, 0x1f, 0x20, 0x10000, 0x100000000, 0x5, 0x9bb, 0x7, 0x7fff, 0xffffffff, 0x9, 0x7, 0x5, 0x80, 0x5, 0x100000001, 0x1, 0x41, 0x5, 0x0, 0x8, 0x2, 0x4, 0x7, 0x8000, 0x6, 0x0, 0x2, 0x8, 0x0, 0x8, 0xc2, 0x100000001, 0x8, 0x3f, 0x9, 0x100, 0x5, 0x401, 0x5, 0xf3b, 0x3, 0x7, 0x4, 0x5, 0x4, 0x9, 0x2, 0xfffffffffffffffd, 0x0, 0xe6, 0x6, 0x57f, 0x8, 0x3, 0x2960, 0x8, 0x8, 0x7, 0x7f, 0xfffffffffffffff9, 0x7, 0x2aca, 0x1, 0x5, 0x60000000000000, 0x3000000000000000, 0x1, 0x2, 0x2, 0x80000001, 0x1, 0xa8, 0xffffffffffffffff, 0x800, 0x1, 0x8, 0x8, 0x7ff, 0x7, 0x6, 0x3, 0x5, 0x0, 0x1, 0x1, 0x2, 0x10000, 0x1, 0xfffffffffffffffd, 0x5, 0x2, 0x6, 0x1f, 0x9, 0xff, 0x7b, 0xfffffffffffffff9, 0x0, 0x3, 0x8001, 0x4, 0xfff, 0x9]}) io_cancel(0x0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x5, 0x2, r0, &(0x7f00000004c0)="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", 0xfa, 0x1, 0x0, 0x1}, &(0x7f0000000600)) set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 141.889706][T11232] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 141.893607][T11257] loop5: detected capacity change from 0 to 136 [ 141.898122][T11232] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 141.898141][T11232] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 141.920277][T11232] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 141.928302][T11232] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 13:56:43 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) syz_open_dev$tty1(0xc, 0x4, 0x4) set_mempolicy(0x0, &(0x7f0000000080)=0x7f, 0x5) set_mempolicy(0x1, &(0x7f00000000c0)=0x2, 0x5) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:43 executing program 0: mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, &(0x7f0000000000)=0xb808, 0x8000, 0x1) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, r0) 13:56:43 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xff8f0000}, 0x58) [ 141.936370][T11232] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:43 executing program 3 (fault-call:3 fault-nth:41): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 142.073026][T11285] FAULT_INJECTION: forcing a failure. [ 142.073026][T11285] name failslab, interval 1, probability 0, space 0, times 0 [ 142.085747][T11285] CPU: 1 PID: 11285 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 142.094156][T11285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.104237][T11285] Call Trace: [ 142.107522][T11285] dump_stack+0x137/0x19d [ 142.111564][T11289] loop3: detected capacity change from 0 to 136 [ 142.111944][T11285] should_fail+0x23c/0x250 [ 142.122563][T11285] ? __kernfs_new_node+0x6a/0x330 [ 142.127642][T11285] __should_failslab+0x81/0x90 [ 142.129092][T11292] loop5: detected capacity change from 0 to 136 [ 142.132406][T11285] should_failslab+0x5/0x20 [ 142.140408][T11289] FAULT_INJECTION: forcing a failure. [ 142.140408][T11289] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 142.143262][T11285] kmem_cache_alloc+0x46/0x2e0 [ 142.143289][T11285] ? __cond_resched+0x11/0x40 [ 142.165702][T11285] __kernfs_new_node+0x6a/0x330 [ 142.170555][T11285] ? idr_alloc_cyclic+0x249/0x2d0 [ 142.175578][T11285] ? rb_insert_color+0x7e/0x310 [ 142.180421][T11285] kernfs_new_node+0x5b/0xd0 [ 142.185087][T11285] __kernfs_create_file+0x45/0x1a0 [ 142.190210][T11285] sysfs_add_file_mode_ns+0x1c1/0x250 [ 142.195619][T11285] internal_create_group+0x2e4/0x850 [ 142.200901][T11285] sysfs_create_group+0x1b/0x20 [ 142.205798][T11285] loop_configure+0xa21/0xcb0 [ 142.210481][T11285] lo_ioctl+0x555/0x11f0 [ 142.214733][T11285] ? path_openat+0x19ab/0x20b0 [ 142.219495][T11285] ? putname+0xa5/0xc0 [ 142.223560][T11285] ? ___cache_free+0x3c/0x300 [ 142.228231][T11285] ? blkdev_common_ioctl+0x9c3/0x1040 [ 142.233602][T11285] ? selinux_file_ioctl+0x8e0/0x970 [ 142.238796][T11285] ? lo_release+0x120/0x120 [ 142.243295][T11285] blkdev_ioctl+0x1d0/0x3c0 [ 142.247793][T11285] block_ioctl+0x6d/0x80 [ 142.252152][T11285] ? blkdev_iopoll+0x70/0x70 [ 142.256756][T11285] __se_sys_ioctl+0xcb/0x140 [ 142.261351][T11285] __x64_sys_ioctl+0x3f/0x50 [ 142.265975][T11285] do_syscall_64+0x4a/0x90 13:56:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:43 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfffffff5}, 0x58) 13:56:43 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000180)=""/255, &(0x7f0000000280)=0xff) set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) syz_open_dev$tty1(0xc, 0x4, 0x3) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b72d8d7e", @ANYRES16=0x0, @ANYBLOB="00082bbd7000ffdbdf2505000000080004001b900000080006000700000008000600000100003c000280060002004e22000008000400f9ffffff08000500ffff000006000e004e24000008000500ff070000080005000101000006000b0002000000"], 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0xc080) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000340)=""/193, &(0x7f0000000440)=0xc1) 13:56:43 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x96}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000003c0)='/dev/\"\x00\x00\x00\x00\x00\x00\x00\xe8\x00\xeb\xf5z\x98\x00\xc8\x8d\x93\a\x8a\x8bYd>\x7f\xbek\x7fN\x1e\xdf\xf89_\xad\x8fv\x80\xab!S\xe8\xe1\x05.!N<\x8e\xe2sN@J\xc0\xe7ZX\x8d\xddx\xc6\xb6P\x1d\xfd\x90\xd1l@.{\x1cB\xd5Feb\xd5\xb7V\x8dX\x10_p)\xba|7\xa4\xbb\xfb\xd62(\x92\\\xc3j\x870\xe5\x8c.\x955,`=\xdca\xda\x96)\xb8\x9f\x15\xb7\xfa\x0f\xfeA\x02Y%j\x04n\xe3\xa0\x03\xde\xd5\xfb\xb8\xdc\x18`\xd1S\x81\x88\xf9J~\x9d!\xbcw\xf6\xfb\xe3\xd1T\xd8\x9ft\x00\xd2\xaf\x00[\xbe\x89\n\x14\xa3\x83\x13i\xed\xe2\x92\xa8\x10\x80O\xaaw\xf7[\x7fY\xd4\xde\xd6\xea\x16#\xe4\x9e\x86j\x9c\xa3N\xde\xa3\x15DwY\x8e\xbf\x12\xdc\x19$5zf\x98V\x1aj\xd3\xc42\x06\xab\x98\xe3\x97FF\x1f\xce\xfe\xec\xb2-\xfe\xbd\xc6\xbb\xc6\x85\xd1\x84\x0eD\x7f\x12\xf7\x19\xd0N\xd1\xc4:\xb5\xae\x93\x8f\x8c\xe7H\x8d\xb2\x9c\xd1\x1f\xc6\xce\xb7\xb5(\x8dC$~\t0l\x91p\xba\xe8[\xb7U\a!\x11\x14M\x1f\xe0?X\v\x94\xd8\xfa\xcc\xfe\xe8\xbe\xe4\xc6\xc5(=\xafVD6BR\xfd\x97P\xd7nD\xcf\xba\xc4\x91t\x80\x83\x95\'\xd9\x01\x80\xcd\xb7w\xc1\x17m3\xa7\xeah\xd1\x91\xac\x0e\xfc\xd7{Sw\xac-\x81\xa5\x1e\\\x10\xe2\xde\xb9\xe9j9\xf9\xc6*-/\xa0\x8b\xb8T\x16\xccR\x96i\x05}=2.\xae\xb0\xec\xb3\xc2\xacu\x96/\xe8\xc8\x0eP#\x86\xf3nh\xe7\x9b\xeeI\x06\x9a\x81\xb0\xfam\xbd\xb0u', 0x0) ftruncate(r0, 0x1000000) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x2e, 0x14c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f00000000c0)=0x2, 0x4) sendfile(r1, r0, 0x0, 0xeefffdeb) recvmmsg(r1, &(0x7f0000000800)=[{{&(0x7f0000000100)=@nfc, 0x80, 0x0}}], 0x1, 0x40012001, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x9, 0xc0010, r0, 0xb3598000) [ 142.270387][T11285] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.276302][T11285] RIP: 0033:0x4663b7 [ 142.280261][T11285] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.299862][T11285] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 142.308284][T11285] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 142.316258][T11285] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 142.324220][T11285] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 142.332230][T11285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 142.340255][T11285] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 142.348224][T11289] CPU: 0 PID: 11289 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 142.356643][T11289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.366690][T11289] Call Trace: [ 142.369972][T11289] dump_stack+0x137/0x19d [ 142.371085][T11285] loop4: detected capacity change from 0 to 264192 [ 142.374310][T11289] should_fail+0x23c/0x250 [ 142.374333][T11289] should_fail_usercopy+0x16/0x20 [ 142.374351][T11289] _copy_from_user+0x1c/0xd0 [ 142.374372][T11289] strndup_user+0xb0/0x120 [ 142.374387][T11289] __se_sys_mount+0x4e/0x2e0 [ 142.374424][T11289] ? mntput+0x45/0x70 [ 142.407826][T11289] ? __fpregs_load_activate+0x103/0x1b0 [ 142.413410][T11289] __x64_sys_mount+0x63/0x70 [ 142.418037][T11289] do_syscall_64+0x4a/0x90 [ 142.422457][T11289] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.428361][T11289] RIP: 0033:0x467b1a [ 142.432257][T11289] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.451923][T11289] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 142.460345][T11289] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a 13:56:43 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1b1061f000}, 0x58) [ 142.468319][T11289] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 142.476285][T11289] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 142.484345][T11289] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 142.492311][T11289] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 142.507557][T11285] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 142.545836][T11285] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 142.577525][T11285] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:56:44 executing program 4 (fault-call:1 fault-nth:21): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:44 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {0x0, 0x1000000000000000}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0x0, [0x0, 0xa4, 0x3, 0xb7, 0xffffffffffffff80, 0x94], 0x6, &(0x7f0000000100)=[{}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) close(r0) 13:56:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:44 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x58) 13:56:44 executing program 3 (fault-call:3 fault-nth:42): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:44 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7f55fe7a4000}, 0x58) [ 142.729654][T11336] loop3: detected capacity change from 0 to 136 [ 142.750931][T11336] FAULT_INJECTION: forcing a failure. [ 142.750931][T11336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 142.755359][T11339] loop5: detected capacity change from 0 to 136 [ 142.764071][T11336] CPU: 0 PID: 11336 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 142.778723][T11336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.788777][T11336] Call Trace: [ 142.792063][T11336] dump_stack+0x137/0x19d [ 142.796400][T11336] should_fail+0x23c/0x250 [ 142.800834][T11336] should_fail_usercopy+0x16/0x20 [ 142.805866][T11336] _copy_from_user+0x1c/0xd0 [ 142.810464][T11336] strndup_user+0xb0/0x120 [ 142.814881][T11336] __se_sys_mount+0x4e/0x2e0 [ 142.819521][T11336] ? mntput+0x45/0x70 [ 142.823587][T11336] ? __fpregs_load_activate+0x103/0x1b0 [ 142.829144][T11336] __x64_sys_mount+0x63/0x70 [ 142.833742][T11336] do_syscall_64+0x4a/0x90 [ 142.838315][T11336] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.844259][T11336] RIP: 0033:0x467b1a [ 142.848157][T11336] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.867794][T11336] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:56:44 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2001000000000}, 0x58) 13:56:44 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000080)=0x800) set_mempolicy(0x1, &(0x7f0000000000)=0xfffffffffffffffe, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:44 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x58) [ 142.876235][T11336] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 142.884248][T11336] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 142.892223][T11336] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 142.900202][T11336] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 142.908205][T11336] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 142.928619][T11349] FAULT_INJECTION: forcing a failure. [ 142.928619][T11349] name failslab, interval 1, probability 0, space 0, times 0 [ 142.941363][T11349] CPU: 1 PID: 11349 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 142.949856][T11349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.959989][T11349] Call Trace: [ 142.963273][T11349] dump_stack+0x137/0x19d [ 142.967625][T11349] should_fail+0x23c/0x250 [ 142.972050][T11349] ? __kernfs_new_node+0x6a/0x330 [ 142.977125][T11349] __should_failslab+0x81/0x90 [ 142.981921][T11349] should_failslab+0x5/0x20 [ 142.986532][T11349] kmem_cache_alloc+0x46/0x2e0 [ 142.991333][T11349] __kernfs_new_node+0x6a/0x330 [ 142.996196][T11349] ? __cond_resched+0x11/0x40 [ 143.000929][T11349] ? mutex_lock+0x9/0x30 [ 143.005176][T11349] kernfs_new_node+0x5b/0xd0 [ 143.009848][T11349] __kernfs_create_file+0x45/0x1a0 [ 143.014987][T11349] sysfs_add_file_mode_ns+0x1c1/0x250 [ 143.020372][T11349] internal_create_group+0x2e4/0x850 [ 143.025666][T11349] sysfs_create_group+0x1b/0x20 [ 143.030530][T11349] loop_configure+0xa21/0xcb0 [ 143.035220][T11349] lo_ioctl+0x555/0x11f0 [ 143.039466][T11349] ? path_openat+0x19ab/0x20b0 [ 143.044233][T11349] ? putname+0xa5/0xc0 [ 143.048302][T11349] ? ___cache_free+0x3c/0x300 [ 143.052993][T11349] ? blkdev_common_ioctl+0x9c3/0x1040 [ 143.058376][T11349] ? selinux_file_ioctl+0x8e0/0x970 [ 143.063576][T11349] ? lo_release+0x120/0x120 [ 143.068215][T11349] blkdev_ioctl+0x1d0/0x3c0 [ 143.072809][T11349] block_ioctl+0x6d/0x80 [ 143.077137][T11349] ? blkdev_iopoll+0x70/0x70 [ 143.081731][T11349] __se_sys_ioctl+0xcb/0x140 [ 143.086381][T11349] __x64_sys_ioctl+0x3f/0x50 [ 143.090975][T11349] do_syscall_64+0x4a/0x90 [ 143.095396][T11349] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.101361][T11349] RIP: 0033:0x4663b7 [ 143.105256][T11349] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.124865][T11349] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 143.133286][T11349] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 143.141334][T11349] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 143.149306][T11349] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 143.157290][T11349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 143.165273][T11349] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 13:56:44 executing program 3 (fault-call:3 fault-nth:43): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 143.181427][T11349] loop4: detected capacity change from 0 to 264192 [ 143.202422][T11349] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:56:44 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0x58) 13:56:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 143.266905][T11349] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 143.287303][T11349] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 143.289283][T11369] loop3: detected capacity change from 0 to 136 [ 143.337442][T11369] FAULT_INJECTION: forcing a failure. [ 143.337442][T11369] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.350555][T11369] CPU: 1 PID: 11369 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 143.358976][T11369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.369066][T11369] Call Trace: [ 143.372354][T11369] dump_stack+0x137/0x19d [ 143.376694][T11369] should_fail+0x23c/0x250 [ 143.381139][T11369] should_fail_usercopy+0x16/0x20 13:56:44 executing program 4 (fault-call:1 fault-nth:22): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:44 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x1, &(0x7f0000000080)=0x1, 0x2) socket(0x4, 0x6, 0x10001) [ 143.386184][T11369] _copy_from_user+0x1c/0xd0 [ 143.390836][T11369] strndup_user+0xb0/0x120 [ 143.395250][T11369] __se_sys_mount+0x91/0x2e0 [ 143.399888][T11369] ? mntput+0x45/0x70 [ 143.403956][T11369] ? __fpregs_load_activate+0x103/0x1b0 [ 143.409651][T11369] __x64_sys_mount+0x63/0x70 [ 143.414285][T11369] do_syscall_64+0x4a/0x90 [ 143.418715][T11369] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.424624][T11369] RIP: 0033:0x467b1a [ 143.428520][T11369] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.448151][T11369] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 143.456834][T11369] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 143.464821][T11369] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 143.465084][T11379] loop5: detected capacity change from 0 to 136 [ 143.472794][T11369] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 13:56:44 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x30000000000000}, 0x58) 13:56:44 executing program 3 (fault-call:3 fault-nth:44): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 143.487014][T11369] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 143.494985][T11369] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:44 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x407afe557f0000}, 0x58) [ 143.594966][T11390] FAULT_INJECTION: forcing a failure. [ 143.594966][T11390] name failslab, interval 1, probability 0, space 0, times 0 [ 143.607630][T11390] CPU: 1 PID: 11390 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 143.616118][T11390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.626295][T11390] Call Trace: [ 143.629582][T11390] dump_stack+0x137/0x19d [ 143.633923][T11390] should_fail+0x23c/0x250 [ 143.638349][T11390] ? __kernfs_new_node+0x6a/0x330 [ 143.643381][T11390] __should_failslab+0x81/0x90 [ 143.648237][T11390] should_failslab+0x5/0x20 [ 143.652749][T11390] kmem_cache_alloc+0x46/0x2e0 [ 143.657591][T11390] __kernfs_new_node+0x6a/0x330 [ 143.662495][T11390] ? __cond_resched+0x11/0x40 [ 143.667269][T11390] ? mutex_lock+0x9/0x30 [ 143.671519][T11390] kernfs_new_node+0x5b/0xd0 [ 143.676127][T11390] __kernfs_create_file+0x45/0x1a0 [ 143.681287][T11390] sysfs_add_file_mode_ns+0x1c1/0x250 [ 143.686995][T11390] internal_create_group+0x2e4/0x850 [ 143.692296][T11390] sysfs_create_group+0x1b/0x20 [ 143.697222][T11390] loop_configure+0xa21/0xcb0 [ 143.701988][T11390] lo_ioctl+0x555/0x11f0 [ 143.706236][T11390] ? path_openat+0x19ab/0x20b0 [ 143.711010][T11390] ? putname+0xa5/0xc0 [ 143.715145][T11390] ? ___cache_free+0x3c/0x300 [ 143.719888][T11390] ? blkdev_common_ioctl+0x9c3/0x1040 [ 143.725274][T11390] ? selinux_file_ioctl+0x8e0/0x970 [ 143.730496][T11390] ? lo_release+0x120/0x120 [ 143.735004][T11390] blkdev_ioctl+0x1d0/0x3c0 [ 143.739511][T11390] block_ioctl+0x6d/0x80 [ 143.743762][T11390] ? blkdev_iopoll+0x70/0x70 [ 143.748368][T11390] __se_sys_ioctl+0xcb/0x140 [ 143.753051][T11390] __x64_sys_ioctl+0x3f/0x50 [ 143.757713][T11390] do_syscall_64+0x4a/0x90 [ 143.762148][T11390] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.768054][T11390] RIP: 0033:0x4663b7 [ 143.772077][T11390] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:56:45 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x80000001, 0x0, 0xfffffff8, 0x3, "850e32db99baeb0600"}) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000540)={0x1, 0x0, 0x1a, 0x9, 0xed, &(0x7f0000000140)}) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000080)) [ 143.792045][T11390] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 143.800470][T11390] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 143.808453][T11390] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 143.816432][T11390] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 143.824412][T11390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 143.832386][T11390] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 143.849009][T11390] loop4: detected capacity change from 0 to 264192 [ 143.863568][T11390] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 143.874692][T11402] loop5: detected capacity change from 0 to 136 [ 143.888998][T11400] loop3: detected capacity change from 0 to 136 [ 143.896472][T11390] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 143.898074][T11400] FAULT_INJECTION: forcing a failure. [ 143.898074][T11400] name failslab, interval 1, probability 0, space 0, times 0 [ 143.918264][T11400] CPU: 0 PID: 11400 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 143.926679][T11400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.936888][T11400] Call Trace: [ 143.940163][T11400] dump_stack+0x137/0x19d [ 143.944653][T11400] should_fail+0x23c/0x250 [ 143.949071][T11400] __should_failslab+0x81/0x90 [ 143.953841][T11400] ? __se_sys_mount+0xf2/0x2e0 [ 143.958669][T11400] should_failslab+0x5/0x20 [ 143.963236][T11400] kmem_cache_alloc_trace+0x49/0x310 [ 143.968542][T11400] ? _copy_from_user+0x94/0xd0 [ 143.973318][T11400] __se_sys_mount+0xf2/0x2e0 [ 143.977978][T11400] ? mntput+0x45/0x70 [ 143.982016][T11400] ? __fpregs_load_activate+0x103/0x1b0 [ 143.987685][T11400] __x64_sys_mount+0x63/0x70 [ 143.992314][T11400] do_syscall_64+0x4a/0x90 [ 143.993735][T11390] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 143.996762][T11400] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.996788][T11400] RIP: 0033:0x467b1a [ 143.996803][T11400] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.039271][T11400] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:56:45 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x504f0100000000}, 0x58) 13:56:45 executing program 2: r0 = semget(0x1, 0x3, 0x475) semop(r0, &(0x7f0000000080)=[{0x1, 0x8b8, 0x800}, {0x0, 0x7, 0x800}, {0x4, 0x3, 0x800}, {0x0, 0x4}], 0x4) set_mempolicy(0x1, &(0x7f00000000c0)=0x2000000000000009, 0x3) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x240201, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f00000000c0)) 13:56:45 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x10, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000580)=[{0xffffffffffffffff, 0x240}], 0x1, &(0x7f00000005c0), &(0x7f0000000600)={[0x23c7cb73]}, 0x8) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000380)='\xe7\x92\xf9\xb2\xec]2\xf6\x1c%\xd6,\x8a\xdc9\x00\x00\x00\x00\x00\x8e\x95\xe7\x898\x03j\x1a\xc6\v\x10V\x00\x00\rJ\xf3\xe9\xcdk\xa2\xf3\"\xa9\x81\x04\xd4\xd1\xf5u\xf7\x84\x02\x8f\xc6<\xa5\x10\x985\x82a\xf9/~\xd3\xeb\xc5', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000004c0)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r2) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_GETPARAMS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000640)={0x5c, r3, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4040810}, 0x40004) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 13:56:45 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x4000, &(0x7f00000000c0)=0x9, 0x6) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)) 13:56:45 executing program 4 (fault-call:1 fault-nth:23): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:45 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x60000000000000}, 0x58) 13:56:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:45 executing program 0: r0 = inotify_init() r1 = creat(&(0x7f0000000040)='./file0\x00', 0x31) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r3 = syz_open_pts(r2, 0x0) dup2(r3, r2) ioctl$PIO_FONTX(r3, 0x4b6c, &(0x7f00000000c0)={0x149, 0xe, &(0x7f0000000380)="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"}) ioctl$VT_DISALLOCATE(r1, 0x5608) inotify_add_watch(r0, &(0x7f00000008c0)='./file0\x00', 0x40) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x1000400) pwritev2(r1, &(0x7f0000000340)=[{&(0x7f0000000000)="ef", 0x1}], 0x1, 0x0, 0x0, 0x0) [ 144.047751][T11400] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 144.055734][T11400] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 144.063700][T11400] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 144.071703][T11400] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 144.079687][T11400] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:45 executing program 3 (fault-call:3 fault-nth:45): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 144.195148][T11446] loop5: detected capacity change from 0 to 136 [ 144.211001][T11456] FAULT_INJECTION: forcing a failure. [ 144.211001][T11456] name failslab, interval 1, probability 0, space 0, times 0 [ 144.212642][T11453] loop3: detected capacity change from 0 to 136 [ 144.223626][T11456] CPU: 1 PID: 11456 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 144.238263][T11456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.243701][T11453] FAULT_INJECTION: forcing a failure. [ 144.243701][T11453] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 144.248310][T11456] Call Trace: [ 144.248320][T11456] dump_stack+0x137/0x19d [ 144.268918][T11456] should_fail+0x23c/0x250 [ 144.273366][T11456] ? __kernfs_new_node+0x6a/0x330 [ 144.278384][T11456] __should_failslab+0x81/0x90 [ 144.283143][T11456] should_failslab+0x5/0x20 [ 144.287643][T11456] kmem_cache_alloc+0x46/0x2e0 [ 144.292402][T11456] __kernfs_new_node+0x6a/0x330 [ 144.297246][T11456] ? __cond_resched+0x11/0x40 [ 144.302011][T11456] ? mutex_lock+0x9/0x30 [ 144.306256][T11456] kernfs_new_node+0x5b/0xd0 [ 144.310846][T11456] __kernfs_create_file+0x45/0x1a0 [ 144.315953][T11456] sysfs_add_file_mode_ns+0x1c1/0x250 [ 144.321320][T11456] internal_create_group+0x2e4/0x850 [ 144.326671][T11456] sysfs_create_group+0x1b/0x20 [ 144.331518][T11456] loop_configure+0xa21/0xcb0 [ 144.336259][T11456] lo_ioctl+0x555/0x11f0 [ 144.340514][T11456] ? path_openat+0x19ab/0x20b0 [ 144.345294][T11456] ? putname+0xa5/0xc0 [ 144.349369][T11456] ? ___cache_free+0x3c/0x300 [ 144.354108][T11456] ? blkdev_common_ioctl+0x9c3/0x1040 [ 144.359473][T11456] ? selinux_file_ioctl+0x8e0/0x970 [ 144.364664][T11456] ? lo_release+0x120/0x120 [ 144.369332][T11456] blkdev_ioctl+0x1d0/0x3c0 [ 144.373832][T11456] block_ioctl+0x6d/0x80 [ 144.378069][T11456] ? blkdev_iopoll+0x70/0x70 [ 144.382652][T11456] __se_sys_ioctl+0xcb/0x140 [ 144.387240][T11456] __x64_sys_ioctl+0x3f/0x50 [ 144.391827][T11456] do_syscall_64+0x4a/0x90 [ 144.396237][T11456] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.402174][T11456] RIP: 0033:0x4663b7 [ 144.406074][T11456] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.425675][T11456] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 144.434113][T11456] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 144.442092][T11456] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 144.450055][T11456] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 144.458036][T11456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 144.466002][T11456] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 144.473973][T11453] CPU: 0 PID: 11453 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 144.482417][T11453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.492470][T11453] Call Trace: [ 144.495745][T11453] dump_stack+0x137/0x19d [ 144.500123][T11453] should_fail+0x23c/0x250 [ 144.504542][T11453] should_fail_usercopy+0x16/0x20 [ 144.509564][T11453] _copy_from_user+0x1c/0xd0 [ 144.514235][T11453] __se_sys_mount+0x115/0x2e0 [ 144.518948][T11453] ? mntput+0x45/0x70 [ 144.522938][T11453] ? __fpregs_load_activate+0x103/0x1b0 [ 144.528517][T11453] __x64_sys_mount+0x63/0x70 [ 144.533197][T11453] do_syscall_64+0x4a/0x90 [ 144.537620][T11453] ? irqentry_exit_to_user_mode+0x5/0x20 13:56:45 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x80, 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="200000000002000019000000900100000f000000000000000000000004000000000002000020050000000000d1f4655fd1f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='journal_path=.']) 13:56:45 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc0631d00000000}, 0x58) 13:56:45 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xff, 0x7f, 0x0, 0x8, 0x0, 0x4, 0x3401, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf09c, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x10000, 0x1ff, 0xa0e, 0x4, 0xffffffffd880c34e, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x8}, r0, 0x1, 0xffffffffffffffff, 0x1) syz_open_dev$sg(&(0x7f0000000280), 0x1, 0x80) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/59}) set_mempolicy(0x2, &(0x7f0000000240)=0x2, 0x0) 13:56:45 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf061101b000000}, 0x58) 13:56:45 executing program 0: unshare(0x50000) unshare(0xc050700) 13:56:45 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000080)={@local, 0x0}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r0, 0x1, 0x6, @remote}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) write(r1, &(0x7f0000000140)="1aa4543a6513876486baf4dbde0bf4d5005b773b56ad1ab5f9428f60625cfd668d52170e90a6517c27b692fb07e2e2297138913386d49ba6064b1b55f0d63fcd3b7b80ff84b6db3b2cb4cdcaf129e5883c73227a0c83944c1842e886ed0cb114e23623c2d4cbf3730598df1d3483ec406dd6f2c02b94a2e29349126eeb950860e86684ce0dbaa94200135b3afa06872dd2b7340ff4b8cc5bae1ddb5af1b9b750db464995092c775cb28c2986a0c803d0c70fa7902452ff8c1f3eb2a99f38954d9f5e4854a8c3cf54dce1fc79311c53f2ee02e784e3c9d918fd846b482f41ca6534698a153799b5e9649b84c1c5fcecfc7539d2b11d5f35d35b5b903f7a6a5e5cc9058b737d8f17671278e20afe5d0fe20b1f038c15c6c2c41dc4f16eae00884390ad9f8c2ddc84df0f32f69a89172a84d272be1801886f39f8216c3fe56b54bee62af485a1ab007a6b2d37967f0000b262080b27e66f4de083b587db1cfd888473b24aa71cfd88c4f7d59b2d16788386cf8d2c5938f26a41cd651dee17a87e2d10e6bfc6015d17ac3491afe11e652eeaba10f6e645a9b48e5c23c1c36f342f45503e89e5b40e6bbd023bbd495c662beda8e20e75fce2c82b50fbba707e2a509cd4b01321b8438814a88fbc15e25ae93d5382acab60c206877865e98ac8df8f0d383e414ef5ccc27991a8f4d83b05889ccf389d75336e93d0f6744d2a6530c469dbb61b68f8d58d6215961ce522a9904cadca38e71783e3db662239b62a7b1a73e4bf9cfc3b2bb79a57a38fcea8315d5e020702d8ec7ef27d90e7de800aa3ea0f01a56ae2c54f32cbdf238c6986c8523f79e66f3b299e3916614ceeb4da2c531b56b743703a6ed3d49a779165e710d389dfeaeda05536b381068736fd8a13df10d9e79bbc008a6e91f7606025d0fad2ef66a21a469b9c031ef74fe69fb75e326a663b107a9d20e4e04229edb3ed54bc6bb872b89569495b83ffebc2ab550d7b0d24cca4e340ef56cec43018eef36b6abe73c7703fb55b261b5ebbfda8aaebbbd2a3d850b9650a05079bd4a0e3914f0d62c56d4e3506c12770966c02e691f25663e219cea7a2abcb455d20faeef368018b79834640baf862ada0c740bc1db7f730aaf61ee1aae7d7c0bd639b6bd37e6e0876cb437fc51544b41ec2ecbe10729691c88c1d3a72a268561815a8a47df7a05f49d3568841fa228e266f6306d3e5251b44055aedca41064b8f4457ed11e90f5f3a5a435837fd32f0988be54065705464377f771b7dd916c3b3fd21bf15b597b28397ff9c456fc366b3649f469125b8b81a5b28bbf19b166f4b2fe665a0b71095727162f6e9eb006896c90509b076d92f1e021ad593f10d53599a19d824d8944b9b5125ddd5aa302433e11e309771987ba5328e719dcd075bad0d9c1c0dd9d575e299be96621a98612a5c980f17c1945da04e530244727f29ac53b55f4dbde0fe45f18eca896bd61c41189079184405d63c8ca4ff83430c0b3d5ddd221706f54bb356a17fa4b16f5025a6ee634b628ba747b71a394c888ed55c139b27c4980e65c9650250a805735ecb663f0ed441607c16643b4f5ecf5d3824435486b06431d2e67dec7271ad1d6d6dc9fa82682b5df31ed7577f84ee988a94285a8e71c2ce566c395763996f56a6aa927d2c6300c49857ee79c5ec773ba38a3fcd260ee365329f8a96515a2bb278bb3ae4c092f3d3674cb5e29d65bcbf9be0282eed1a8300b91a0ba36f0b467314da8f98a3eb03e96d32360d2667443c28849307ef2a6961ff1ec079290ea0ebffab93ad547a40433cb0f2145cb647fadb8a180f8664d42d4dd059e4bc4ca0f67e156eff0b6dc9ca05cbead4ceb9df399a4c590784e48303789dadcc5a5aaa5f6ac63b05870dd2d898230310078aa9b80b25c68a80b358c4501595ed21fb73f824415ffa2d1a1afcf17e970da5fb744bd17ec5543276d6cddaff5ca4f647c07dfe006400723ea794dcc9045e9759496edad00934cd00d734d3bf62571c94c9a3b74c80e76a00085397e38974c90601c66fbb5336fa23035f0e6cae77bbbf0f066112ee45a10b33ffa937fa776193607641bc1327f5aaa1520ec2900e199a98ad5827c668935d6fe737389126204921092611fb4fae5883b66d0532d352952aaaef8c23d99815e3227b5a467b6ac5240f362f91f94d0c8bd5b6ad13e9fd48b7af91a49022c0fc3d034b4feb2e77ae59f34f192e4623e401146556f1c7aa79ea036d7c6b8a9ff67dfea8ab2b1e692861060c7863571360e347bb32e2997222220ae368bdd5a24148b6659f699832937a9da578f7be47eafb1942e20c619611d1908ce90e3e6c777cac0967a45b283a54cbba5bdd87177833f347336b840348c9999381be6d80308c7e7b8ad99ba3a4229e00cae8a7ab030f6d1dfce5d91dcf7a6091d5fb610b3c847f7672a8fdd58b1d472ba56774f6053d06e526246ce80fb0cee40ab7959020079571e5190f9308322241808154da562bc5537190f4c0909fc8b4b98f27b2ae1d1c0d5b7ff7bfcad1cd352e5949e87c7a15c206f098d695779dcb7013518b41dff3216b8fb04eba075290bad37d3d44fdf61d57f35b3abe216ecddfb2d13227cd6f469c64172feeb6128801835ab408577c1c6824542d0a1360b1a026b7d253a41ff8ad463f50b91cfe95fb78433a766f9587bf8325e4d28af8b21377032c10b500e52cb7db1b764a6cdce6f09323ef7af449b733ffb6d399bf92f6616594e951cc164b43720ead01d4be5a0b3e20d8f5dc941178fa97179d47e05fc515c2c6ff00ecb40a8bd5911a4bde56292ed8e1095e7fd3179f4595081b488fa6d9b29d9a19cfea85bbc6317d8b9eed3f85956755da54d43d36a45cacea6fc267ec55e2a9c3a9dde559fbc2560f8308ef894bb60e2b89bbd23ab7ced033e02374fa551b7b234dbc7d512b370cb95adf9808fc2d94edb5b27aa94be767607a562267daac2c352fae7d14a45bc84880c82e602ab5dd3a747970b6ad5a99a59eabda1b70972bd3d663e48f19521a4a8f429974c45d285acd0c9744870869aea2261d3940787abbe572eefbd43ec5d912e0599be72d251b57d6f46255067ab7e848708f89a0ee229f75d59c2717d9a638f54d75c678310dfef9e5b69431b8e43d7c30ad80698e5b7cfdaaaa8e11b542c0d81e0cffbddf41e3f916a09ca721a634ed9595a5548d13c5242e3fd99961c3772517bd52e591e14d3a6e880390cb110c5d5bbfb621e6d1652e70e0dbc7fbacb4576a13f06450c6c08fb703297522e8e47f6afac5cf36849e31b9a7c6d416fbd848976a009221614a71296660db05f1c41274282903c306d3cfc20eb27e09a9e0fbabfdbd067280a6bfa33da443237d010ff0e10f47d2ea96f47030817e28ced4f8f5c397eaadedd9c7fbbb2591efe5bba29425b6a4504ac65dbde5ff8f5bf96876a45a7d3d6f9712d9cd29baf6ad93b9c4b28cc2b59d6cb7bbee23500b1902b96ca32598e11c0b8bc4c903a63a778a465ead1fc86a982aba4538366fb12f4de0b5bf6a24f0ff151b00238e7d180a675538db4a1db4bec56d9bd43216e713fe8c2580b8851f48d7caf823e5127359f3b9d98aaba7a3b1a72d91ad7d3504648a6b189c7c98abfe7ae2de2907f8780edb0c7a6c2cd9ef653c7bca1a8c9443c0013e0dad42dbcf2db657b5d1ff3dcff05e8b7e214a089aacf14ccf2def97de66a3df03970a8f7ede17da1005666b5e68786b48e801df67c91b5d8c199f00fb53a785f1993b981e735ba6692e27fe52b108f148f34ade130efbaa571926f2324a4ac453aa90534a9206fd400608cc67efd5508bdd7e06aa729e4690ed7284823f2d5be825dc419ff012e528729b7de9b0b7ad948713bcc4b5f36e7054e355c18407ccdfd3717df1c46537518abf3ed960d274fdeeffe39eabe48809fbf7cd43f21c48afd3c37842cf159b62fd2a38919ffc47fdb50a587442e84ca0954afcec1991e8074e5024d9b1b0a1124741aeede9a1069bc61de526077b788c88b818adbbcfb32b866ce9b9304936916ab733b6e9f5efd4a3529669e3f3da86f5aa999e926784a23c7330997cfa2bbb58307f63ef73013ac34d2c764f43464af1e12d660a1dd0d55bd866302e89aa148f421422e33726efeb5e0bcea3128d5f11f5fc154d8a5089b3f4dd0075586dd3bd7a01f7230f5c397bd494165165d6bf4fb887d610cfd1fb889b85792a195deace91b6a8ff413d4cca3524138a86065558f31aa5b785b0a3571ffe6ab28ebb692b797545a640a961058916ce3c8bc2f437894e99d2c84818586c3d5236bdbd5632b5ee7ad6ace1fb3b967816ae87d189854e3551935868ea224eeb757fcead16a33c85747660f0952716bbbc046bf6d948b7f3de3bc957c605ea0de43c227b9b1b06d1221511088f76a420a87e9ee50ac4819e47b5761b708c2972df41adebfd6b071ef2914c400f4ee417e241a98bd8388e35e4ed5a8b9db65bf92af132217052ea593c4117973c0235c8cb6da953c5a12485d5232245d432c72e3885fac75e5f4ec4ec74d90972d4bb8e89f1c2289ac25558689b0212f3430b52722e2b76dc26ba16ef4f7c18b9fc68024f9488a6768ace8c09508532d6886253986f30ef357d5645cbaea9cda4ee36330c665ce6d5901dabc08f6b9354f158d4a8d439ccc9fd04f13d6e225425975f16b0f07d4eabc8b7382da7329406d87d36682994af43250338e60941ecf0fddf12a069ed3e01faf9fd0a7b4340c307a40880213bbd8099879053b0b0c745c6e888b9c9c42c7693e849c43f5ec1dc52efe7f0bd1a01e335fd123d44fc74d07ae49db5c88e4e814868f438837a548e5f72bec892e2bcd21ae77c1f86f4f551ba9b8101a569bfaa286b97150cf5421ea8eceff915a33bbe7cd4db6fcb12f6e927c831112b5f81bd09f8ed5654f87c45e604550a831d7d80cb42b847db9d3cd5416f82a2b6747668bd5420210d1f527392629830d93e9d36b99ff06f4077741e359331f6aafc90002a796c9355ff338098cc36a965d42fa34f9215cfcfeba50f28856e250daaf91b8184db020d401ddcc01dd841c94d671c3c7e60386ee57e5e3cfd91c0ef2fe907373fa8f06bbae54310fb49c42f24576a7a703ea44a25a4454c1d72440be330f50ae820621cf8c820b1033bbe77871b5f2c81621f702059fc72ca0595788ea386316a4fa695ace7961f665a1c8376a4f2bdcddd6a9873107ba51b2fc23489bc058a0ec5b8e8ddbafb3bc880be232005dab1f98dac261484b8c3c9946e98fbaeff401a1c90e6e682821299a872bf175cedc527ea7fa39407cb2afde796b30ff5b50f0127a6a1673bf3303b9a73d4d8e4c95216906238a45c55a95b2e05d92d043e5a3e741491864ba6e563ccb6f1725aef4fee66e06d5f71073c2756286b8d6ef2f8a8fab1d1e2dee81a7bf89c5184861fd698742a7f25fa1a45c36c6cc970c4f2eac987b0bda1bb07c18f9500f1de65675e7c0a5799385fd3794408b02115fae8882630cd0fdd7a959d20c5477ed7ad2dfafb258f85701e607fc7b32b3bc532e31765af0a520527317aa8332e2a27d2c9896a5059e7819de4753107c30ac2779febbbd859add8361820ad9b50fef209558c1a617668b02280e4c4814a834f9798c2fabdcd0be7f0d7a7aab9528899dee3fd5357608d5ab7fd67b04e71000d99a556b95f6ef9f723673ee8c67a7970e2109c8b20ad9a97b8f58eb23c40dd93830d34ea2c9c587bc30441985544a915eb801335ae4027876f726f1674f715732f", 0x1000) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 144.543356][T11453] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.549260][T11453] RIP: 0033:0x467b1a [ 144.553144][T11453] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.572829][T11453] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 144.581287][T11453] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a 13:56:45 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) tkill(r1, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) r4 = socket(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) recvfrom$unix(r4, &(0x7f0000000040)=""/193, 0xc1, 0x10000, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) close(r0) [ 144.589256][T11453] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 144.597225][T11453] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 144.605193][T11453] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 144.613166][T11453] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 144.631511][T11456] loop4: detected capacity change from 0 to 264192 [ 144.645531][T11453] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 144.657376][T11456] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 144.679926][T11456] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:56:46 executing program 4 (fault-call:1 fault-nth:24): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:46 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x58) 13:56:46 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000040014000400ad000200000000000006040000000000000000", 0x39}], 0x1) 13:56:46 executing program 2: setitimer(0x1, &(0x7f0000000080)={{0x1c00000000}, {0x80}}, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='com.apple.system.Security\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x1, &(0x7f0000000000)=0x3, 0x3fd) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f00000000c0)={0x80, 0x1cf4, 0x0, 0x7ff, 0x0, "ed6d8450b9497a9df500b8b5eca31b0c45d3f2", 0x2}) 13:56:46 executing program 3 (fault-call:3 fault-nth:46): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6f15, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 144.690802][T11456] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:56:46 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000}, 0x58) [ 144.804001][T11497] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 144.814711][T11504] loop5: detected capacity change from 0 to 136 [ 144.821098][T11507] loop3: detected capacity change from 0 to 136 [ 144.837474][T11516] FAULT_INJECTION: forcing a failure. [ 144.837474][T11516] name failslab, interval 1, probability 0, space 0, times 0 [ 144.850184][T11516] CPU: 1 PID: 11516 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 144.858598][T11516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.868128][T11507] FAULT_INJECTION: forcing a failure. [ 144.868128][T11507] name failslab, interval 1, probability 0, space 0, times 0 [ 144.868647][T11516] Call Trace: [ 144.868657][T11516] dump_stack+0x137/0x19d [ 144.888862][T11516] should_fail+0x23c/0x250 [ 144.893309][T11516] ? __kernfs_new_node+0x6a/0x330 [ 144.898338][T11516] __should_failslab+0x81/0x90 [ 144.903271][T11516] should_failslab+0x5/0x20 [ 144.907841][T11516] kmem_cache_alloc+0x46/0x2e0 [ 144.912620][T11516] __kernfs_new_node+0x6a/0x330 [ 144.917472][T11516] ? __cond_resched+0x11/0x40 [ 144.922207][T11516] ? mutex_lock+0x9/0x30 [ 144.926455][T11516] kernfs_new_node+0x5b/0xd0 [ 144.931083][T11516] __kernfs_create_file+0x45/0x1a0 [ 144.936209][T11516] sysfs_add_file_mode_ns+0x1c1/0x250 [ 144.941578][T11516] internal_create_group+0x2e4/0x850 [ 144.946901][T11516] sysfs_create_group+0x1b/0x20 [ 144.951763][T11516] loop_configure+0xa21/0xcb0 [ 144.956472][T11516] lo_ioctl+0x555/0x11f0 [ 144.960776][T11516] ? path_openat+0x19ab/0x20b0 [ 144.965566][T11516] ? putname+0xa5/0xc0 [ 144.969649][T11516] ? ___cache_free+0x3c/0x300 [ 144.974321][T11516] ? blkdev_common_ioctl+0x9c3/0x1040 [ 144.979690][T11516] ? selinux_file_ioctl+0x8e0/0x970 [ 144.984882][T11516] ? lo_release+0x120/0x120 [ 144.989379][T11516] blkdev_ioctl+0x1d0/0x3c0 [ 144.993917][T11516] block_ioctl+0x6d/0x80 [ 144.998222][T11516] ? blkdev_iopoll+0x70/0x70 [ 145.002822][T11516] __se_sys_ioctl+0xcb/0x140 [ 145.007463][T11516] __x64_sys_ioctl+0x3f/0x50 [ 145.012048][T11516] do_syscall_64+0x4a/0x90 [ 145.016466][T11516] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.022431][T11516] RIP: 0033:0x4663b7 [ 145.026316][T11516] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.045988][T11516] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 145.054435][T11516] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 145.062423][T11516] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 145.070390][T11516] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 145.078353][T11516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 145.086358][T11516] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 145.094335][T11507] CPU: 0 PID: 11507 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 145.102762][T11507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.112929][T11507] Call Trace: [ 145.116203][T11507] dump_stack+0x137/0x19d [ 145.120563][T11507] should_fail+0x23c/0x250 [ 145.120630][T11516] loop4: detected capacity change from 0 to 264192 [ 145.124993][T11507] ? getname_flags+0x84/0x3d0 [ 145.125012][T11507] __should_failslab+0x81/0x90 [ 145.140978][T11507] should_failslab+0x5/0x20 [ 145.145492][T11507] kmem_cache_alloc+0x46/0x2e0 [ 145.150313][T11507] getname_flags+0x84/0x3d0 [ 145.154815][T11507] ? should_fail+0xd6/0x250 [ 145.159315][T11507] user_path_at_empty+0x28/0x50 [ 145.164158][T11507] __se_sys_mount+0x209/0x2e0 [ 145.168843][T11507] ? mntput+0x45/0x70 [ 145.172820][T11507] ? __fpregs_load_activate+0x103/0x1b0 [ 145.178397][T11507] __x64_sys_mount+0x63/0x70 [ 145.183085][T11507] do_syscall_64+0x4a/0x90 [ 145.187511][T11507] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.193402][T11507] RIP: 0033:0x467b1a 13:56:46 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x58) 13:56:46 executing program 2: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x800000, 0x8010, 0xffffffffffffffff, 0xb9a0c000) r0 = openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x2480, 0x80, 0xa}, 0x18) set_mempolicy(0x1, &(0x7f0000000000)=0x2000000007, 0x101) set_mempolicy(0x3, &(0x7f0000000140)=0x10000000000, 0x7f) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x3, 0x6, 0x40, 0x1, 0x0, 0xffffffff, 0x80a, 0x6a6529794200b01d, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x75262913, 0x4, @perf_bp={&(0x7f0000000100), 0x8}, 0x5bfdc7dbd9e33466, 0x7fff, 0x7, 0x9, 0x1f, 0x2, 0x9, 0x0, 0x40, 0x0, 0x52}, r0, 0x0, 0xffffffffffffffff, 0x0) pwritev2(r1, &(0x7f0000000380)=[{&(0x7f0000000200)="3a70952f703994bc26a670b0508c7e9b731879050adce0535c589673e1c1ae6b3fefdf56f468062cc4520f40b024ec9d03c8e9cfcce771100db70d970ca63c6c0fa8a4b6c4619f72e23dc6e7203e9778c56a75f83a7e", 0x56}, {&(0x7f0000000280)="dcd55ab9ad34573a27ffa26e3ac1525416716d0b22ef9c572568c5f2d8d520c8ae04fe47de89815a973c382a935ebd95564af27c061e04568870ba09bba62f885e78df9dc8e1b50b34ff2e712f41ff8bead1e323be533bca60631771d6ca37699dee659447bcea3ea00df893d0f43e0a87bfd9518fa170793ee22a2fe3f68acbe9fe006dc15d3ff26045fb6e324bd8482c26ad50651d3476d6af35b958e0276ad4ba738728d78313e7b52f49aff08318101974ceef75363fe65362a221df96792c953bfdc46423efd9c2f1b9624e0fd2a3041433a996a48a35c73851e8abb81e39a2d62247c1f4bc16708027467f3ad834b78af0d664cf0ef86d77a402", 0xfd}], 0x2, 0x3ff, 0x10000, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:46 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000040014000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 145.197302][T11507] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.216910][T11507] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 145.225321][T11507] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 145.233290][T11507] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 145.241285][T11507] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 13:56:46 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4100000000000000}, 0x58) [ 145.249323][T11507] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 145.257331][T11507] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 145.311843][T11516] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 145.346533][T11516] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:56:46 executing program 4 (fault-call:1 fault-nth:25): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:46 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000}, 0x58) 13:56:46 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x8000, &(0x7f0000000080)=0x41d, 0x8) 13:56:46 executing program 3 (fault-call:3 fault-nth:47): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 145.367516][T11516] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 145.406432][T11551] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 13:56:46 executing program 0: set_mempolicy(0x1, 0x0, 0x0) set_mempolicy(0x8000, &(0x7f0000000540)=0x7f, 0x81) set_mempolicy(0x3, &(0x7f0000000180)=0x1, 0x565) set_mempolicy(0x8000, &(0x7f00000000c0)=0x40, 0x9) set_mempolicy(0x4000, &(0x7f0000000140)=0xfffffffffffffc01, 0x1) set_mempolicy(0x3, &(0x7f0000000300)=0x5, 0x80000000000) set_mempolicy(0x8000, &(0x7f0000000380)=0x3, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) set_mempolicy(0x8000, &(0x7f0000000400)=0x6, 0x5) set_mempolicy(0x2, &(0x7f0000000340)=0x6, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f00000005c0)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012035601c37460bf8c43057bc2688e2b6f69e395b90a659874d185c19eca6fe70ebb14047cd0705b5f0433c923796345895bad7a1b6387c6c5554a9ee1d6b810231c0525b26e4338b063282ea5a33acdae5444c4e9de13ccecea6dba7059107ea37c71664848faa340ea6fbeccf860f02fcb8c0dabfccc3cc7b66f", 0xdf, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) set_mempolicy(0x4000, &(0x7f00000003c0)=0x4, 0x3f) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) set_mempolicy(0x0, &(0x7f0000000580)=0x213, 0xfffffffffffffffe) bind(0xffffffffffffffff, &(0x7f00000006c0)=@caif=@dbg={0x25, 0x4, 0x40}, 0x80) keyctl$search(0xa, r1, &(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={'syz', 0x3}, r0) 13:56:46 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xff8f000000000000}, 0x58) [ 145.424042][T11554] loop5: detected capacity change from 0 to 136 [ 145.495807][T11567] FAULT_INJECTION: forcing a failure. [ 145.495807][T11567] name failslab, interval 1, probability 0, space 0, times 0 [ 145.508460][T11567] CPU: 1 PID: 11567 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 145.516885][T11567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.527043][T11567] Call Trace: [ 145.530347][T11567] dump_stack+0x137/0x19d [ 145.534730][T11567] should_fail+0x23c/0x250 [ 145.539154][T11567] ? __kernfs_new_node+0x6a/0x330 [ 145.544189][T11567] __should_failslab+0x81/0x90 [ 145.549003][T11567] should_failslab+0x5/0x20 [ 145.553519][T11567] kmem_cache_alloc+0x46/0x2e0 [ 145.558293][T11567] __kernfs_new_node+0x6a/0x330 [ 145.563215][T11567] ? __cond_resched+0x11/0x40 [ 145.567937][T11567] ? mutex_lock+0x9/0x30 [ 145.572224][T11567] kernfs_new_node+0x5b/0xd0 [ 145.576860][T11567] __kernfs_create_file+0x45/0x1a0 [ 145.581984][T11567] sysfs_add_file_mode_ns+0x1c1/0x250 [ 145.587434][T11567] internal_create_group+0x2e4/0x850 [ 145.592723][T11567] sysfs_create_group+0x1b/0x20 [ 145.597590][T11567] loop_configure+0xa21/0xcb0 [ 145.602269][T11567] lo_ioctl+0x555/0x11f0 [ 145.606509][T11567] ? path_openat+0x19ab/0x20b0 [ 145.611277][T11567] ? putname+0xa5/0xc0 [ 145.615338][T11567] ? ___cache_free+0x3c/0x300 [ 145.620103][T11567] ? blkdev_common_ioctl+0x9c3/0x1040 [ 145.625478][T11567] ? selinux_file_ioctl+0x8e0/0x970 [ 145.630737][T11567] ? lo_release+0x120/0x120 [ 145.635245][T11567] blkdev_ioctl+0x1d0/0x3c0 [ 145.639754][T11567] block_ioctl+0x6d/0x80 13:56:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 145.644006][T11567] ? blkdev_iopoll+0x70/0x70 [ 145.648598][T11567] __se_sys_ioctl+0xcb/0x140 [ 145.653253][T11567] __x64_sys_ioctl+0x3f/0x50 [ 145.657850][T11567] do_syscall_64+0x4a/0x90 [ 145.662276][T11567] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.668206][T11567] RIP: 0033:0x4663b7 [ 145.672100][T11567] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.691759][T11567] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 145.700200][T11567] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 145.708170][T11567] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 145.716187][T11567] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 145.724170][T11567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 145.732187][T11567] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 145.740354][T11565] loop3: detected capacity change from 0 to 136 [ 145.753446][T11565] FAULT_INJECTION: forcing a failure. [ 145.753446][T11565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.766528][T11565] CPU: 1 PID: 11565 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 145.774945][T11565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.785018][T11565] Call Trace: [ 145.788317][T11565] dump_stack+0x137/0x19d [ 145.792671][T11565] should_fail+0x23c/0x250 [ 145.797088][T11565] should_fail_usercopy+0x16/0x20 [ 145.802113][T11565] strncpy_from_user+0x21/0x250 [ 145.806962][T11565] getname_flags+0xb8/0x3d0 [ 145.811486][T11565] ? should_fail+0xd6/0x250 [ 145.815993][T11565] user_path_at_empty+0x28/0x50 [ 145.820854][T11565] __se_sys_mount+0x209/0x2e0 [ 145.825562][T11565] ? mntput+0x45/0x70 [ 145.829546][T11565] ? __fpregs_load_activate+0x103/0x1b0 [ 145.835155][T11565] __x64_sys_mount+0x63/0x70 [ 145.839811][T11565] do_syscall_64+0x4a/0x90 [ 145.844232][T11565] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.850128][T11565] RIP: 0033:0x467b1a 13:56:47 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x200000d8) [ 145.854100][T11565] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.873758][T11565] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 145.882181][T11565] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 145.890152][T11565] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 13:56:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/146, 0x92}, {&(0x7f0000000280)=""/52, 0x34}, {&(0x7f00000002c0)=""/139, 0xffffff6e}], 0x3, 0xff, 0x200564) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="c434089ac15b9e88ab81ec4ecd9fa09f47f2fe24b2ce834f17c931965e1281203fcb0931cf29fb0412b69aa1c88376b20a45687f3e32cfeb8e5fb9dd5b278143f0c57c6c62e3325f6e5ca4ffee41ab453e61d8e747f84f11d79cbdecc8430f899c12fcaaf72f4fa934a626d2bce8fe0768a3c59e97480cd652d65d1e24226616374e", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="08000400", @ANYRES32=0xee01, @ANYBLOB='\b', @ANYRES32], 0x7c, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300110468fe0700000000000000ff3f020000003b0a00010000000019002b000a00030014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) [ 145.898125][T11565] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 145.906109][T11565] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 145.914082][T11565] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 145.942185][T11567] loop4: detected capacity change from 0 to 264192 13:56:47 executing program 3 (fault-call:3 fault-nth:48): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:47 executing program 1: sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYRESHEX=0x0], 0x30}, 0x1, 0x0, 0x0, 0x20000084}, 0x20000000) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) r0 = clone3(&(0x7f0000000080)={0x98164000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x1b) r1 = gettid() tkill(r1, 0x1000000000013) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000440)={0x88000, &(0x7f0000000100)=0xffffffffffffffff, &(0x7f0000000200)=0x0, &(0x7f0000000240), {0x9}, &(0x7f0000000280)=""/168, 0xa8, &(0x7f0000000340)=""/23, &(0x7f0000000400)=[r0, r0, 0x0, r1, r0, r0], 0x6, {r2}}, 0x58) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000600)=0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0xc) fcntl$getownex(r3, 0x10, &(0x7f00000006c0)={0x0, 0x0}) r8 = gettid() tkill(r8, 0x1000000000013) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r9, 0x0) preadv(r9, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x40000000, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540), {0xc}, &(0x7f0000000580)=""/17, 0x11, &(0x7f00000005c0)=""/60, &(0x7f0000000700)=[r4, r5, r6, r7, r1, r8, r0], 0x7, {r9}}, 0x58) [ 145.973184][T11567] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 146.008909][T11585] loop5: detected capacity change from 0 to 136 [ 146.009887][T11567] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 146.062734][T11597] loop3: detected capacity change from 0 to 136 [ 146.069165][T11567] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 146.087914][T11598] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 146.096041][T11598] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 146.099674][T11597] FAULT_INJECTION: forcing a failure. [ 146.099674][T11597] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 146.118365][T11597] CPU: 0 PID: 11597 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 146.126790][T11597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.136948][T11597] Call Trace: [ 146.140231][T11597] dump_stack+0x137/0x19d [ 146.144559][T11597] should_fail+0x23c/0x250 [ 146.149082][T11597] should_fail_usercopy+0x16/0x20 [ 146.154111][T11597] strncpy_from_user+0x21/0x250 [ 146.158957][T11597] getname_flags+0xb8/0x3d0 [ 146.163461][T11597] ? should_fail+0xd6/0x250 [ 146.167968][T11597] user_path_at_empty+0x28/0x50 [ 146.172817][T11597] __se_sys_mount+0x209/0x2e0 [ 146.177517][T11597] ? mntput+0x45/0x70 [ 146.181502][T11597] ? __fpregs_load_activate+0x103/0x1b0 [ 146.187135][T11597] __x64_sys_mount+0x63/0x70 [ 146.191753][T11597] do_syscall_64+0x4a/0x90 [ 146.196174][T11597] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 146.202124][T11597] RIP: 0033:0x467b1a 13:56:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl(r0, 0x8000, &(0x7f0000000040)="27927fb2486226aa57223c797a3a41dcd2ff68129155159a5dfe113bc6b4ec0aeeab997a336ca5c3d1eb38542b75d4e0e4bc96d9ec59") mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x100000003) 13:56:47 executing program 4 (fault-call:1 fault-nth:26): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xcf02, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 146.206011][T11597] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 146.225623][T11597] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 146.234043][T11597] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 146.242017][T11597] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 146.249989][T11597] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 13:56:47 executing program 3 (fault-call:3 fault-nth:49): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 146.257960][T11597] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 146.265932][T11597] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 146.285097][T11610] loop5: detected capacity change from 0 to 136 13:56:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd802, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 146.345445][T11619] FAULT_INJECTION: forcing a failure. [ 146.345445][T11619] name failslab, interval 1, probability 0, space 0, times 0 [ 146.358105][T11619] CPU: 1 PID: 11619 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 146.366529][T11619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.376672][T11619] Call Trace: [ 146.379947][T11619] dump_stack+0x137/0x19d [ 146.384293][T11619] should_fail+0x23c/0x250 [ 146.388805][T11619] ? __kernfs_new_node+0x6a/0x330 13:56:47 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r3, 0x2, 0x70bd29, 0x25dfdbfc, {{}, {}, {0x8, 0x2, 0x20}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4044001}, 0x4844) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r3, 0x20, 0x70bd28, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x6a6, @media='ib\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x8084}, 0x0) set_mempolicy(0x4000, &(0x7f00000000c0)=0x2000000000000005, 0x20002) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000080)=0x2, 0x4) inotify_init1(0x80800) [ 146.393843][T11619] __should_failslab+0x81/0x90 [ 146.398622][T11619] should_failslab+0x5/0x20 [ 146.403156][T11619] kmem_cache_alloc+0x46/0x2e0 [ 146.407972][T11619] __kernfs_new_node+0x6a/0x330 [ 146.412834][T11619] ? __cond_resched+0x11/0x40 [ 146.417541][T11619] ? mutex_lock+0x9/0x30 [ 146.421795][T11619] kernfs_new_node+0x5b/0xd0 [ 146.426440][T11619] __kernfs_create_file+0x45/0x1a0 [ 146.431560][T11619] sysfs_add_file_mode_ns+0x1c1/0x250 [ 146.436943][T11619] internal_create_group+0x2e4/0x850 [ 146.442395][T11619] sysfs_create_group+0x1b/0x20 [ 146.447264][T11619] loop_configure+0xa21/0xcb0 [ 146.451996][T11619] lo_ioctl+0x555/0x11f0 [ 146.456250][T11619] ? path_openat+0x19ab/0x20b0 [ 146.461020][T11619] ? putname+0xa5/0xc0 [ 146.465121][T11619] ? ___cache_free+0x3c/0x300 [ 146.469848][T11619] ? blkdev_common_ioctl+0x9c3/0x1040 [ 146.475532][T11619] ? selinux_file_ioctl+0x8e0/0x970 [ 146.480456][T11629] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 146.480768][T11619] ? lo_release+0x120/0x120 [ 146.488971][T11629] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 146.493387][T11619] blkdev_ioctl+0x1d0/0x3c0 [ 146.493412][T11619] block_ioctl+0x6d/0x80 [ 146.493462][T11619] ? blkdev_iopoll+0x70/0x70 [ 146.493480][T11619] __se_sys_ioctl+0xcb/0x140 [ 146.520510][T11619] __x64_sys_ioctl+0x3f/0x50 [ 146.525227][T11619] do_syscall_64+0x4a/0x90 [ 146.529718][T11619] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 146.535640][T11619] RIP: 0033:0x4663b7 [ 146.539532][T11619] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 146.559232][T11619] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 146.567656][T11619] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 146.575629][T11619] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 146.583620][T11619] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 146.591588][T11619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 146.599610][T11619] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 146.609420][T11631] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11631 comm=syz-executor.2 [ 146.624288][T11629] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 146.632522][T11629] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 146.643425][T11619] loop4: detected capacity change from 0 to 264192 [ 146.657062][T11619] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 146.666582][T11626] loop3: detected capacity change from 0 to 136 [ 146.670725][T11631] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11631 comm=syz-executor.2 [ 146.674000][T11626] FAULT_INJECTION: forcing a failure. [ 146.674000][T11626] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 146.698723][T11626] CPU: 0 PID: 11626 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 146.707147][T11626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.717231][T11626] Call Trace: [ 146.720518][T11626] dump_stack+0x137/0x19d [ 146.724910][T11626] should_fail+0x23c/0x250 [ 146.729324][T11626] should_fail_usercopy+0x16/0x20 [ 146.734416][T11626] strncpy_from_user+0x21/0x250 [ 146.739266][T11626] getname_flags+0xb8/0x3d0 [ 146.743765][T11626] ? should_fail+0xd6/0x250 [ 146.748283][T11626] user_path_at_empty+0x28/0x50 [ 146.749483][T11619] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 146.753145][T11626] __se_sys_mount+0x209/0x2e0 [ 146.766954][T11626] ? mntput+0x45/0x70 [ 146.770943][T11626] __x64_sys_mount+0x63/0x70 [ 146.775569][T11626] do_syscall_64+0x4a/0x90 [ 146.779991][T11626] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 146.785981][T11626] RIP: 0033:0x467b1a 13:56:48 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_io_uring_complete(0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80000) set_mempolicy(0x3, &(0x7f00000001c0)=0x53e6, 0x8) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f00000000c0)) r3 = openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x10b802, 0x20, 0x19}, 0x18) pread64(r3, &(0x7f0000000180)=""/41, 0x29, 0x1ff) 13:56:48 executing program 4 (fault-call:1 fault-nth:27): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 146.789872][T11626] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 146.791356][T11619] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 146.809481][T11626] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 146.809506][T11626] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 146.809520][T11626] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 13:56:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) fchown(0xffffffffffffffff, 0xee01, 0x0) stat(0x0, 0x0) r3 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) syz_mount_image$vfat(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="dd498b3692fdf76c1408c35116b04679bbe3c11d90000084773d42684302ac580d90a7afb47c9deb54c21a1f926d39b24fae4aabbeaa72f480f50182a2ee241a61a5897588d1ddc779e4ea00000000000080eb759ad2e4359ea804d801843a30cef48c1e5610bb59617200b00501bdcf54834944e9c7d2e13d00000000779309c8b6aed09b33beba8f1ecd0782876a13cfbd8d55049195239e87d44f3086dc159ad1f8b6457bdd44c24b5e9c8ff54dc0dae0812f980f7de7f20d5c2ccf0eef01c970"]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getdents(r5, 0x0, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, r4) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000040)=0x6) 13:56:48 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x8000, &(0x7f0000000080)=0x6, 0x1f) 13:56:48 executing program 3 (fault-call:3 fault-nth:50): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 146.809532][T11626] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 146.854841][T11626] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 146.862859][T11626] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 146.873871][T11641] loop5: detected capacity change from 0 to 136 [ 146.955412][T11652] loop4: detected capacity change from 0 to 264192 [ 146.965485][T11652] FAULT_INJECTION: forcing a failure. [ 146.965485][T11652] name failslab, interval 1, probability 0, space 0, times 0 [ 146.978202][T11652] CPU: 1 PID: 11652 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 146.986715][T11652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.996797][T11652] Call Trace: [ 147.000125][T11652] dump_stack+0x137/0x19d [ 147.004532][T11652] should_fail+0x23c/0x250 [ 147.008953][T11652] __should_failslab+0x81/0x90 [ 147.013772][T11652] ? kobject_uevent_env+0x1a7/0xc40 [ 147.019000][T11652] should_failslab+0x5/0x20 [ 147.023616][T11652] kmem_cache_alloc_trace+0x49/0x310 [ 147.028941][T11652] ? dev_uevent_filter+0x70/0x70 [ 147.033950][T11652] kobject_uevent_env+0x1a7/0xc40 [ 147.039121][T11652] kobject_uevent+0x18/0x20 [ 147.043655][T11652] loop_configure+0xb3c/0xcb0 [ 147.048324][T11652] lo_ioctl+0x555/0x11f0 [ 147.052900][T11652] ? path_openat+0x19ab/0x20b0 [ 147.057794][T11652] ? putname+0xa5/0xc0 [ 147.061854][T11652] ? ___cache_free+0x3c/0x300 [ 147.066557][T11652] ? blkdev_common_ioctl+0x9c3/0x1040 [ 147.072010][T11652] ? selinux_file_ioctl+0x8e0/0x970 [ 147.077187][T11652] ? lo_release+0x120/0x120 [ 147.081713][T11652] blkdev_ioctl+0x1d0/0x3c0 [ 147.086194][T11652] block_ioctl+0x6d/0x80 [ 147.090420][T11652] ? blkdev_iopoll+0x70/0x70 [ 147.095024][T11652] __se_sys_ioctl+0xcb/0x140 [ 147.099609][T11652] __x64_sys_ioctl+0x3f/0x50 [ 147.104191][T11652] do_syscall_64+0x4a/0x90 [ 147.108597][T11652] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 147.114542][T11652] RIP: 0033:0x4663b7 [ 147.118419][T11652] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 147.138038][T11652] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 147.146430][T11652] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 147.154408][T11652] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 147.162364][T11652] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 147.170485][T11652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 147.178440][T11652] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 147.207330][T11669] loop3: detected capacity change from 0 to 136 [ 147.208514][T11652] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 147.217711][T11669] FAULT_INJECTION: forcing a failure. [ 147.217711][T11669] name failslab, interval 1, probability 0, space 0, times 0 [ 147.224570][T11652] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 147.233883][T11669] CPU: 0 PID: 11669 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 147.244046][T11652] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 147.251470][T11669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.251525][T11669] Call Trace: [ 147.277801][T11669] dump_stack+0x137/0x19d [ 147.282151][T11669] should_fail+0x23c/0x250 [ 147.286567][T11669] __should_failslab+0x81/0x90 [ 147.291370][T11669] ? vfs_parse_fs_string+0x5e/0xc0 [ 147.296491][T11669] should_failslab+0x5/0x20 [ 147.301055][T11669] __kmalloc_track_caller+0x64/0x350 [ 147.306344][T11669] kmemdup_nul+0x27/0x70 [ 147.310630][T11669] vfs_parse_fs_string+0x5e/0xc0 [ 147.315574][T11669] path_mount+0xf99/0x1ce0 [ 147.319994][T11669] __se_sys_mount+0x23d/0x2e0 [ 147.324652][T11669] ? mntput+0x45/0x70 [ 147.328784][T11669] ? __fpregs_load_activate+0x103/0x1b0 [ 147.334343][T11669] __x64_sys_mount+0x63/0x70 [ 147.338946][T11669] do_syscall_64+0x4a/0x90 [ 147.343376][T11669] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 147.349253][T11669] RIP: 0033:0x467b1a [ 147.353232][T11669] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 147.372835][T11669] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 147.381262][T11669] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 147.389227][T11669] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 147.397181][T11669] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 147.405178][T11669] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 147.413178][T11669] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:50 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x100, 0x40000) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000080)) 13:56:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd902, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:50 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_io_uring_complete(0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80000) set_mempolicy(0x3, &(0x7f00000001c0)=0x53e6, 0x8) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f00000000c0)) r3 = openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x10b802, 0x20, 0x19}, 0x18) pread64(r3, &(0x7f0000000180)=""/41, 0x29, 0x1ff) 13:56:50 executing program 4 (fault-call:1 fault-nth:28): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:50 executing program 3 (fault-call:3 fault-nth:51): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0xfffffffc}, {{@in6=@mcast1}, 0x0, @in=@empty, 0x0, 0x0, 0x3}}, 0xe8) r1 = gettid() tkill(r1, 0x1000000000013) fcntl$lock(r0, 0x25, &(0x7f0000000100)={0x2, 0x0, 0x3, 0x9, r1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x80, 0x0) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@nfc_llcp={0x27, 0x1, 0x1, 0x2, 0xf1, 0xff, "e1b89949f9919cca9f091e0e4649262cf95a8e02bc66de9201ab7a0fbe20c07e33135e738accf2ff350dbf15997f568451575c6cc750324b3b2be515982e89", 0x13}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000140)={r6, 0x1, 0x6, @local}, 0x10) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000180)={r6, 0x1, 0x6, @link_local}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r3, 0x89f6, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'syztnl0\x00', r6, 0x2f, 0x9, 0x3f, 0x3, 0x6e, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x40, 0x7800, 0xfffffdbf, 0xfffffff7}}) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x21, &(0x7f0000000440)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@broadcast, 0x0, 0x2, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x2, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, 0xe8) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x21, &(0x7f0000000240)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in=@empty}, 0x0, @in=@empty}}, 0xe8) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:50 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_io_uring_complete(0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80000) set_mempolicy(0x3, &(0x7f00000001c0)=0x53e6, 0x8) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f00000000c0)) r3 = openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x10b802, 0x20, 0x19}, 0x18) pread64(r3, &(0x7f0000000180)=""/41, 0x29, 0x1ff) [ 149.089120][T11689] loop5: detected capacity change from 0 to 136 [ 149.099789][T11693] loop3: detected capacity change from 0 to 136 [ 149.110410][T11693] FAULT_INJECTION: forcing a failure. [ 149.110410][T11693] name failslab, interval 1, probability 0, space 0, times 0 [ 149.123108][T11693] CPU: 1 PID: 11693 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 149.123134][T11693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.123145][T11693] Call Trace: [ 149.123152][T11693] dump_stack+0x137/0x19d [ 149.123237][T11693] should_fail+0x23c/0x250 [ 149.123256][T11693] ? isofs_mount+0x40/0x40 [ 149.123289][T11693] ? getname_kernel+0x37/0x1d0 [ 149.123306][T11693] __should_failslab+0x81/0x90 [ 149.123403][T11693] should_failslab+0x5/0x20 [ 149.123427][T11693] kmem_cache_alloc+0x46/0x2e0 [ 149.123448][T11693] ? avc_has_perm_noaudit+0x19a/0x240 [ 149.123513][T11693] ? isofs_mount+0x40/0x40 [ 149.123536][T11693] getname_kernel+0x37/0x1d0 [ 149.123552][T11693] ? isofs_mount+0x40/0x40 [ 149.123572][T11693] kern_path+0x19/0x40 [ 149.123586][T11693] blkdev_get_by_path+0x54/0x1b0 [ 149.123608][T11693] mount_bdev+0x47/0x290 [ 149.123633][T11693] ? _isofs_bmap+0x30/0x30 [ 149.123655][T11693] isofs_mount+0x2d/0x40 [ 149.123677][T11693] legacy_get_tree+0x70/0xc0 [ 149.123700][T11693] vfs_get_tree+0x4a/0x1a0 [ 149.123719][T11693] path_mount+0x11d6/0x1ce0 [ 149.123812][T11693] __se_sys_mount+0x23d/0x2e0 [ 149.123835][T11693] ? mntput+0x45/0x70 [ 149.123874][T11693] ? __fpregs_load_activate+0x103/0x1b0 [ 149.123962][T11693] __x64_sys_mount+0x63/0x70 [ 149.123984][T11693] do_syscall_64+0x4a/0x90 [ 149.124084][T11693] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.124104][T11693] RIP: 0033:0x467b1a [ 149.124119][T11693] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:56:50 executing program 2: set_mempolicy(0x1, &(0x7f0000000080)=0x2000000000000005, 0x3fc) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) [ 149.124138][T11693] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 149.124159][T11693] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 149.124174][T11693] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 149.124216][T11693] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 149.124228][T11693] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 149.124241][T11693] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 149.138886][T11699] loop4: detected capacity change from 0 to 264192 [ 149.344625][T11699] FAULT_INJECTION: forcing a failure. [ 149.344625][T11699] name failslab, interval 1, probability 0, space 0, times 0 [ 149.357241][T11699] CPU: 0 PID: 11699 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 149.365651][T11699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.375685][T11699] Call Trace: [ 149.378960][T11699] dump_stack+0x137/0x19d [ 149.383273][T11699] should_fail+0x23c/0x250 [ 149.387668][T11699] __should_failslab+0x81/0x90 [ 149.392515][T11699] should_failslab+0x5/0x20 [ 149.397017][T11699] kmem_cache_alloc_node_trace+0x5b/0x2e0 [ 149.402736][T11699] ? __kmalloc_node_track_caller+0x30/0x40 [ 149.408528][T11699] __kmalloc_node_track_caller+0x30/0x40 [ 149.414161][T11699] ? alloc_uevent_skb+0x5b/0x120 [ 149.419115][T11699] __alloc_skb+0x187/0x420 [ 149.423514][T11699] alloc_uevent_skb+0x5b/0x120 [ 149.428263][T11699] kobject_uevent_env+0x863/0xc40 [ 149.433274][T11699] kobject_uevent+0x18/0x20 [ 149.437838][T11699] loop_configure+0xb3c/0xcb0 [ 149.442496][T11699] lo_ioctl+0x555/0x11f0 [ 149.446785][T11699] ? path_openat+0x19ab/0x20b0 [ 149.451533][T11699] ? putname+0xa5/0xc0 [ 149.455605][T11699] ? ___cache_free+0x3c/0x300 [ 149.460289][T11699] ? blkdev_common_ioctl+0x9c3/0x1040 [ 149.465652][T11699] ? selinux_file_ioctl+0x8e0/0x970 [ 149.470852][T11699] ? lo_release+0x120/0x120 [ 149.475370][T11699] blkdev_ioctl+0x1d0/0x3c0 [ 149.479932][T11699] block_ioctl+0x6d/0x80 [ 149.484171][T11699] ? blkdev_iopoll+0x70/0x70 [ 149.488742][T11699] __se_sys_ioctl+0xcb/0x140 [ 149.493313][T11699] __x64_sys_ioctl+0x3f/0x50 [ 149.497881][T11699] do_syscall_64+0x4a/0x90 [ 149.502289][T11699] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.508163][T11699] RIP: 0033:0x4663b7 [ 149.512034][T11699] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 149.531686][T11699] RSP: 002b:00007fba77623f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:56:50 executing program 3 (fault-call:3 fault-nth:52): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 149.540102][T11699] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 149.548067][T11699] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 149.556020][T11699] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 149.563987][T11699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 149.571938][T11699] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 13:56:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:50 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_io_uring_complete(0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80000) set_mempolicy(0x3, &(0x7f00000001c0)=0x53e6, 0x8) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f00000000c0)) r3 = openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x10b802, 0x20, 0x19}, 0x18) pread64(r3, &(0x7f0000000180)=""/41, 0x29, 0x1ff) 13:56:51 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r1 = syz_open_pts(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="66530700ae897094e71b0fa1f107000000364603812c66538d750f6ee1d001f43f0500bb9fb045f2d1c190926c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b311fef2c56000100000000", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1e) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) dup2(r1, r0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r4 = syz_open_pts(r3, 0x0) dup2(r4, r3) ioctl$KDDELIO(r0, 0x4b35, 0x1000) [ 149.603092][T11699] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 149.634120][T11699] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 149.660289][T11699] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 149.671329][T11721] loop3: detected capacity change from 0 to 136 [ 149.679945][T11723] loop5: detected capacity change from 0 to 136 [ 149.694496][T11721] FAULT_INJECTION: forcing a failure. [ 149.694496][T11721] name failslab, interval 1, probability 0, space 0, times 0 [ 149.707135][T11721] CPU: 1 PID: 11721 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 149.715651][T11721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.725698][T11721] Call Trace: [ 149.728974][T11721] dump_stack+0x137/0x19d [ 149.733388][T11721] should_fail+0x23c/0x250 [ 149.737913][T11721] __should_failslab+0x81/0x90 [ 149.742676][T11721] ? alloc_super+0x3a/0x520 [ 149.747205][T11721] should_failslab+0x5/0x20 [ 149.751706][T11721] kmem_cache_alloc_trace+0x49/0x310 [ 149.757081][T11721] ? __blkdev_get+0x8c/0x6c0 [ 149.761674][T11721] ? disk_block_events+0x94/0xd0 [ 149.766610][T11721] ? mount_bdev+0x290/0x290 [ 149.771108][T11721] alloc_super+0x3a/0x520 [ 149.775431][T11721] ? mount_bdev+0x290/0x290 [ 149.779936][T11721] sget+0x1a5/0x400 [ 149.783775][T11721] ? test_bdev_super+0x30/0x30 [ 149.788535][T11721] mount_bdev+0xd3/0x290 [ 149.792775][T11721] ? isofs_mount+0x40/0x40 [ 149.797202][T11721] ? _isofs_bmap+0x30/0x30 [ 149.801723][T11721] isofs_mount+0x2d/0x40 [ 149.806108][T11721] legacy_get_tree+0x70/0xc0 [ 149.810822][T11721] vfs_get_tree+0x4a/0x1a0 [ 149.815233][T11721] path_mount+0x11d6/0x1ce0 [ 149.819738][T11721] __se_sys_mount+0x23d/0x2e0 [ 149.824458][T11721] ? mntput+0x45/0x70 [ 149.828439][T11721] __x64_sys_mount+0x63/0x70 [ 149.833026][T11721] do_syscall_64+0x4a/0x90 [ 149.837450][T11721] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.843344][T11721] RIP: 0033:0x467b1a 13:56:51 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_io_uring_complete(0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80000) set_mempolicy(0x3, &(0x7f00000001c0)=0x53e6, 0x8) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f00000000c0)) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x10b802, 0x20, 0x19}, 0x18) [ 149.847229][T11721] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 149.866892][T11721] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 149.875304][T11721] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 149.883310][T11721] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 149.891337][T11721] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 149.899314][T11721] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 13:56:51 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:51 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_io_uring_complete(0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) pipe2(&(0x7f0000000080), 0x80000) set_mempolicy(0x3, &(0x7f00000001c0)=0x53e6, 0x8) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f00000000c0)) [ 149.907300][T11721] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:51 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_io_uring_complete(0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) pipe2(&(0x7f0000000080), 0x80000) set_mempolicy(0x3, &(0x7f00000001c0)=0x53e6, 0x8) 13:56:51 executing program 3 (fault-call:3 fault-nth:53): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 150.029563][T11758] loop4: detected capacity change from 0 to 264192 [ 150.039366][T11758] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 150.050019][T11761] loop3: detected capacity change from 0 to 136 [ 150.053063][T11758] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 150.058643][T11761] FAULT_INJECTION: forcing a failure. [ 150.058643][T11761] name failslab, interval 1, probability 0, space 0, times 0 [ 150.074794][T11758] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 150.078004][T11761] CPU: 1 PID: 11761 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 150.099389][T11761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.109610][T11761] Call Trace: [ 150.112882][T11761] dump_stack+0x137/0x19d [ 150.117282][T11761] should_fail+0x23c/0x250 [ 150.121730][T11761] __should_failslab+0x81/0x90 [ 150.126510][T11761] ? selinux_sb_alloc_security+0x2f/0xe0 [ 150.132220][T11761] should_failslab+0x5/0x20 [ 150.136728][T11761] kmem_cache_alloc_trace+0x49/0x310 [ 150.142017][T11761] selinux_sb_alloc_security+0x2f/0xe0 [ 150.147584][T11761] security_sb_alloc+0x3f/0x90 [ 150.152351][T11761] alloc_super+0x10b/0x520 [ 150.156792][T11761] ? mount_bdev+0x290/0x290 [ 150.161273][T11761] sget+0x1a5/0x400 [ 150.165056][T11761] ? test_bdev_super+0x30/0x30 [ 150.169927][T11761] mount_bdev+0xd3/0x290 [ 150.174149][T11761] ? isofs_mount+0x40/0x40 [ 150.178591][T11761] ? _isofs_bmap+0x30/0x30 [ 150.182999][T11761] isofs_mount+0x2d/0x40 [ 150.187220][T11761] legacy_get_tree+0x70/0xc0 [ 150.191871][T11761] vfs_get_tree+0x4a/0x1a0 [ 150.196266][T11761] path_mount+0x11d6/0x1ce0 [ 150.200768][T11761] __se_sys_mount+0x23d/0x2e0 [ 150.205460][T11761] ? mntput+0x45/0x70 [ 150.209436][T11761] ? __fpregs_load_activate+0x103/0x1b0 [ 150.214990][T11761] __x64_sys_mount+0x63/0x70 [ 150.219571][T11761] do_syscall_64+0x4a/0x90 [ 150.223968][T11761] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 150.229881][T11761] RIP: 0033:0x467b1a [ 150.233762][T11761] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 150.253362][T11761] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 150.261766][T11761] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 150.269742][T11761] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 150.277701][T11761] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 150.285649][T11761] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 150.293606][T11761] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:53 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x4000, &(0x7f0000000080)=0x2400000000000, 0x1f) clone3(&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) socket$inet_udp(0x2, 0x2, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x200, 0x3) 13:56:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeff, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:53 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_io_uring_complete(0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) pipe2(&(0x7f0000000080), 0x80000) 13:56:53 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:53 executing program 3 (fault-call:3 fault-nth:54): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:53 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_io_uring_complete(0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) [ 152.154701][T11779] loop5: detected capacity change from 0 to 136 [ 152.170838][T11786] loop4: detected capacity change from 0 to 32768 [ 152.177737][T11785] loop3: detected capacity change from 0 to 136 [ 152.204860][T11785] FAULT_INJECTION: forcing a failure. [ 152.204860][T11785] name failslab, interval 1, probability 0, space 0, times 0 [ 152.217516][T11785] CPU: 1 PID: 11785 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 152.225941][T11785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.236096][T11785] Call Trace: [ 152.239473][T11785] dump_stack+0x137/0x19d [ 152.243887][T11785] should_fail+0x23c/0x250 [ 152.248311][T11785] __should_failslab+0x81/0x90 [ 152.253091][T11785] ? prealloc_shrinker+0x5e/0x1b0 [ 152.258188][T11785] should_failslab+0x5/0x20 [ 152.262695][T11785] __kmalloc+0x66/0x350 [ 152.266993][T11785] prealloc_shrinker+0x5e/0x1b0 [ 152.271862][T11785] alloc_super+0x464/0x520 [ 152.276282][T11785] ? mount_bdev+0x290/0x290 [ 152.280819][T11785] sget+0x1a5/0x400 [ 152.284625][T11785] ? test_bdev_super+0x30/0x30 [ 152.289441][T11785] mount_bdev+0xd3/0x290 [ 152.293692][T11785] ? isofs_mount+0x40/0x40 [ 152.298169][T11785] ? _isofs_bmap+0x30/0x30 [ 152.302582][T11785] isofs_mount+0x2d/0x40 [ 152.306872][T11785] legacy_get_tree+0x70/0xc0 [ 152.311497][T11785] vfs_get_tree+0x4a/0x1a0 [ 152.315988][T11785] path_mount+0x11d6/0x1ce0 [ 152.320495][T11785] __se_sys_mount+0x23d/0x2e0 [ 152.325173][T11785] ? mntput+0x45/0x70 [ 152.329191][T11785] ? __fpregs_load_activate+0x103/0x1b0 [ 152.334901][T11785] __x64_sys_mount+0x63/0x70 [ 152.339492][T11785] do_syscall_64+0x4a/0x90 [ 152.343906][T11785] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.349821][T11785] RIP: 0033:0x467b1a [ 152.353722][T11785] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 152.373339][T11785] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 152.381851][T11785] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 152.389908][T11785] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 152.397878][T11785] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 152.405846][T11785] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 152.413887][T11785] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 152.428386][T11786] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 152.436847][T11786] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 152.446833][T11786] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:56:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:54 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x3}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) syz_io_uring_complete(0x0) 13:56:54 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:54 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x2, &(0x7f0000000080)=0x8, 0x8) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x8000, 0x9) socket$unix(0x1, 0x1, 0x0) set_mempolicy(0x1, &(0x7f0000000500)=0x3, 0x7fffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000100)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 13:56:54 executing program 3 (fault-call:3 fault-nth:55): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 152.733992][T11821] loop4: detected capacity change from 0 to 163840 [ 152.743661][T11824] loop3: detected capacity change from 0 to 136 [ 152.750603][T11821] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 152.761530][T11824] FAULT_INJECTION: forcing a failure. [ 152.761530][T11824] name failslab, interval 1, probability 0, space 0, times 0 [ 152.774162][T11824] CPU: 0 PID: 11824 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 152.782586][T11824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.792638][T11824] Call Trace: [ 152.795919][T11824] dump_stack+0x137/0x19d [ 152.800261][T11824] should_fail+0x23c/0x250 [ 152.804688][T11824] __should_failslab+0x81/0x90 [ 152.809461][T11824] ? __list_lru_init+0x70/0x520 [ 152.814313][T11824] should_failslab+0x5/0x20 [ 152.818819][T11824] __kmalloc+0x66/0x350 [ 152.822980][T11824] __list_lru_init+0x70/0x520 [ 152.827666][T11824] alloc_super+0x490/0x520 13:56:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:56:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 13:56:54 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x4000, &(0x7f00000000c0)=0x3, 0x3) [ 152.832081][T11824] ? mount_bdev+0x290/0x290 [ 152.836668][T11824] sget+0x1a5/0x400 [ 152.838129][T11825] loop5: detected capacity change from 0 to 136 [ 152.840472][T11824] ? test_bdev_super+0x30/0x30 [ 152.840497][T11824] mount_bdev+0xd3/0x290 [ 152.855729][T11824] ? isofs_mount+0x40/0x40 [ 152.860195][T11824] ? _isofs_bmap+0x30/0x30 [ 152.864622][T11824] isofs_mount+0x2d/0x40 [ 152.868872][T11824] legacy_get_tree+0x70/0xc0 [ 152.873471][T11824] vfs_get_tree+0x4a/0x1a0 [ 152.877886][T11824] path_mount+0x11d6/0x1ce0 13:56:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 152.882390][T11824] __se_sys_mount+0x23d/0x2e0 [ 152.882416][T11824] ? mntput+0x45/0x70 [ 152.882435][T11824] ? __fpregs_load_activate+0x103/0x1b0 [ 152.896620][T11824] __x64_sys_mount+0x63/0x70 [ 152.901281][T11824] do_syscall_64+0x4a/0x90 [ 152.905745][T11824] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.911712][T11824] RIP: 0033:0x467b1a 13:56:54 executing program 2: set_mempolicy(0x0, &(0x7f0000000000)=0x2000000000000005, 0x9) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 152.915614][T11824] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 152.935247][T11824] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 152.943756][T11824] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 152.951845][T11824] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 152.951859][T11821] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 152.959812][T11824] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 152.959829][T11824] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 13:56:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x8001, &(0x7f0000000200)=0x8, 0x80) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 152.977307][T11821] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 152.984861][T11824] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffe, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:54 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="84706f6c3d6c6f563a793937303034050000007f72"]) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="a117", 0x2, 0xffffffffffffffff) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000200)={0x4, 0x400, 0x101, 0x72, 0x1a, "a2445645bf8d4224e096bd63ebf5a56eeffdf4"}) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r2) 13:56:54 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000002, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:56:54 executing program 3 (fault-call:3 fault-nth:56): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:54 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x4) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000080)=0xcb, 0x2c40f1e2) set_mempolicy(0x4000, &(0x7f00000000c0)=0x1, 0x401) set_mempolicy(0x1, &(0x7f0000000100)=0xe938, 0x9) 13:56:54 executing program 2: iopl(0x3f) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x3, 0x1, 0x101, 0x0, 0x0, {0x5}, [@CTA_MARK_MASK={0x8}]}, 0x1c}}, 0x0) set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x4001, 0x0) [ 153.117767][T11871] tmpfs: Unknown parameter '„pol' 13:56:54 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 153.143692][T11877] loop4: detected capacity change from 0 to 264192 [ 153.152476][T11878] loop5: detected capacity change from 0 to 136 [ 153.165096][T11881] loop3: detected capacity change from 0 to 136 [ 153.177510][T11889] tmpfs: Unknown parameter '„pol' [ 153.182916][T11877] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 153.194418][T11881] FAULT_INJECTION: forcing a failure. [ 153.194418][T11881] name failslab, interval 1, probability 0, space 0, times 0 [ 153.207060][T11881] CPU: 0 PID: 11881 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 153.215484][T11881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.220641][T11877] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 153.225539][T11881] Call Trace: [ 153.225549][T11881] dump_stack+0x137/0x19d [ 153.237854][T11877] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 153.237938][T11881] should_fail+0x23c/0x250 [ 153.259644][T11881] __should_failslab+0x81/0x90 [ 153.264413][T11881] should_failslab+0x5/0x20 [ 153.268927][T11881] kmem_cache_alloc_node_trace+0x5b/0x2e0 [ 153.274733][T11881] ? __radix_tree_replace+0x187/0x1a0 [ 153.280185][T11881] ? __kmalloc_node+0x30/0x40 [ 153.284893][T11881] __kmalloc_node+0x30/0x40 [ 153.289436][T11881] kvmalloc_node+0x81/0xf0 13:56:54 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000003, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:54 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:56:54 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)=0x9) [ 153.293881][T11881] __list_lru_init+0x1dd/0x520 [ 153.298648][T11881] alloc_super+0x490/0x520 [ 153.303154][T11881] ? mount_bdev+0x290/0x290 [ 153.307736][T11881] sget+0x1a5/0x400 [ 153.311612][T11881] ? test_bdev_super+0x30/0x30 [ 153.316425][T11881] mount_bdev+0xd3/0x290 [ 153.320747][T11881] ? isofs_mount+0x40/0x40 [ 153.325268][T11881] ? _isofs_bmap+0x30/0x30 [ 153.329683][T11881] isofs_mount+0x2d/0x40 [ 153.333974][T11881] legacy_get_tree+0x70/0xc0 [ 153.338622][T11881] vfs_get_tree+0x4a/0x1a0 [ 153.343039][T11881] path_mount+0x11d6/0x1ce0 [ 153.347596][T11881] __se_sys_mount+0x23d/0x2e0 [ 153.352277][T11881] ? mntput+0x45/0x70 [ 153.356293][T11881] ? __fpregs_load_activate+0x103/0x1b0 [ 153.361888][T11881] __x64_sys_mount+0x63/0x70 [ 153.366545][T11881] do_syscall_64+0x4a/0x90 [ 153.371059][T11881] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 153.376992][T11881] RIP: 0033:0x467b1a 13:56:54 executing program 3 (fault-call:3 fault-nth:57): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 153.380928][T11881] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 153.400617][T11881] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 153.409051][T11881] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 153.417030][T11881] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 153.425003][T11881] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 153.432980][T11881] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 13:56:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:54 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x800, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000180)={0xd, 0x7, 0x1}, 0xd) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0xb) set_mempolicy(0x4000, &(0x7f0000000040)=0x20, 0x1) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket(0x34, 0x800, 0x7) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x147800, 0x0) [ 153.440994][T11881] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:54 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 153.548580][T11924] loop4: detected capacity change from 0 to 264192 [ 153.551822][T11923] loop3: detected capacity change from 0 to 136 [ 153.576535][T11924] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 153.579464][T11923] FAULT_INJECTION: forcing a failure. [ 153.579464][T11923] name failslab, interval 1, probability 0, space 0, times 0 13:56:54 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x6, 0x4, 0x1, 0x2}, {0x401, 0x7, 0x1, 0x80000001}]}) set_mempolicy(0x4000, &(0x7f0000000140), 0x5) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) set_mempolicy(0x3, &(0x7f0000000180)=0x6, 0x1) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/61}) 13:56:54 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 153.585685][T11930] loop5: detected capacity change from 0 to 256 [ 153.596762][T11923] CPU: 0 PID: 11923 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 153.611369][T11923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.611380][T11923] Call Trace: [ 153.611388][T11923] dump_stack+0x137/0x19d [ 153.629026][T11923] should_fail+0x23c/0x250 [ 153.633449][T11923] __should_failslab+0x81/0x90 [ 153.638217][T11923] ? __list_lru_init+0x70/0x520 [ 153.643118][T11923] should_failslab+0x5/0x20 13:56:55 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x0, &(0x7f0000000080)=0x8001, 0x7) [ 153.647627][T11923] __kmalloc+0x66/0x350 [ 153.651790][T11923] __list_lru_init+0x70/0x520 [ 153.656571][T11923] alloc_super+0x4bf/0x520 [ 153.660989][T11923] ? mount_bdev+0x290/0x290 [ 153.665497][T11923] sget+0x1a5/0x400 [ 153.666197][T11924] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 153.669305][T11923] ? test_bdev_super+0x30/0x30 [ 153.669328][T11923] mount_bdev+0xd3/0x290 [ 153.687399][T11923] ? isofs_mount+0x40/0x40 [ 153.689315][T11924] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 153.691902][T11923] ? _isofs_bmap+0x30/0x30 [ 153.709323][T11923] isofs_mount+0x2d/0x40 [ 153.713659][T11923] legacy_get_tree+0x70/0xc0 [ 153.718306][T11923] vfs_get_tree+0x4a/0x1a0 [ 153.722801][T11923] path_mount+0x11d6/0x1ce0 [ 153.727292][T11923] __se_sys_mount+0x23d/0x2e0 [ 153.731973][T11923] ? mntput+0x45/0x70 [ 153.736004][T11923] ? __fpregs_load_activate+0x103/0x1b0 [ 153.741533][T11923] __x64_sys_mount+0x63/0x70 [ 153.746106][T11923] do_syscall_64+0x4a/0x90 [ 153.750506][T11923] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 153.756379][T11923] RIP: 0033:0x467b1a [ 153.760355][T11923] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 153.780001][T11923] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 153.788534][T11923] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a 13:56:55 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0xa8080, 0x0) clone3(&(0x7f0000000100)={0x12e045000, 0x0, 0x0, 0x0, {0x38}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 13:56:55 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:55 executing program 3 (fault-call:3 fault-nth:58): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 153.796524][T11923] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 153.804578][T11923] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 153.812622][T11923] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 153.820575][T11923] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:55 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:56:55 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) set_mempolicy(0x3, &(0x7f0000000080)=0x7f, 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:55 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 153.964687][T11967] loop4: detected capacity change from 0 to 264192 [ 153.971335][T11965] loop3: detected capacity change from 0 to 136 [ 153.979823][T11968] loop5: detected capacity change from 0 to 1024 [ 154.001986][T11965] FAULT_INJECTION: forcing a failure. [ 154.001986][T11965] name failslab, interval 1, probability 0, space 0, times 0 [ 154.014727][T11965] CPU: 0 PID: 11965 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 154.023163][T11965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.033229][T11965] Call Trace: [ 154.033239][T11965] dump_stack+0x137/0x19d [ 154.040846][T11965] should_fail+0x23c/0x250 [ 154.045247][T11965] __should_failslab+0x81/0x90 [ 154.050023][T11965] should_failslab+0x5/0x20 [ 154.054536][T11965] kmem_cache_alloc_node_trace+0x5b/0x2e0 [ 154.060290][T11965] ? __kmalloc_node+0x30/0x40 13:56:55 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 13:56:55 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x6) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13:56:55 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x4000, &(0x7f0000000040)=0x6, 0x7fff) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 154.064976][T11965] __kmalloc_node+0x30/0x40 [ 154.066156][T11967] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 154.069483][T11965] kvmalloc_node+0x81/0xf0 [ 154.081368][T11965] __list_lru_init+0x1dd/0x520 [ 154.086143][T11965] alloc_super+0x4bf/0x520 [ 154.090557][T11965] ? mount_bdev+0x290/0x290 [ 154.095060][T11965] sget+0x1a5/0x400 [ 154.098878][T11965] ? test_bdev_super+0x30/0x30 [ 154.103640][T11965] mount_bdev+0xd3/0x290 [ 154.107887][T11965] ? isofs_mount+0x40/0x40 13:56:55 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 154.112375][T11965] ? _isofs_bmap+0x30/0x30 [ 154.116945][T11965] isofs_mount+0x2d/0x40 [ 154.121188][T11965] legacy_get_tree+0x70/0xc0 [ 154.125782][T11965] vfs_get_tree+0x4a/0x1a0 [ 154.126355][T11967] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 154.130244][T11965] path_mount+0x11d6/0x1ce0 [ 154.130271][T11965] __se_sys_mount+0x23d/0x2e0 [ 154.139971][T11967] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 154.143848][T11965] ? mntput+0x45/0x70 [ 154.143872][T11965] ? __fpregs_load_activate+0x103/0x1b0 [ 154.171131][T11965] __x64_sys_mount+0x63/0x70 [ 154.175711][T11965] do_syscall_64+0x4a/0x90 [ 154.180113][T11965] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 154.185993][T11965] RIP: 0033:0x467b1a [ 154.189881][T11965] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 154.209530][T11965] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 154.218113][T11965] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 154.226128][T11965] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 154.234950][T11965] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 154.242936][T11965] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 154.250893][T11965] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80040, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:55 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000005, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:55 executing program 3 (fault-call:3 fault-nth:59): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:55 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 13:56:55 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="44000000080601010000000000000000000000000900020073797a30000000000900020073797a30000000000900028703000000000000000900020073797a3000000000"], 0x44}, 0x1, 0x0, 0x0, 0x20008856}, 0x8000) r2 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67, 0x0, 0xffffffffffffffff}, {}, {0x0, 0x0, 0x1}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSERGETLSR(r4, 0x5459, &(0x7f0000000140)) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) sendfile(r3, r5, &(0x7f0000000080)=0x4, 0x4) [ 154.412554][T12002] loop5: detected capacity change from 0 to 1024 [ 154.427325][T12003] loop3: detected capacity change from 0 to 136 [ 154.439139][T12003] FAULT_INJECTION: forcing a failure. [ 154.439139][T12003] name failslab, interval 1, probability 0, space 0, times 0 [ 154.451767][T12003] CPU: 0 PID: 12003 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 154.456613][T12015] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 154.460271][T12003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.460286][T12003] Call Trace: [ 154.460293][T12003] dump_stack+0x137/0x19d [ 154.468437][T12015] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 154.470578][T12010] loop4: detected capacity change from 0 to 264192 [ 154.478607][T12003] should_fail+0x23c/0x250 [ 154.478632][T12003] __should_failslab+0x81/0x90 [ 154.478654][T12003] ? isofs_fill_super+0x59/0x1940 [ 154.516076][T12003] should_failslab+0x5/0x20 [ 154.520672][T12003] kmem_cache_alloc_trace+0x49/0x310 [ 154.526018][T12003] ? format_decode+0x60b/0x8a0 [ 154.530832][T12003] isofs_fill_super+0x59/0x1940 [ 154.535746][T12003] ? vsnprintf+0xe8f/0xed0 [ 154.540159][T12003] ? snprintf+0x6f/0x90 [ 154.544310][T12003] ? register_shrinker_prepared+0xdf/0xf0 [ 154.550209][T12003] ? set_blocksize+0x197/0x2a0 [ 154.555050][T12003] mount_bdev+0x1e8/0x290 [ 154.559418][T12003] ? isofs_mount+0x40/0x40 [ 154.563857][T12003] ? _isofs_bmap+0x30/0x30 [ 154.568327][T12003] isofs_mount+0x2d/0x40 [ 154.572588][T12003] legacy_get_tree+0x70/0xc0 [ 154.577177][T12003] vfs_get_tree+0x4a/0x1a0 [ 154.581603][T12003] path_mount+0x11d6/0x1ce0 [ 154.586170][T12003] __se_sys_mount+0x23d/0x2e0 [ 154.590873][T12003] ? mntput+0x45/0x70 [ 154.594856][T12003] ? __fpregs_load_activate+0x103/0x1b0 [ 154.600400][T12003] __x64_sys_mount+0x63/0x70 [ 154.605024][T12003] do_syscall_64+0x4a/0x90 13:56:56 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) [ 154.609436][T12003] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 154.615329][T12003] RIP: 0033:0x467b1a [ 154.619272][T12003] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 154.638875][T12003] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 154.647304][T12003] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 154.655267][T12003] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 154.663287][T12003] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 154.671259][T12003] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 154.679224][T12003] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 154.697005][T12010] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:56:56 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae1e5000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:56 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 13:56:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 154.703682][T12022] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1544 sclass=netlink_route_socket pid=12022 comm=syz-executor.2 [ 154.705145][T12010] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:56:56 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000006, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:56 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) r0 = clone3(&(0x7f0000000100)={0x1ae025000, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x58) clone3(&(0x7f00000002c0)={0x80000, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2c}, &(0x7f0000000180)=""/109, 0x6d, &(0x7f0000000200)=""/119, &(0x7f0000000280)=[r0], 0x1}, 0x58) 13:56:56 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000002, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 154.763112][T12010] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 154.780251][T12022] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1544 sclass=netlink_route_socket pid=12022 comm=syz-executor.2 13:56:56 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fffffff, 0x26a000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)=0x0) syz_open_procfs(r1, &(0x7f0000000180)='attr/prev\x00') r2 = open(&(0x7f0000000100)='./file0\x00', 0x28100, 0x0) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) 13:56:56 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) ioctl$TCSBRKP(r0, 0x5425, 0xe744) memfd_create(&(0x7f0000000000)='/dev/ttyS3\x00', 0x3) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r3 = syz_open_pts(r2, 0x0) dup2(r3, r2) syz_open_pts(r2, 0x800) [ 154.853798][T12041] loop5: detected capacity change from 0 to 8192 [ 154.879060][T12049] loop4: detected capacity change from 0 to 264192 13:56:56 executing program 3 (fault-call:3 fault-nth:60): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:56 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000002, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe0ffff, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 154.912482][T12049] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 154.947187][T12049] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:56:56 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x4000, &(0x7f0000000100)=0xfa, 0x5) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:56 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x80102, 0x0) set_mempolicy(0x3, &(0x7f0000000040), 0x7fff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x123802, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) syz_open_pts(r0, 0x121000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$KDDELIO(r2, 0x4b35, 0x6) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0xfff, 0x7fff, 0xffffffaf, 0x3f987e85, 0xe, "b77ba0713130a8c5918298f7f58547966afc36"}) 13:56:56 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000007, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 154.985978][T12049] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 155.021395][T12072] loop3: detected capacity change from 0 to 136 [ 155.050424][T12073] loop5: detected capacity change from 0 to 28799 [ 155.078199][T12072] FAULT_INJECTION: forcing a failure. [ 155.078199][T12072] name failslab, interval 1, probability 0, space 0, times 0 [ 155.090879][T12072] CPU: 1 PID: 12072 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 155.099365][T12072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.109417][T12072] Call Trace: [ 155.112688][T12072] dump_stack+0x137/0x19d [ 155.117018][T12072] should_fail+0x23c/0x250 [ 155.121434][T12072] ? xas_create+0x96b/0xb30 [ 155.126003][T12072] __should_failslab+0x81/0x90 [ 155.130828][T12072] should_failslab+0x5/0x20 [ 155.135417][T12072] kmem_cache_alloc+0x46/0x2e0 [ 155.140222][T12072] ? rmqueue_pcplist+0x152/0x190 [ 155.145153][T12072] xas_create+0x96b/0xb30 [ 155.149517][T12072] ? sysvec_reschedule_ipi+0x27/0xd0 [ 155.154845][T12072] xas_store+0x70/0xc90 [ 155.159040][T12072] ? __perf_event_task_sched_out+0xce0/0xd30 [ 155.165021][T12072] ? xas_find_conflict+0x422/0x4c0 [ 155.170277][T12072] __add_to_page_cache_locked+0x200/0x520 [ 155.176004][T12072] ? workingset_activation+0x230/0x230 [ 155.181532][T12072] add_to_page_cache_lru+0xa0/0x1b0 [ 155.186761][T12072] pagecache_get_page+0x6a3/0x900 [ 155.191830][T12072] __getblk_gfp+0x198/0x560 [ 155.196348][T12072] __bread_gfp+0x28/0x220 [ 155.200700][T12072] isofs_fill_super+0x9c5/0x1940 [ 155.205643][T12072] ? register_shrinker_prepared+0xdf/0xf0 [ 155.211366][T12072] ? set_blocksize+0x197/0x2a0 [ 155.216187][T12072] mount_bdev+0x1e8/0x290 [ 155.220517][T12072] ? isofs_mount+0x40/0x40 [ 155.224967][T12072] ? _isofs_bmap+0x30/0x30 [ 155.229390][T12072] isofs_mount+0x2d/0x40 [ 155.233653][T12072] legacy_get_tree+0x70/0xc0 [ 155.238430][T12072] vfs_get_tree+0x4a/0x1a0 [ 155.242875][T12072] path_mount+0x11d6/0x1ce0 [ 155.247456][T12072] __se_sys_mount+0x23d/0x2e0 [ 155.252150][T12072] ? mntput+0x45/0x70 [ 155.256224][T12072] ? __fpregs_load_activate+0x103/0x1b0 [ 155.261810][T12072] __x64_sys_mount+0x63/0x70 [ 155.266410][T12072] do_syscall_64+0x4a/0x90 [ 155.270884][T12072] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 155.276813][T12072] RIP: 0033:0x467b1a [ 155.280699][T12072] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:56:56 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000002, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:56 executing program 1: clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:56:56 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/211, 0xd3}], 0x1, 0x7, 0x2a7bb80c) [ 155.300305][T12072] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 155.308716][T12072] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 155.316688][T12072] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 155.324654][T12072] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 155.332651][T12072] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 155.340636][T12072] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:56 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) r0 = clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000540)={0x1c208a200, &(0x7f00000002c0)=0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340), {0x22b}, &(0x7f0000000380)=""/223, 0xdf, &(0x7f0000000480)=""/111, &(0x7f0000000500)=[r0, r0, r0, r0, r0], 0x5}, 0x58) r2 = fcntl$getown(r1, 0x9) openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x80, 0x0) clone3(&(0x7f0000000600)={0x1010000, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x2d}, &(0x7f0000000180)=""/84, 0x54, &(0x7f0000000200)=""/181, &(0x7f00000005c0)=[r0, r2], 0x2}, 0x58) 13:56:56 executing program 3 (fault-call:3 fault-nth:61): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:56 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x4000, &(0x7f0000000100)=0xfa, 0x5) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 155.390022][T12072] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:56:56 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x8000, &(0x7f00000000c0)=0x8, 0x100) set_mempolicy(0x4000, &(0x7f0000000080)=0x3ff, 0x100000000) [ 155.447393][T12095] loop4: detected capacity change from 0 to 264192 [ 155.462802][T12095] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:56:56 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0xffffffff) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 155.523187][T12095] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 155.534634][T12115] loop3: detected capacity change from 0 to 136 [ 155.564994][T12115] FAULT_INJECTION: forcing a failure. [ 155.564994][T12115] name failslab, interval 1, probability 0, space 0, times 0 [ 155.573829][T12095] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 155.577674][T12115] CPU: 0 PID: 12115 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 155.599111][T12115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.609160][T12115] Call Trace: 13:56:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:56 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000008, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:57 executing program 2: set_mempolicy(0x2, &(0x7f0000000000)=0x2000000000000004, 0x401) set_mempolicy(0x0, &(0x7f0000000080)=0x9, 0x5) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 155.612436][T12115] dump_stack+0x137/0x19d [ 155.616842][T12115] should_fail+0x23c/0x250 [ 155.621431][T12115] ? mempool_alloc_slab+0x16/0x20 [ 155.626570][T12115] __should_failslab+0x81/0x90 [ 155.631350][T12115] should_failslab+0x5/0x20 [ 155.635939][T12115] kmem_cache_alloc+0x46/0x2e0 [ 155.640701][T12115] ? PageHuge+0x59/0xc0 [ 155.644933][T12115] mempool_alloc_slab+0x16/0x20 [ 155.649805][T12115] ? mempool_free+0x130/0x130 [ 155.654507][T12115] mempool_alloc+0x8c/0x300 [ 155.659016][T12115] bio_alloc_bioset+0xcc/0x480 13:56:57 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x2000000000000005, 0x401) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) set_mempolicy(0x2, &(0x7f0000000080)=0x83, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 13:56:57 executing program 2: set_mempolicy(0x1, &(0x7f0000000080)=0x2000000000000007, 0x401) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) set_mempolicy(0x4000, &(0x7f0000000180)=0x3, 0xfffffffffffffc01) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0xe8) write(r0, &(0x7f00000000c0)="6679f5cd1df70b23a87cf81619f00b2f3c84cd3a9a03bff1281faea67c779e78c26834198dba4abdabc2c647ce806b410179c2bff1ac59cd60f90f16d45da724c50cb2d3fb69293ea80876636881b7c26cf38b5a22a8e5569efbb848ea57826e4a5d0103cb668fbf6e1c0f0feaf6a05c84dc917e1b8fca79c8f74f22fdb6c27be5fe9f283c98dd428e5c3d08f8efdd7c368b56986cba3bce61b42234d442e0a109443a73bd1786a42a2852c0", 0xac) [ 155.663804][T12115] submit_bh_wbc+0x130/0x330 [ 155.668392][T12115] __bread_gfp+0x110/0x220 [ 155.672807][T12115] isofs_fill_super+0x9c5/0x1940 [ 155.677768][T12115] ? register_shrinker_prepared+0xdf/0xf0 [ 155.683527][T12115] ? set_blocksize+0x197/0x2a0 [ 155.688338][T12115] mount_bdev+0x1e8/0x290 [ 155.692667][T12115] ? isofs_mount+0x40/0x40 [ 155.697109][T12115] ? _isofs_bmap+0x30/0x30 [ 155.701528][T12115] isofs_mount+0x2d/0x40 [ 155.705772][T12115] legacy_get_tree+0x70/0xc0 [ 155.710393][T12115] vfs_get_tree+0x4a/0x1a0 [ 155.714850][T12115] path_mount+0x11d6/0x1ce0 [ 155.719355][T12115] __se_sys_mount+0x23d/0x2e0 [ 155.724042][T12115] ? mntput+0x45/0x70 [ 155.728019][T12115] ? __fpregs_load_activate+0x103/0x1b0 [ 155.733572][T12115] __x64_sys_mount+0x63/0x70 [ 155.738234][T12115] do_syscall_64+0x4a/0x90 [ 155.742669][T12115] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 155.748594][T12115] RIP: 0033:0x467b1a [ 155.752480][T12115] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 155.772089][T12115] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 155.780639][T12115] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 155.788605][T12115] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 155.796553][T12115] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 155.804506][T12115] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 13:56:57 executing program 3 (fault-call:3 fault-nth:62): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:57 executing program 0 (fault-call:1 fault-nth:0): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 155.812472][T12115] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 155.826823][T12115] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:56:57 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x2, &(0x7f0000000040)=0x2, 0x5) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x5) 13:56:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) fchmod(r1, 0x45) umount2(&(0x7f0000000080)='./file0\x00', 0x4) umount2(&(0x7f00000000c0)='./file0/../file0\x00', 0x0) [ 155.898875][T12150] loop5: detected capacity change from 0 to 32768 [ 155.911272][T12157] loop4: detected capacity change from 0 to 264192 [ 155.936570][T12157] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 155.956110][T12158] loop3: detected capacity change from 0 to 136 [ 155.958521][T12165] FAULT_INJECTION: forcing a failure. [ 155.958521][T12165] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 155.969854][T12158] FAULT_INJECTION: forcing a failure. [ 155.969854][T12158] name failslab, interval 1, probability 0, space 0, times 0 [ 155.975411][T12165] CPU: 1 PID: 12165 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 155.975441][T12165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.975451][T12165] Call Trace: [ 155.975460][T12165] dump_stack+0x137/0x19d [ 156.014034][T12165] should_fail+0x23c/0x250 [ 156.018452][T12165] should_fail_usercopy+0x16/0x20 [ 156.023471][T12165] _copy_to_user+0x1c/0x90 [ 156.027899][T12165] simple_read_from_buffer+0xab/0x120 [ 156.033270][T12165] proc_fail_nth_read+0xf6/0x140 [ 156.038280][T12165] ? rw_verify_area+0x136/0x250 [ 156.043228][T12165] ? proc_fault_inject_write+0x200/0x200 [ 156.048857][T12165] vfs_read+0x154/0x5d0 [ 156.053037][T12165] ? selinux_file_ioctl+0x8e0/0x970 [ 156.058300][T12165] ? __fget_light+0x21b/0x260 [ 156.062975][T12165] ? __cond_resched+0x11/0x40 [ 156.067658][T12165] ksys_read+0xce/0x180 [ 156.071825][T12165] __x64_sys_read+0x3e/0x50 [ 156.076406][T12165] do_syscall_64+0x4a/0x90 [ 156.081162][T12165] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 156.087053][T12165] RIP: 0033:0x41937c [ 156.090975][T12165] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 156.110576][T12165] RSP: 002b:00007f774ba07170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 156.119051][T12165] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041937c [ 156.127014][T12165] RDX: 000000000000000f RSI: 00007f774ba071e0 RDI: 0000000000000004 [ 156.134980][T12165] RBP: 00007f774ba071d0 R08: 0000000000000000 R09: 0000000000000000 [ 156.142940][T12165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 13:56:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:57 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8d}, 0x0) r1 = gettid() tkill(r1, 0x1000000000013) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x20, 0x0, 0x7f, 0x0, 0x3, 0x8010, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={&(0x7f00000000c0), 0x3}, 0x530, 0x8, 0x1, 0x0, 0x81, 0xe3, 0x7, 0x0, 0x5, 0x0, 0x3ff}, r1, 0xb, r0, 0x2) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000", 0x1c}, {0x0, 0x0, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r3 = accept4$inet6(r2, 0x0, &(0x7f0000000180), 0x80000) write(r3, &(0x7f0000000240)="1194e012ecc4c3764ba119b4adeb2f88bf3193412a1dc10922017ac6046e1ff0fbfab532312fef8ba3", 0x29) r4 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x82) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r6 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r6, r5, 0x0, 0xa198) sendfile(r4, r2, 0x0, 0xa198) r7 = getpgid(r1) rt_sigqueueinfo(r7, 0x34, &(0x7f00000003c0)={0x5, 0xfffff9e4, 0x82}) [ 156.150903][T12165] R13: 00007ffc7f48c66f R14: 00007f774ba07300 R15: 0000000000022000 [ 156.158871][T12158] CPU: 0 PID: 12158 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 156.167297][T12158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.177344][T12158] Call Trace: [ 156.180618][T12158] dump_stack+0x137/0x19d [ 156.184952][T12158] should_fail+0x23c/0x250 [ 156.189373][T12158] __should_failslab+0x81/0x90 [ 156.194141][T12158] should_failslab+0x5/0x20 [ 156.195469][T12157] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 156.198643][T12158] kmem_cache_alloc_node+0x55/0x2c0 [ 156.198670][T12158] ? __mod_memcg_lruvec_state+0xfa/0x260 [ 156.218643][T12158] ? create_task_io_context+0x36/0x210 [ 156.224112][T12158] create_task_io_context+0x36/0x210 [ 156.229441][T12158] submit_bio_checks+0x778/0x800 [ 156.234394][T12158] ? mempool_alloc_slab+0x16/0x20 [ 156.239469][T12158] ? kmem_cache_alloc+0x1fc/0x2e0 [ 156.244496][T12158] ? mempool_alloc_slab+0x16/0x20 [ 156.249673][T12158] submit_bio_noacct+0x33/0x7e0 [ 156.254531][T12158] ? mempool_alloc_slab+0x16/0x20 [ 156.259547][T12158] ? mempool_free+0x130/0x130 [ 156.264279][T12158] ? mempool_alloc+0x99/0x300 [ 156.268970][T12158] ? __bio_add_page+0x1a3/0x210 [ 156.273843][T12158] submit_bio+0x16d/0x2b0 [ 156.278191][T12158] ? bio_add_page+0x1fc/0x260 [ 156.282862][T12158] ? bio_alloc_bioset+0x402/0x480 [ 156.287961][T12158] submit_bh_wbc+0x2f3/0x330 [ 156.292545][T12158] __bread_gfp+0x110/0x220 [ 156.296954][T12158] isofs_fill_super+0x9c5/0x1940 [ 156.301922][T12158] ? register_shrinker_prepared+0xdf/0xf0 [ 156.307663][T12158] ? set_blocksize+0x197/0x2a0 [ 156.312488][T12158] mount_bdev+0x1e8/0x290 [ 156.316811][T12158] ? isofs_mount+0x40/0x40 [ 156.321221][T12158] ? _isofs_bmap+0x30/0x30 [ 156.325663][T12158] isofs_mount+0x2d/0x40 [ 156.329938][T12158] legacy_get_tree+0x70/0xc0 [ 156.334542][T12158] vfs_get_tree+0x4a/0x1a0 [ 156.339073][T12158] path_mount+0x11d6/0x1ce0 [ 156.343578][T12158] __se_sys_mount+0x23d/0x2e0 [ 156.348264][T12158] ? mntput+0x45/0x70 [ 156.352247][T12158] ? __fpregs_load_activate+0x103/0x1b0 [ 156.357817][T12158] __x64_sys_mount+0x63/0x70 [ 156.362480][T12158] do_syscall_64+0x4a/0x90 [ 156.366893][T12158] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 156.372788][T12158] RIP: 0033:0x467b1a [ 156.376675][T12158] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 156.396326][T12158] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:56:57 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 156.404737][T12158] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 156.412728][T12158] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 156.420752][T12158] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 156.428792][T12158] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 156.436830][T12158] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:56:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2040000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:57 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000009, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:56:57 executing program 3 (fault-call:3 fault-nth:63): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:56:57 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x2, 0x2) [ 156.464729][T12157] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 156.489231][T12158] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:56:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="b7f0578c81bdf5681af067373de91d30239ca2f23b274be4c9199f06ecff634e925961262de1f2106f73cee8737d176f92e979993e3c582948dd37fa4d8d1a335c18625856adae3cdf51272782b9ea8b57f1b41d13bc23e87f8335d1c9d8d2a7a952afebc06929d3a093f6751b1488bdd53525833d38b526119b7be85056c8a6c371d3c024a68605c835fc2d", 0x8c}], 0x1, 0x5) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x40505330, &(0x7f0000000140)={0x80}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f00000001c0)={0x3, 0x0, 0x7}) 13:56:57 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x4b47, 0x2) [ 156.584018][T12198] loop5: detected capacity change from 0 to 66048 [ 156.623394][T12204] loop3: detected capacity change from 0 to 136 13:56:58 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0xd861e000) [ 156.651481][T12204] FAULT_INJECTION: forcing a failure. [ 156.651481][T12204] name failslab, interval 1, probability 0, space 0, times 0 [ 156.664206][T12204] CPU: 0 PID: 12204 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 156.669710][T12216] loop4: detected capacity change from 0 to 264192 [ 156.672619][T12204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.672633][T12204] Call Trace: [ 156.672641][T12204] dump_stack+0x137/0x19d [ 156.672669][T12204] should_fail+0x23c/0x250 13:56:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 156.681723][T12216] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 156.689190][T12204] ? mempool_alloc_slab+0x16/0x20 [ 156.689218][T12204] __should_failslab+0x81/0x90 [ 156.718385][T12204] should_failslab+0x5/0x20 [ 156.722972][T12204] kmem_cache_alloc+0x46/0x2e0 [ 156.727739][T12204] ? PageHuge+0x59/0xc0 [ 156.731907][T12204] mempool_alloc_slab+0x16/0x20 [ 156.736762][T12204] ? mempool_free+0x130/0x130 [ 156.741514][T12204] mempool_alloc+0x8c/0x300 [ 156.746060][T12204] bio_alloc_bioset+0xcc/0x480 [ 156.750827][T12204] ? __cond_resched+0x11/0x40 [ 156.755519][T12204] submit_bh_wbc+0x130/0x330 [ 156.760111][T12204] __bread_gfp+0x110/0x220 [ 156.764633][T12204] isofs_fill_super+0x9c5/0x1940 [ 156.769570][T12204] ? register_shrinker_prepared+0xdf/0xf0 [ 156.774720][T12216] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 156.775289][T12204] ? set_blocksize+0x197/0x2a0 [ 156.789120][T12204] mount_bdev+0x1e8/0x290 13:56:58 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x4b49, 0x2) 13:56:58 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000a, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 156.790350][T12216] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 156.793460][T12204] ? isofs_mount+0x40/0x40 [ 156.793487][T12204] ? _isofs_bmap+0x30/0x30 [ 156.815349][T12204] isofs_mount+0x2d/0x40 [ 156.819686][T12204] legacy_get_tree+0x70/0xc0 [ 156.824279][T12204] vfs_get_tree+0x4a/0x1a0 [ 156.828756][T12204] path_mount+0x11d6/0x1ce0 [ 156.833270][T12204] __se_sys_mount+0x23d/0x2e0 [ 156.838037][T12204] ? mntput+0x45/0x70 [ 156.842025][T12204] __x64_sys_mount+0x63/0x70 [ 156.846668][T12204] do_syscall_64+0x4a/0x90 [ 156.851087][T12204] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 156.856983][T12204] RIP: 0033:0x467b1a [ 156.860903][T12204] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 156.880511][T12204] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 156.888950][T12204] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 156.896956][T12204] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 156.904937][T12204] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 156.912909][T12204] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 156.916230][T12239] loop5: detected capacity change from 0 to 98304 [ 156.920909][T12204] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 156.949158][T12204] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 157.015937][T12255] loop4: detected capacity change from 0 to 264192 [ 157.025106][T12255] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 157.033395][T12255] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 157.043511][T12255] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000000)=[{&(0x7f0000000180)="eb3c90", 0x3}, {0x0, 0x0, 0x1}, {&(0x7f00000001c0)="0f32e7", 0x3, 0xe}], 0x8985, &(0x7f0000000140)=ANY=[@ANYBLOB="df9c733178666c6f45968f6100"]) 13:57:00 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5409, 0x2) 13:57:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:00 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) r0 = clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = gettid() tkill(r1, 0x1000000000013) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) r2 = gettid() tkill(r2, 0x1000000000013) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)) r3 = getpgrp(r2) r4 = gettid() tkill(r4, 0x1000000000013) tkill(r4, 0x1d) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x40000, 0x0) clone3(&(0x7f0000000300)={0x4080880, &(0x7f0000000040), &(0x7f0000000100)=0x0, &(0x7f0000000140), {0x14}, &(0x7f0000000180)=""/143, 0x8f, &(0x7f0000000240)=""/8, &(0x7f0000000280)=[r1, r0, r3], 0x3, {r5}}, 0x58) r7 = gettid() tkill(r7, 0x1000000000013) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600)={0x0}, &(0x7f0000000640)=0xc) clone3(&(0x7f00000006c0)={0x2101100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0xf}, &(0x7f00000004c0)=""/204, 0xcc, &(0x7f00000005c0)=""/5, &(0x7f0000000680)=[r6, r7, r8], 0x3, {r5}}, 0x58) 13:57:00 executing program 3 (fault-call:3 fault-nth:64): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:00 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:00 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x2) [ 159.275507][T12273] loop3: detected capacity change from 0 to 136 [ 159.305996][T12273] FAULT_INJECTION: forcing a failure. [ 159.305996][T12273] name failslab, interval 1, probability 0, space 0, times 0 13:57:00 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540c, 0x2) [ 159.318728][T12273] CPU: 1 PID: 12273 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 159.327210][T12273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.332954][T12277] loop5: detected capacity change from 0 to 131072 [ 159.337358][T12273] Call Trace: [ 159.337369][T12273] dump_stack+0x137/0x19d [ 159.351440][T12273] should_fail+0x23c/0x250 [ 159.355860][T12273] __should_failslab+0x81/0x90 [ 159.360710][T12273] should_failslab+0x5/0x20 [ 159.363727][T12276] loop4: detected capacity change from 0 to 264192 13:57:00 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540d, 0x2) [ 159.365226][T12273] kmem_cache_alloc_node+0x55/0x2c0 [ 159.365254][T12273] ? __mod_memcg_lruvec_state+0xfa/0x260 [ 159.382534][T12273] ? create_task_io_context+0x36/0x210 [ 159.383303][T12276] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 159.388077][T12273] create_task_io_context+0x36/0x210 [ 159.388107][T12273] submit_bio_checks+0x778/0x800 [ 159.405753][T12273] ? mempool_alloc_slab+0x16/0x20 [ 159.410854][T12273] ? kmem_cache_alloc+0x1fc/0x2e0 [ 159.415887][T12273] ? mempool_alloc_slab+0x16/0x20 [ 159.420960][T12273] submit_bio_noacct+0x33/0x7e0 [ 159.424999][T12276] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 159.425823][T12273] ? mempool_alloc_slab+0x16/0x20 [ 159.425848][T12273] ? mempool_free+0x130/0x130 [ 159.435673][T12276] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 159.439983][T12273] ? mempool_alloc+0x99/0x300 [ 159.462306][T12273] ? __bio_add_page+0x1a3/0x210 [ 159.467181][T12273] submit_bio+0x16d/0x2b0 [ 159.471492][T12273] ? bio_add_page+0x1fc/0x260 [ 159.476180][T12273] ? bio_alloc_bioset+0x402/0x480 [ 159.481184][T12273] submit_bh_wbc+0x2f3/0x330 [ 159.485909][T12273] __bread_gfp+0x110/0x220 [ 159.490386][T12273] isofs_fill_super+0x9c5/0x1940 [ 159.495308][T12273] ? register_shrinker_prepared+0xdf/0xf0 [ 159.501041][T12273] ? set_blocksize+0x197/0x2a0 [ 159.505786][T12273] mount_bdev+0x1e8/0x290 [ 159.510125][T12273] ? isofs_mount+0x40/0x40 [ 159.514581][T12273] ? _isofs_bmap+0x30/0x30 [ 159.518994][T12273] isofs_mount+0x2d/0x40 [ 159.523278][T12273] legacy_get_tree+0x70/0xc0 [ 159.527848][T12273] vfs_get_tree+0x4a/0x1a0 [ 159.532263][T12273] path_mount+0x11d6/0x1ce0 [ 159.536750][T12273] __se_sys_mount+0x23d/0x2e0 [ 159.541458][T12273] ? mntput+0x45/0x70 [ 159.545479][T12273] ? __fpregs_load_activate+0x103/0x1b0 [ 159.551037][T12273] __x64_sys_mount+0x63/0x70 [ 159.555616][T12273] do_syscall_64+0x4a/0x90 [ 159.560030][T12273] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.565917][T12273] RIP: 0033:0x467b1a [ 159.569814][T12273] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.589408][T12273] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 159.597805][T12273] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 159.605791][T12273] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 159.613754][T12273] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 13:57:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:01 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000c, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:01 executing program 3 (fault-call:3 fault-nth:65): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:01 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x2) [ 159.621796][T12273] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 159.629768][T12273] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 159.645854][T12273] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:01 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540e, 0x2) 13:57:01 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x2) [ 159.754933][T12311] loop5: detected capacity change from 0 to 163840 [ 159.781925][T12319] loop3: detected capacity change from 0 to 136 [ 159.801731][T12320] loop4: detected capacity change from 0 to 264192 [ 159.813039][T12319] FAULT_INJECTION: forcing a failure. [ 159.813039][T12319] name failslab, interval 1, probability 0, space 0, times 0 [ 159.825688][T12319] CPU: 1 PID: 12319 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 159.834107][T12319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.844171][T12319] Call Trace: [ 159.847487][T12319] dump_stack+0x137/0x19d [ 159.851872][T12319] should_fail+0x23c/0x250 [ 159.856288][T12319] ? mempool_alloc_slab+0x16/0x20 [ 159.861309][T12319] __should_failslab+0x81/0x90 [ 159.866072][T12319] should_failslab+0x5/0x20 [ 159.870574][T12319] kmem_cache_alloc+0x46/0x2e0 [ 159.875335][T12319] ? PageHuge+0x59/0xc0 [ 159.879496][T12319] mempool_alloc_slab+0x16/0x20 [ 159.884426][T12319] ? mempool_free+0x130/0x130 [ 159.889114][T12319] mempool_alloc+0x8c/0x300 [ 159.893614][T12319] bio_alloc_bioset+0xcc/0x480 [ 159.898414][T12319] ? __cond_resched+0x11/0x40 [ 159.903126][T12319] submit_bh_wbc+0x130/0x330 [ 159.907712][T12319] __bread_gfp+0x110/0x220 [ 159.912121][T12319] isofs_fill_super+0x9c5/0x1940 [ 159.917060][T12319] ? register_shrinker_prepared+0xdf/0xf0 [ 159.922777][T12319] ? set_blocksize+0x197/0x2a0 [ 159.927597][T12319] mount_bdev+0x1e8/0x290 [ 159.931924][T12319] ? isofs_mount+0x40/0x40 [ 159.936337][T12319] ? _isofs_bmap+0x30/0x30 [ 159.940761][T12319] isofs_mount+0x2d/0x40 [ 159.945006][T12319] legacy_get_tree+0x70/0xc0 [ 159.949594][T12319] vfs_get_tree+0x4a/0x1a0 [ 159.954005][T12319] path_mount+0x11d6/0x1ce0 [ 159.958523][T12319] __se_sys_mount+0x23d/0x2e0 [ 159.963202][T12319] ? mntput+0x45/0x70 [ 159.967248][T12319] ? __fpregs_load_activate+0x103/0x1b0 [ 159.972796][T12319] __x64_sys_mount+0x63/0x70 [ 159.977390][T12319] do_syscall_64+0x4a/0x90 [ 159.981802][T12319] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.988998][T12319] RIP: 0033:0x467b1a [ 159.992883][T12319] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.012499][T12319] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 160.020959][T12319] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 160.028944][T12319] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 160.036915][T12319] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 160.044881][T12319] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 160.052862][T12319] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 160.072283][T12319] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 160.092176][T12320] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 160.107397][T12320] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 160.117302][T12320] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:03 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x8000, &(0x7f0000000040)=0xb1ea, 0x7) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:03 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0x2) 13:57:03 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x2) 13:57:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:03 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000d, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:03 executing program 3 (fault-call:3 fault-nth:66): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 162.294857][T12351] loop3: detected capacity change from 0 to 136 [ 162.307625][T12351] FAULT_INJECTION: forcing a failure. [ 162.307625][T12351] name failslab, interval 1, probability 0, space 0, times 0 [ 162.313099][T12356] loop5: detected capacity change from 0 to 196608 [ 162.320297][T12351] CPU: 1 PID: 12351 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 162.328172][T12358] loop4: detected capacity change from 0 to 264192 [ 162.335157][T12351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.335170][T12351] Call Trace: [ 162.335178][T12351] dump_stack+0x137/0x19d [ 162.359295][T12351] should_fail+0x23c/0x250 [ 162.363729][T12351] ? mempool_alloc_slab+0x16/0x20 [ 162.368756][T12351] __should_failslab+0x81/0x90 [ 162.373525][T12351] should_failslab+0x5/0x20 [ 162.378114][T12351] kmem_cache_alloc+0x46/0x2e0 [ 162.382935][T12351] ? PageHuge+0x59/0xc0 [ 162.387126][T12351] mempool_alloc_slab+0x16/0x20 [ 162.391989][T12351] ? mempool_free+0x130/0x130 [ 162.396659][T12351] mempool_alloc+0x8c/0x300 [ 162.401157][T12351] bio_alloc_bioset+0xcc/0x480 [ 162.405923][T12351] submit_bh_wbc+0x130/0x330 [ 162.410508][T12351] __bread_gfp+0x110/0x220 [ 162.414977][T12351] isofs_fill_super+0x9c5/0x1940 [ 162.419927][T12351] ? register_shrinker_prepared+0xdf/0xf0 [ 162.425642][T12351] ? set_blocksize+0x197/0x2a0 [ 162.430454][T12351] mount_bdev+0x1e8/0x290 [ 162.434787][T12351] ? isofs_mount+0x40/0x40 [ 162.439273][T12351] ? _isofs_bmap+0x30/0x30 [ 162.443717][T12351] isofs_mount+0x2d/0x40 [ 162.447971][T12351] legacy_get_tree+0x70/0xc0 [ 162.452634][T12351] vfs_get_tree+0x4a/0x1a0 [ 162.457103][T12351] path_mount+0x11d6/0x1ce0 [ 162.461601][T12351] __se_sys_mount+0x23d/0x2e0 [ 162.466278][T12351] ? mntput+0x45/0x70 [ 162.470272][T12351] ? __fpregs_load_activate+0x103/0x1b0 [ 162.475829][T12351] __x64_sys_mount+0x63/0x70 [ 162.480534][T12351] do_syscall_64+0x4a/0x90 [ 162.485014][T12351] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.490902][T12351] RIP: 0033:0x467b1a 13:57:03 executing program 2: ioctl$TCXONC(0xffffffffffffffff, 0x540b, 0x2) [ 162.494787][T12351] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.514468][T12351] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 162.522953][T12351] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 162.530923][T12351] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 13:57:03 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5410, 0x2) [ 162.538903][T12351] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 162.546871][T12351] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 162.554844][T12351] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:57:03 executing program 3 (fault-call:3 fault-nth:67): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:03 executing program 2: ioctl$TCXONC(0xffffffffffffffff, 0x540b, 0x2) [ 162.587023][T12351] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 162.608476][T12358] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:04 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5411, 0x2) 13:57:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6040000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:04 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x6e6bb1}, {{@in6=@mcast1}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}, 0xe8) bind(r0, &(0x7f0000000100)=@ieee802154, 0x80) clone3(&(0x7f0000000080)={0x186025400, 0x0, 0x0, 0x0, {0x3f}, 0x0, 0x4, 0x0, 0x0}, 0x58) [ 162.642645][T12358] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 162.691270][T12384] loop3: detected capacity change from 0 to 136 [ 162.705841][T12358] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 162.726340][T12384] FAULT_INJECTION: forcing a failure. [ 162.726340][T12384] name failslab, interval 1, probability 0, space 0, times 0 [ 162.738992][T12384] CPU: 1 PID: 12384 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 162.747433][T12384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.757496][T12384] Call Trace: [ 162.760769][T12384] dump_stack+0x137/0x19d [ 162.765127][T12384] should_fail+0x23c/0x250 [ 162.769574][T12384] ? mempool_alloc_slab+0x16/0x20 [ 162.774604][T12384] __should_failslab+0x81/0x90 [ 162.779375][T12384] should_failslab+0x5/0x20 [ 162.783929][T12384] kmem_cache_alloc+0x46/0x2e0 13:57:04 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000e, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:04 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5412, 0x2) 13:57:04 executing program 2: ioctl$TCXONC(0xffffffffffffffff, 0x540b, 0x2) [ 162.788702][T12384] ? PageHuge+0x59/0xc0 [ 162.792927][T12384] mempool_alloc_slab+0x16/0x20 [ 162.797793][T12384] ? mempool_free+0x130/0x130 [ 162.802470][T12384] mempool_alloc+0x8c/0x300 [ 162.807032][T12384] bio_alloc_bioset+0xcc/0x480 [ 162.811834][T12384] ? __cond_resched+0x11/0x40 [ 162.816528][T12384] submit_bh_wbc+0x130/0x330 [ 162.821121][T12384] __bread_gfp+0x110/0x220 [ 162.825550][T12384] isofs_fill_super+0x9c5/0x1940 [ 162.830582][T12384] ? register_shrinker_prepared+0xdf/0xf0 [ 162.836409][T12384] ? set_blocksize+0x197/0x2a0 13:57:04 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5413, 0x2) 13:57:04 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = gettid() r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000300)=""/88, 0x58}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/85, 0x55}], 0x3, 0xd9f, 0x0) clone3(&(0x7f0000000280)={0xc0000200, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x34}, &(0x7f0000000180)=""/67, 0x43, &(0x7f0000000200)=""/45, &(0x7f0000000240)=[r0], 0x1, {r1}}, 0x58) [ 162.841180][T12384] mount_bdev+0x1e8/0x290 [ 162.845516][T12384] ? isofs_mount+0x40/0x40 [ 162.849953][T12384] ? _isofs_bmap+0x30/0x30 [ 162.854407][T12384] isofs_mount+0x2d/0x40 [ 162.858667][T12384] legacy_get_tree+0x70/0xc0 [ 162.863264][T12384] vfs_get_tree+0x4a/0x1a0 [ 162.867701][T12384] path_mount+0x11d6/0x1ce0 [ 162.872226][T12384] __se_sys_mount+0x23d/0x2e0 [ 162.876905][T12384] ? mntput+0x45/0x70 [ 162.880941][T12384] ? __fpregs_load_activate+0x103/0x1b0 [ 162.886530][T12384] __x64_sys_mount+0x63/0x70 13:57:04 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5414, 0x2) [ 162.891153][T12384] do_syscall_64+0x4a/0x90 [ 162.895583][T12384] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.901503][T12384] RIP: 0033:0x467b1a [ 162.905395][T12384] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.925007][T12384] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 162.933517][T12384] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a 13:57:04 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x2) [ 162.941488][T12384] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 162.949457][T12384] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 162.957494][T12384] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 162.957742][T12394] loop5: detected capacity change from 0 to 197120 [ 162.965463][T12384] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 163.057048][T12384] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 163.067886][T12435] loop4: detected capacity change from 0 to 264192 [ 163.077540][T12435] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 163.087145][T12435] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:04 executing program 3 (fault-call:3 fault-nth:68): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:04 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5415, 0x2) 13:57:04 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x2) 13:57:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:04 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000f, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 163.097351][T12435] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:04 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) set_mempolicy(0x0, &(0x7f0000000100)=0x1, 0x400) set_mempolicy(0x1, &(0x7f0000000040)=0x3ff, 0x0) 13:57:04 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x2) 13:57:04 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x2) 13:57:04 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5417, 0x2) [ 163.197515][T12462] loop5: detected capacity change from 0 to 229376 [ 163.226090][T12463] loop4: detected capacity change from 0 to 264192 [ 163.260977][T12466] loop3: detected capacity change from 0 to 136 [ 163.261684][T12463] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 163.287360][T12466] FAULT_INJECTION: forcing a failure. [ 163.287360][T12466] name failslab, interval 1, probability 0, space 0, times 0 [ 163.300029][T12466] CPU: 1 PID: 12466 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 163.308494][T12466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.318577][T12466] Call Trace: [ 163.321898][T12466] dump_stack+0x137/0x19d [ 163.326237][T12466] should_fail+0x23c/0x250 [ 163.330744][T12466] ? mempool_alloc_slab+0x16/0x20 [ 163.335889][T12466] __should_failslab+0x81/0x90 [ 163.340725][T12466] should_failslab+0x5/0x20 [ 163.345239][T12466] kmem_cache_alloc+0x46/0x2e0 [ 163.350012][T12466] ? PageHuge+0x59/0xc0 [ 163.354243][T12466] mempool_alloc_slab+0x16/0x20 [ 163.359109][T12466] ? mempool_free+0x130/0x130 [ 163.362233][T12463] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 163.363863][T12466] mempool_alloc+0x8c/0x300 [ 163.377464][T12466] bio_alloc_bioset+0xcc/0x480 [ 163.382233][T12466] submit_bh_wbc+0x130/0x330 [ 163.386843][T12466] __bread_gfp+0x110/0x220 [ 163.391333][T12466] isofs_fill_super+0x9c5/0x1940 [ 163.396379][T12466] ? register_shrinker_prepared+0xdf/0xf0 [ 163.402190][T12466] ? set_blocksize+0x197/0x2a0 [ 163.406953][T12466] mount_bdev+0x1e8/0x290 13:57:04 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540b, 0x2) 13:57:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:04 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) creat(&(0x7f0000000100)='./file0\x00', 0x181) socket$inet6_tcp(0xa, 0x1, 0x0) [ 163.411198][T12463] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 163.411340][T12466] ? isofs_mount+0x40/0x40 [ 163.428760][T12466] ? _isofs_bmap+0x30/0x30 [ 163.433338][T12466] isofs_mount+0x2d/0x40 [ 163.437670][T12466] legacy_get_tree+0x70/0xc0 [ 163.442293][T12466] vfs_get_tree+0x4a/0x1a0 [ 163.446714][T12466] path_mount+0x11d6/0x1ce0 [ 163.451225][T12466] __se_sys_mount+0x23d/0x2e0 [ 163.455918][T12466] ? mntput+0x45/0x70 [ 163.459903][T12466] ? __fpregs_load_activate+0x103/0x1b0 [ 163.465458][T12466] __x64_sys_mount+0x63/0x70 [ 163.470079][T12466] do_syscall_64+0x4a/0x90 [ 163.474575][T12466] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.480587][T12466] RIP: 0033:0x467b1a [ 163.484480][T12466] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.504090][T12466] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 163.512506][T12466] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 163.520473][T12466] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 163.528443][T12466] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 163.536415][T12466] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 163.544434][T12466] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 163.547864][T12505] loop5: detected capacity change from 0 to 262144 13:57:04 executing program 3 (fault-call:3 fault-nth:69): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:04 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000010, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:04 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5418, 0x2) 13:57:04 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540b, 0x2) [ 163.557723][T12466] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:04 executing program 1: ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000140)={0xd, 0x7}) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) open(&(0x7f0000000040)='./file0\x00', 0x80802, 0x20) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x15}, 0x0, 0x0, 0x0, 0x0}, 0x58) set_mempolicy(0x3, &(0x7f0000000100)=0x8001, 0x1) 13:57:04 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x541b, 0x2) 13:57:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:05 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540b, 0x2) [ 163.646308][T12528] loop4: detected capacity change from 0 to 264192 [ 163.656631][T12530] loop3: detected capacity change from 0 to 136 [ 163.676373][T12528] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 163.686776][T12530] FAULT_INJECTION: forcing a failure. [ 163.686776][T12530] name failslab, interval 1, probability 0, space 0, times 0 [ 163.696715][T12528] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 163.699444][T12530] CPU: 1 PID: 12530 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 163.709950][T12543] loop5: detected capacity change from 0 to 264192 [ 163.716911][T12530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.716924][T12530] Call Trace: 13:57:05 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000011, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:05 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x541d, 0x2) 13:57:05 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x0) [ 163.735540][T12528] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 163.736750][T12530] dump_stack+0x137/0x19d [ 163.754269][T12530] should_fail+0x23c/0x250 [ 163.758717][T12530] ? mempool_alloc_slab+0x16/0x20 [ 163.763749][T12530] __should_failslab+0x81/0x90 [ 163.768517][T12530] should_failslab+0x5/0x20 [ 163.773026][T12530] kmem_cache_alloc+0x46/0x2e0 [ 163.777839][T12530] ? PageHuge+0x59/0xc0 [ 163.781992][T12530] mempool_alloc_slab+0x16/0x20 [ 163.787004][T12530] ? mempool_free+0x130/0x130 [ 163.791677][T12530] mempool_alloc+0x8c/0x300 13:57:05 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x541e, 0x2) [ 163.796183][T12530] bio_alloc_bioset+0xcc/0x480 [ 163.800945][T12530] ? __cond_resched+0x11/0x40 [ 163.805630][T12530] submit_bh_wbc+0x130/0x330 [ 163.810223][T12530] __bread_gfp+0x110/0x220 [ 163.814642][T12530] isofs_fill_super+0x9c5/0x1940 [ 163.819610][T12530] ? register_shrinker_prepared+0xdf/0xf0 [ 163.825331][T12530] ? set_blocksize+0x197/0x2a0 [ 163.830093][T12530] mount_bdev+0x1e8/0x290 [ 163.834486][T12530] ? isofs_mount+0x40/0x40 [ 163.838906][T12530] ? _isofs_bmap+0x30/0x30 [ 163.843357][T12530] isofs_mount+0x2d/0x40 [ 163.847700][T12530] legacy_get_tree+0x70/0xc0 [ 163.852282][T12530] vfs_get_tree+0x4a/0x1a0 [ 163.856731][T12530] path_mount+0x11d6/0x1ce0 [ 163.861217][T12530] __se_sys_mount+0x23d/0x2e0 [ 163.865875][T12530] ? mntput+0x45/0x70 [ 163.869835][T12530] __x64_sys_mount+0x63/0x70 [ 163.874413][T12530] do_syscall_64+0x4a/0x90 [ 163.878822][T12530] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.884696][T12530] RIP: 0033:0x467b1a [ 163.888583][T12530] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.908172][T12530] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 163.916577][T12530] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 163.924549][T12530] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 163.932499][T12530] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 13:57:05 executing program 3 (fault-call:3 fault-nth:70): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:05 executing program 1: sched_yield() arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xfffffffffffffffb) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x9) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="2f0c00000000000000000600783a6f626a6563743d723a7379736cff675f636f6e665f743a7330000014000300ff0200000000000000000000000000021406714f43000200fe800000000000000000000081eac5c6e907013a7d4bf605048fe4c196bdc14a9646747d321a41e0cde48b8f095b8a9839fb5c0042a633bda59b61ff00000000000000002156b7182137f5ab5358387a406a7585930aff6bcbb9e5a9c71375f666176d1f926ffda301c4df4e91f4bc80c915e888e0fe25df427f479d7a27ff410ab4bd989411a3c0b40a1c93dece6f0fe0e00ff25feea36aa07b"], 0x64}}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) modify_ldt$write(0x1, &(0x7f0000000100)={0xfffffffd, 0xffffffffffffffff, 0x4000, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1}, 0x10) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x1) 13:57:05 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x0) [ 163.940451][T12530] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 163.948446][T12530] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 163.957406][T12530] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 164.052505][T12562] loop4: detected capacity change from 0 to 264192 [ 164.060777][T12562] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 164.090159][T12576] loop3: detected capacity change from 0 to 136 [ 164.092820][T12562] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 164.105669][T12576] FAULT_INJECTION: forcing a failure. [ 164.105669][T12576] name failslab, interval 1, probability 0, space 0, times 0 [ 164.118307][T12576] CPU: 1 PID: 12576 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 164.126721][T12576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.132298][T12581] loop5: detected capacity change from 0 to 264192 [ 164.136774][T12576] Call Trace: [ 164.136823][T12576] dump_stack+0x137/0x19d 13:57:05 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x0) 13:57:05 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x541e, 0x2) [ 164.151717][T12576] should_fail+0x23c/0x250 [ 164.151863][T12567] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.1'. [ 164.156136][T12576] ? mempool_alloc_slab+0x16/0x20 [ 164.156161][T12576] __should_failslab+0x81/0x90 [ 164.171223][T12562] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 164.175337][T12576] should_failslab+0x5/0x20 [ 164.193933][T12576] kmem_cache_alloc+0x46/0x2e0 [ 164.198705][T12576] ? PageHuge+0x59/0xc0 13:57:05 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000012, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 164.202883][T12576] mempool_alloc_slab+0x16/0x20 [ 164.207858][T12576] ? mempool_free+0x130/0x130 [ 164.212636][T12576] mempool_alloc+0x8c/0x300 [ 164.217173][T12576] bio_alloc_bioset+0xcc/0x480 [ 164.222315][T12576] submit_bh_wbc+0x130/0x330 [ 164.226982][T12576] __bread_gfp+0x110/0x220 [ 164.231424][T12576] isofs_fill_super+0x9c5/0x1940 [ 164.236382][T12576] ? register_shrinker_prepared+0xdf/0xf0 [ 164.242147][T12576] ? set_blocksize+0x197/0x2a0 [ 164.246985][T12576] mount_bdev+0x1e8/0x290 [ 164.251388][T12576] ? isofs_mount+0x40/0x40 [ 164.254730][T12583] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.1'. [ 164.255828][T12576] ? _isofs_bmap+0x30/0x30 [ 164.255858][T12576] isofs_mount+0x2d/0x40 [ 164.273721][T12576] legacy_get_tree+0x70/0xc0 [ 164.278326][T12576] vfs_get_tree+0x4a/0x1a0 [ 164.282781][T12576] path_mount+0x11d6/0x1ce0 [ 164.287365][T12576] __se_sys_mount+0x23d/0x2e0 [ 164.292043][T12576] ? mntput+0x45/0x70 [ 164.296019][T12576] ? __fpregs_load_activate+0x103/0x1b0 [ 164.301576][T12576] __x64_sys_mount+0x63/0x70 [ 164.307121][T12576] do_syscall_64+0x4a/0x90 [ 164.311692][T12576] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 164.317574][T12576] RIP: 0033:0x467b1a [ 164.321743][T12576] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 164.342509][T12576] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:57:05 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x2) 13:57:05 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x2, &(0x7f0000000040)=0x1, 0x9) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:05 executing program 3 (fault-call:3 fault-nth:71): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 164.351040][T12576] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 164.359020][T12576] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 164.367129][T12576] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 164.375449][T12576] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 164.383674][T12576] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 164.393152][T12576] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:05 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5421, 0x2) 13:57:05 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x2) 13:57:05 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x2) [ 164.492835][T12610] loop4: detected capacity change from 0 to 264192 [ 164.501546][T12609] loop3: detected capacity change from 0 to 136 [ 164.507935][T12616] loop5: detected capacity change from 0 to 264192 [ 164.516354][T12610] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:05 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5422, 0x2) 13:57:05 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000100)={0x1ae025100, 0x0, 0x0, 0x0, {0x2e}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 164.542476][T12609] FAULT_INJECTION: forcing a failure. [ 164.542476][T12609] name failslab, interval 1, probability 0, space 0, times 0 [ 164.555304][T12609] CPU: 1 PID: 12609 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 164.561785][T12610] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 164.563723][T12609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.563739][T12609] Call Trace: [ 164.563747][T12609] dump_stack+0x137/0x19d 13:57:05 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 164.590744][T12609] should_fail+0x23c/0x250 [ 164.595189][T12609] ? mempool_alloc_slab+0x16/0x20 [ 164.600319][T12609] __should_failslab+0x81/0x90 [ 164.605299][T12609] should_failslab+0x5/0x20 [ 164.606215][T12610] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 164.609811][T12609] kmem_cache_alloc+0x46/0x2e0 [ 164.609836][T12609] ? PageHuge+0x59/0xc0 [ 164.632677][T12609] mempool_alloc_slab+0x16/0x20 [ 164.637558][T12609] ? mempool_free+0x130/0x130 [ 164.642309][T12609] mempool_alloc+0x8c/0x300 [ 164.646808][T12609] bio_alloc_bioset+0xcc/0x480 [ 164.651552][T12609] submit_bh_wbc+0x130/0x330 [ 164.656123][T12609] __bread_gfp+0x110/0x220 [ 164.660537][T12609] isofs_fill_super+0x9c5/0x1940 [ 164.665543][T12609] ? register_shrinker_prepared+0xdf/0xf0 [ 164.671542][T12609] ? set_blocksize+0x197/0x2a0 [ 164.676289][T12609] mount_bdev+0x1e8/0x290 [ 164.680630][T12609] ? isofs_mount+0x40/0x40 [ 164.685053][T12609] ? _isofs_bmap+0x30/0x30 [ 164.689462][T12609] isofs_mount+0x2d/0x40 [ 164.693686][T12609] legacy_get_tree+0x70/0xc0 [ 164.698313][T12609] vfs_get_tree+0x4a/0x1a0 [ 164.702818][T12609] path_mount+0x11d6/0x1ce0 [ 164.707339][T12609] __se_sys_mount+0x23d/0x2e0 [ 164.712075][T12609] ? mntput+0x45/0x70 [ 164.716106][T12609] ? __fpregs_load_activate+0x103/0x1b0 [ 164.722699][T12609] __x64_sys_mount+0x63/0x70 [ 164.727295][T12609] do_syscall_64+0x4a/0x90 [ 164.731691][T12609] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 164.737981][T12609] RIP: 0033:0x467b1a [ 164.741894][T12609] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 164.761539][T12609] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 164.769975][T12609] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 164.778092][T12609] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 13:57:06 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5423, 0x2) 13:57:06 executing program 3 (fault-call:3 fault-nth:72): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:06 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) set_mempolicy(0x2, &(0x7f0000000100)=0x8, 0xd23) set_mempolicy(0x1, &(0x7f0000000040)=0xffffffffffff2061, 0x101) [ 164.787289][T12609] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 164.795246][T12609] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 164.803230][T12609] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 164.812139][T12609] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:06 executing program 2: ioctl$TCXONC(0xffffffffffffffff, 0x5416, 0x2) 13:57:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 164.917034][T12648] loop3: detected capacity change from 0 to 136 [ 164.918446][T12647] loop4: detected capacity change from 0 to 264192 [ 164.936873][T12648] FAULT_INJECTION: forcing a failure. [ 164.936873][T12648] name failslab, interval 1, probability 0, space 0, times 0 [ 164.941228][T12647] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:06 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5424, 0x2) [ 164.953426][T12648] CPU: 0 PID: 12648 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 164.953451][T12648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.980998][T12648] Call Trace: [ 164.984312][T12648] dump_stack+0x137/0x19d [ 164.988673][T12648] should_fail+0x23c/0x250 [ 164.993142][T12648] ? mempool_alloc_slab+0x16/0x20 [ 164.998258][T12648] __should_failslab+0x81/0x90 [ 165.003035][T12648] should_failslab+0x5/0x20 [ 165.007597][T12648] kmem_cache_alloc+0x46/0x2e0 [ 165.012368][T12648] ? PageHuge+0x59/0xc0 [ 165.016583][T12648] mempool_alloc_slab+0x16/0x20 [ 165.022838][T12648] ? mempool_free+0x130/0x130 [ 165.027544][T12648] mempool_alloc+0x8c/0x300 [ 165.032075][T12648] bio_alloc_bioset+0xcc/0x480 [ 165.036846][T12648] submit_bh_wbc+0x130/0x330 [ 165.041445][T12648] __bread_gfp+0x110/0x220 [ 165.045865][T12648] isofs_fill_super+0x9c5/0x1940 [ 165.050813][T12648] ? register_shrinker_prepared+0xdf/0xf0 [ 165.056541][T12648] ? set_blocksize+0x197/0x2a0 [ 165.061339][T12648] mount_bdev+0x1e8/0x290 13:57:06 executing program 2: ioctl$TCXONC(0xffffffffffffffff, 0x5416, 0x2) 13:57:06 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5425, 0x2) [ 165.065743][T12648] ? isofs_mount+0x40/0x40 [ 165.070320][T12648] ? _isofs_bmap+0x30/0x30 [ 165.074739][T12648] isofs_mount+0x2d/0x40 [ 165.078984][T12648] legacy_get_tree+0x70/0xc0 [ 165.083580][T12648] vfs_get_tree+0x4a/0x1a0 [ 165.088006][T12648] path_mount+0x11d6/0x1ce0 [ 165.092665][T12648] __se_sys_mount+0x23d/0x2e0 [ 165.097345][T12648] ? mntput+0x45/0x70 [ 165.101528][T12648] ? __fpregs_load_activate+0x103/0x1b0 [ 165.107111][T12648] __x64_sys_mount+0x63/0x70 [ 165.111724][T12648] do_syscall_64+0x4a/0x90 [ 165.116146][T12648] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 165.122047][T12648] RIP: 0033:0x467b1a [ 165.126043][T12648] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 165.145718][T12648] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 165.154221][T12648] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a 13:57:06 executing program 2: ioctl$TCXONC(0xffffffffffffffff, 0x5416, 0x2) [ 165.162209][T12648] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 165.165376][T12647] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 165.170254][T12648] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 165.170276][T12648] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 165.179595][T12665] loop5: detected capacity change from 0 to 264192 [ 165.187338][T12648] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:57:06 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x2) 13:57:06 executing program 3 (fault-call:3 fault-nth:73): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:06 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000018, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 165.204400][T12647] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 165.230301][T12648] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:06 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x2) 13:57:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 165.357268][T12694] loop3: detected capacity change from 0 to 136 [ 165.378843][T12698] loop4: detected capacity change from 0 to 264192 [ 165.408956][T12694] FAULT_INJECTION: forcing a failure. [ 165.408956][T12694] name failslab, interval 1, probability 0, space 0, times 0 [ 165.422050][T12694] CPU: 1 PID: 12694 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 165.431089][T12694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.441878][T12694] Call Trace: [ 165.445161][T12694] dump_stack+0x137/0x19d [ 165.451140][T12694] should_fail+0x23c/0x250 [ 165.456408][T12694] ? mempool_alloc_slab+0x16/0x20 [ 165.461477][T12694] __should_failslab+0x81/0x90 [ 165.466248][T12694] should_failslab+0x5/0x20 [ 165.470832][T12694] kmem_cache_alloc+0x46/0x2e0 [ 165.475599][T12694] ? PageHuge+0x59/0xc0 [ 165.479789][T12694] mempool_alloc_slab+0x16/0x20 [ 165.484656][T12694] ? mempool_free+0x130/0x130 [ 165.489417][T12694] mempool_alloc+0x8c/0x300 [ 165.493931][T12694] bio_alloc_bioset+0xcc/0x480 [ 165.498738][T12694] submit_bh_wbc+0x130/0x330 [ 165.503329][T12694] __bread_gfp+0x110/0x220 [ 165.507777][T12694] isofs_fill_super+0x9c5/0x1940 [ 165.512819][T12694] ? register_shrinker_prepared+0xdf/0xf0 [ 165.518656][T12694] ? set_blocksize+0x197/0x2a0 [ 165.523523][T12694] mount_bdev+0x1e8/0x290 [ 165.528022][T12694] ? isofs_mount+0x40/0x40 [ 165.532518][T12694] ? _isofs_bmap+0x30/0x30 [ 165.536963][T12694] isofs_mount+0x2d/0x40 [ 165.541212][T12694] legacy_get_tree+0x70/0xc0 [ 165.545809][T12694] vfs_get_tree+0x4a/0x1a0 [ 165.550246][T12694] path_mount+0x11d6/0x1ce0 [ 165.554849][T12694] __se_sys_mount+0x23d/0x2e0 [ 165.559667][T12694] ? mntput+0x45/0x70 [ 165.563668][T12694] __x64_sys_mount+0x63/0x70 [ 165.568366][T12694] do_syscall_64+0x4a/0x90 [ 165.572853][T12694] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 165.578801][T12694] RIP: 0033:0x467b1a [ 165.582693][T12694] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 165.602535][T12694] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 165.611056][T12694] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 165.619029][T12694] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 165.627002][T12694] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 165.634988][T12694] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 165.642968][T12694] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 165.673923][T12698] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 165.688583][T12694] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 165.707591][T12707] loop5: detected capacity change from 0 to 264192 13:57:07 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5427, 0x2) 13:57:07 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x2) 13:57:07 executing program 3 (fault-call:3 fault-nth:74): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 165.720489][T12698] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 165.744815][T12698] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:07 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5428, 0x2) 13:57:07 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x5416, 0x2) [ 165.870038][T12725] loop3: detected capacity change from 0 to 136 13:57:07 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000019, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 165.925980][T12730] loop5: detected capacity change from 0 to 264192 [ 165.942096][T12725] FAULT_INJECTION: forcing a failure. [ 165.942096][T12725] name failslab, interval 1, probability 0, space 0, times 0 [ 165.955970][T12725] CPU: 0 PID: 12725 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 165.965544][T12725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.975710][T12725] Call Trace: [ 165.978989][T12725] dump_stack+0x137/0x19d [ 165.983347][T12725] should_fail+0x23c/0x250 [ 165.983372][T12725] ? mempool_alloc_slab+0x16/0x20 [ 165.992811][T12725] __should_failslab+0x81/0x90 [ 165.997668][T12725] should_failslab+0x5/0x20 [ 166.002293][T12725] kmem_cache_alloc+0x46/0x2e0 [ 166.007172][T12725] ? PageHuge+0x59/0xc0 [ 166.011373][T12725] mempool_alloc_slab+0x16/0x20 [ 166.016539][T12725] ? mempool_free+0x130/0x130 [ 166.021220][T12725] mempool_alloc+0x8c/0x300 13:57:07 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x5416, 0x2) 13:57:07 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5429, 0x2) [ 166.025824][T12725] bio_alloc_bioset+0xcc/0x480 [ 166.030617][T12725] submit_bh_wbc+0x130/0x330 [ 166.035245][T12725] __bread_gfp+0x110/0x220 [ 166.039659][T12725] isofs_fill_super+0x9c5/0x1940 [ 166.044604][T12725] ? register_shrinker_prepared+0xdf/0xf0 [ 166.050323][T12725] ? set_blocksize+0x197/0x2a0 [ 166.055085][T12725] mount_bdev+0x1e8/0x290 [ 166.059413][T12725] ? isofs_mount+0x40/0x40 [ 166.063837][T12725] ? _isofs_bmap+0x30/0x30 [ 166.068369][T12725] isofs_mount+0x2d/0x40 [ 166.072613][T12725] legacy_get_tree+0x70/0xc0 [ 166.077205][T12725] vfs_get_tree+0x4a/0x1a0 [ 166.081648][T12725] path_mount+0x11d6/0x1ce0 [ 166.086180][T12725] __se_sys_mount+0x23d/0x2e0 [ 166.090879][T12725] ? mntput+0x45/0x70 [ 166.094861][T12725] ? __fpregs_load_activate+0x103/0x1b0 [ 166.100426][T12725] __x64_sys_mount+0x63/0x70 [ 166.105107][T12725] do_syscall_64+0x4a/0x90 [ 166.109523][T12725] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 166.115442][T12725] RIP: 0033:0x467b1a [ 166.119334][T12725] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 166.138942][T12725] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 166.147397][T12725] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 166.155420][T12725] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 166.163398][T12725] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 13:57:07 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x5416, 0x2) 13:57:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 166.171435][T12725] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 166.179403][T12725] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:57:07 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x542e, 0x2) [ 166.223694][T12757] loop4: detected capacity change from 0 to 264192 [ 166.242910][T12757] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 166.256381][T12725] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:07 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) 13:57:07 executing program 3 (fault-call:3 fault-nth:75): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 166.277345][T12757] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 166.307836][T12757] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:07 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400001b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:07 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x542f, 0x2) 13:57:07 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = gettid() r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000300)=""/88, 0x58}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/85, 0x55}], 0x3, 0xd9f, 0x0) clone3(&(0x7f0000000280)={0xc0000200, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x34}, &(0x7f0000000180)=""/67, 0x43, &(0x7f0000000200)=""/45, &(0x7f0000000240)=[r0], 0x1, {r1}}, 0x58) [ 166.343785][T12770] loop5: detected capacity change from 0 to 264192 [ 166.378132][T12780] loop3: detected capacity change from 0 to 136 [ 166.392624][T12780] FAULT_INJECTION: forcing a failure. [ 166.392624][T12780] name failslab, interval 1, probability 0, space 0, times 0 [ 166.405340][T12780] CPU: 1 PID: 12780 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 166.413756][T12780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.423843][T12780] Call Trace: [ 166.427124][T12780] dump_stack+0x137/0x19d [ 166.431464][T12780] should_fail+0x23c/0x250 [ 166.435890][T12780] ? mempool_alloc_slab+0x16/0x20 [ 166.440928][T12780] __should_failslab+0x81/0x90 [ 166.445817][T12780] should_failslab+0x5/0x20 [ 166.450374][T12780] kmem_cache_alloc+0x46/0x2e0 [ 166.455155][T12780] ? PageHuge+0x59/0xc0 [ 166.459386][T12780] mempool_alloc_slab+0x16/0x20 [ 166.464241][T12780] ? mempool_free+0x130/0x130 [ 166.468996][T12780] mempool_alloc+0x8c/0x300 [ 166.473501][T12780] bio_alloc_bioset+0xcc/0x480 [ 166.478278][T12780] ? __cond_resched+0x11/0x40 [ 166.482983][T12780] submit_bh_wbc+0x130/0x330 [ 166.487592][T12780] __bread_gfp+0x110/0x220 [ 166.492004][T12780] isofs_fill_super+0x9c5/0x1940 [ 166.496956][T12780] ? register_shrinker_prepared+0xdf/0xf0 [ 166.502680][T12780] ? set_blocksize+0x197/0x2a0 [ 166.507524][T12780] mount_bdev+0x1e8/0x290 [ 166.511860][T12780] ? isofs_mount+0x40/0x40 [ 166.516310][T12780] ? _isofs_bmap+0x30/0x30 [ 166.520728][T12780] isofs_mount+0x2d/0x40 [ 166.524974][T12780] legacy_get_tree+0x70/0xc0 [ 166.529598][T12780] vfs_get_tree+0x4a/0x1a0 [ 166.534049][T12780] path_mount+0x11d6/0x1ce0 [ 166.538554][T12780] __se_sys_mount+0x23d/0x2e0 [ 166.543233][T12780] ? mntput+0x45/0x70 [ 166.547214][T12780] __x64_sys_mount+0x63/0x70 [ 166.551875][T12780] do_syscall_64+0x4a/0x90 [ 166.556291][T12780] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 166.562246][T12780] RIP: 0033:0x467b1a [ 166.566136][T12780] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 166.585750][T12780] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:57:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:08 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5437, 0x2) 13:57:08 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000400), r0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00032709000000dbdf250400000008000200070000000800020005000000"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x800) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10500421}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x8c, r1, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_ADDR={0x44, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:08 executing program 3 (fault-call:3 fault-nth:76): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 166.594225][T12780] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 166.602194][T12780] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 166.610166][T12780] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 166.618154][T12780] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 166.626121][T12780] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 166.636263][T12780] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:08 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5441, 0x2) [ 166.722494][T12804] loop5: detected capacity change from 0 to 264192 [ 166.753497][T12811] loop3: detected capacity change from 0 to 136 [ 166.796213][T12811] FAULT_INJECTION: forcing a failure. [ 166.796213][T12811] name failslab, interval 1, probability 0, space 0, times 0 [ 166.808884][T12811] CPU: 1 PID: 12811 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 166.817380][T12811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.827434][T12811] Call Trace: [ 166.830712][T12811] dump_stack+0x137/0x19d [ 166.835047][T12811] should_fail+0x23c/0x250 [ 166.839491][T12811] ? mempool_alloc_slab+0x16/0x20 [ 166.844522][T12811] __should_failslab+0x81/0x90 [ 166.849365][T12811] should_failslab+0x5/0x20 [ 166.853881][T12811] kmem_cache_alloc+0x46/0x2e0 [ 166.858827][T12811] ? PageHuge+0x59/0xc0 [ 166.862995][T12811] mempool_alloc_slab+0x16/0x20 [ 166.869225][T12811] ? mempool_free+0x130/0x130 [ 166.873908][T12811] mempool_alloc+0x8c/0x300 [ 166.878433][T12811] bio_alloc_bioset+0xcc/0x480 [ 166.883255][T12811] ? __cond_resched+0x11/0x40 [ 166.887965][T12811] submit_bh_wbc+0x130/0x330 [ 166.892567][T12811] __bread_gfp+0x110/0x220 [ 166.896993][T12811] isofs_fill_super+0x9c5/0x1940 [ 166.900608][T12831] loop2: detected capacity change from 0 to 264192 [ 166.901943][T12811] ? register_shrinker_prepared+0xdf/0xf0 [ 166.901972][T12811] ? set_blocksize+0x197/0x2a0 [ 166.919177][T12811] mount_bdev+0x1e8/0x290 [ 166.923627][T12811] ? isofs_mount+0x40/0x40 [ 166.928058][T12811] ? _isofs_bmap+0x30/0x30 [ 166.932490][T12811] isofs_mount+0x2d/0x40 [ 166.936793][T12811] legacy_get_tree+0x70/0xc0 [ 166.941410][T12811] vfs_get_tree+0x4a/0x1a0 [ 166.945823][T12811] path_mount+0x11d6/0x1ce0 [ 166.950328][T12811] __se_sys_mount+0x23d/0x2e0 [ 166.955000][T12811] ? mntput+0x45/0x70 [ 166.959065][T12811] ? __fpregs_load_activate+0x103/0x1b0 [ 166.964611][T12811] __x64_sys_mount+0x63/0x70 [ 166.969207][T12811] do_syscall_64+0x4a/0x90 [ 166.973628][T12811] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 166.979539][T12811] RIP: 0033:0x467b1a 13:57:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x11000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:08 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f00000011c0)=[{&(0x7f0000000140)="34de7a9fae9253769d9f9e19d6952ee6e20d176c8bf57280185372d1fcf47aba0921e9938b0dba3d8bd64cc186a75ea1bcdd584005c45a9ffcf70af7540578f7d0f78333f08bdffc5d4c9cc172a833706361337f033a549c0024ee99ab3bc5a8f5f63fabedfdc81a29e148925a5bc3e8f91b8a10661c1b5c17cdd08285b0d634d8a62486928acffb911372c08e3791084a2533ff50db64d493b1beac8dc3fecc7a45f538c1f062b39afa464ba83690c8bf9dfd0c5596faf1c98790841106feb23bebd7be3991da07c8406fb5782eb0869e848112382394d2fe6ff08be22c0b317f64c8194dec1801d934aaf56a5201b8c539b390445edd3117bd3db80c29037f51b81f1007327ccc8ec73354a3b5aaf1e0ed9a4509e4d35bdcc2262edaf0bc9848af4500d09fcdb99099afdf849aea98878cf8eb1b046cc1fd76530ceb8d512528e47691fcb5e72f475e84f9c915fa523b32c305241ebcc8f443f70536d11e1d2f20994ecf810d1132d084b63a3cd3a26e3066546ce4ed8a74e845f010a33b59864dd42343787f4f5dd190df0803425e1a1b535a5457cb01df2e27cf7c88c8fdaebb7972fb9a8a48e6dad456c64f4da2ee0ead4e0d4f266da6ab542cea01cbf17c1da4c302283935e559c4ec15d3f0792d5aa512189ec462bf6d6b941d11f029054923ca8dcf7067b2ec08528a1851b5c9477218dc9dfd79cc0820fa3cb4c224741da1a2c3b7545876b202ed86ee26ec2b8d22dafceaff17d0f3ff1a8f721239307c43ccca94e1179a60c7761e14f431c1cfed287aefa7e7619cc62415cb4f56464cb6e3c9659c9a2c72e6c2dec013dfd0e8fb0cdb436346ea5fa7c64971b22e31b6d1719877945967935ccd9b65b7002a468d254341022665a4a281aab5f6dcc357c4f26227227961c1aacb986e44f737df8dd9e89d187c4667c9e5e480fb12569d4e43e63453294e7bef9978aff82b5fe13b7dad4f368a6cd47380928cf743982db99b4bd56a504eef3dae88adeac50c072e0adf1d855103b6dc499ceb07c91f52e0389de89a5576312efacbaf1a3a4e394874a5f2a303197098951688e5ccfabe8034093e5198731253c831cc7c82c2722af638bda91edf063613f385a162d7034c5b6cd6f1c75840a978483ff8b0beb28f7bef5f66df868aebaaa2294673968ae93b1592f1811c0c91307617841590f9dcfb41a697b457692af3ebe13f6497eff8033f570ff10e1db44a7cf363931cccfbdb556cd3711b8dc136be58fe00b06f475dc410fb92bf1484261b954d7e68bc43dff7cee820efb4ce9559e9946ddcad70898ed0cd5fdaca6193fadfd2364519a37361a2fc486c4581266b97cc284bf82f0afeba60695bf18baebc652e6573ff8226803960df3994df4e51c3077112e02a71835f6de2239496e44ddf4a21e573ac358f68ea79839d01aa8394adc8f5c8ab440e303a8adeedc75fe5642ad3daa70c8e8330abf743c73e3ecafcbdf99f66352d1f72f38e78a4f34be7e4fecebc7c1565fa3038b134c4d4c6893969fdf9e27d1d4b5fc618cb8edd75c3f4de0fbb08a2c5d8120cbd893d06cde5393bf833319b9fb296fe0d665a56b1e212cd6bf1b9caf4ed3e6fe0e50d3744bc8e2d94106098c56f37836dd1e204df4bb38abfd09e98c14c6cf85d2e853899f26bec94ca1f9f0c4493681492d677ac566cc86455d7ba4ccdf216b7bf8191aa04ac0d03ec168a3beaf6fb64dbc9131d8b2397f76ed81d734c00e0c50dfd733663b242f1bd37f2e54da3b2c1a0e35f78bc96ba3e50a0ba130f9bdbb449ec797a6448f2a0bf33b79369e39138f573377a597cbf0ca93145589345bba75f516e59ebdca7c30194435863ee80fae78076c6ebb5c2ca00cd71154ba4c3f74554ee8f37eead1d209db4b34d9486aee362bea076a373b7374256230fee62df896424f3fda8c0d8ce3c3dab042aaa80cfdd05379a62bbfe6b5e28d45d5bb5de149c6e4a368374a56f3d1536cbde05c7208e868084b43eeb469fdb8724d51609f8bc8ca60992272049b9d9ad543dee1569c0b6afb076817c8da61ae1b2dc47c07ebdca628e96d060534edaf9a3dce424d574cc0e9e683f2ad0e7f1e0a7be6816f29c00d1758a234867b636e28448939fda92248ecbb130abad0016e9b336c3a2766f79b961500396ebc02a49e3dcfbb67faa807459377f37ba62a71935662bfe7d7799a31126a40b04d93c4313f4ae1799ea002abf19421ac384bac492c4cdba8ec7cec88af226d5aa2b3ff475b886e78bdb393c6f81109291cdd2441b370e094ce40d4234236b697fe28665534a7940cd50c30957287b9a80dbcac0dcb022ee480e1bd034585b5b65a18b474651ea2d8307e8552e3452312285a2106603903a8bf4550fb9edb238cdc4bc27e6ebeee297d5324f9ae7a2e328ec7eb2c061fb7852708d9be8ec6fb5ae2945cd77b1eaad1bd46eac745c02c21a1d43c83713bdc9320cb8889ccbfc4f8a68ad60172b2c39f9f67c4c85ff49f3e7ff77834f7ca5c125132b17fab745fbcb4d0c5b7c1b4b5679ed1bcf252ab4586da50cf73bf994ba3710558420673b6b4e449e911031cb06c8919425c6a91d13e4224c8844f3babc150c2163dc010bff51b569086745866e9dee3f8b5e44317675643e4e90516dcfd405569d856122d0c648613b27ad70037c845f67bef42f159ac53b19aa0ff1d8923baaaee5feec7d2ec3332eaf5caa096fbed50785f7225c29d6b7d7eb0a492f8172971f44dc5273ced738f0a4ecb2739d4a94cbb32ca4e97b24e7cc1549cb7846bcc930f85bc0701f659882dc6be1ca5658a828fea4eadb13d7fda3292c8ffe4a891ea52fe801710030540ea73ddbdd57b88d3c3ddbb743ef66efd2362e3425f6869d85deac1f93adc0adccc13d920f81dcc2db8d7b34d3a1e52ebf37c4dcc913434faa66f68b08a7489fb0d41f1e692f041ff3ed60910b53402546507848bda3c8620aafeaf285c91a05d0d0d793944e399aed150dadb900679e1c3e2ae8fcde16a7a1dc61db1c37a0ae212b8b07ec7a5479afd50498dc336d6196a253abee7b1627708d63ff33efd6084e0e59268ac3936669c72819af01e887c6f27d1739d03d875ffaabcccd8768ca2c8f72f1d40abaae06a0556ee340a01b5428b2f6fe58ab8cc9ee1f9624cc01893a168f8a99c909c5215974f5404be9267432fe5929d97228dd8059ff4f7c9f1f44f51359130632df4dd9811923f7a340bb11377866d2adc8462aef148407ab8dd6be2510ccfa29d6386d8190487f2b726e2dbcb6e47f0f78abc8fd30e3fce7b3a6712172f79e82f0c40668b9a526ea10d6c491e95176e78cbcbee9b01c7300a13d717cb141b41f15e809f9ded984419d544d7699b9a77a5195a55b0878060dc21b38898161eafae6cdcb91ba48c24397e91bc0453ffdcfd99a171070e721d1ff71c86d5a737f0f3ced19ab76e4563b5f4d42c8163b96e4f7426bd3276a646af0ef0b78ecb4280fc9e5a42b224232c6b75a7efd42c6da60583368c225352ba1dc430198b67382b7124bbd1d3431e9071b344907671dd573b7aa2045f124047f18d6d1dd07c8e7af79aed4a3b5292634760a4e3e42db859e5124292cf4e8fa2f93e5a8c4aa16b167787b73ced98fa8ee78a31f899d5688c459ce932df1afae18ae4fd90e870c3d2838764fb3d843bafa8adcd30120bc81bd271fad07dab9d57af9b7149f6e410a0324ca98762c9f8263d3d76ba6a1a8c852a5f495298c8b9a320d5f92df861b956a55de10d92ea95e35ccfadf145394a53aa44cc45699629161f46b093a2974431cc3c6fba91bc327461850ea102bfe3ce219ebd80b3040fe5b0c3025d65c647531d10c50188c28d203872f1af375cacbd0b0a5477f4859e2e0e8e2e686e9bc1a54102e37009f59a38d387e97ac873189a927a0aebc512407f256298e70922ab03bdc7fd339f4f20c8c450a53e817d8066e0e7459a1703d91f161057d40124d9633a4f279980f35891684bb989ec202c13e30679a09f3a59132298e32aa2266604de5b242896e3d99d58ce14e3338607e6505b8cf4f0255e2d93e7fef2d1426ee600a01a1c72bd15c16350bee8c0641eed24a4ebaacfa334b103991fd7c729cd19e8b127525720cb60da03b1b48c4062b0d151edc41bc2b9112dc3e1b520cf11795feaab57dfcc04da238b8fdf38ba05cd0d882afacc58fc4c8848acc9c51df1e51cb23e4b6e5b5819cb059a7bf9004dec6c6766859919335951fbfb99b555fc4b29e7c3602c80b9d7aca03a22bc6e68cf3ef273ea8e8c02ba3ff00ebf1200741c697414b25a0a75f674099f1a4ab280fa77e4752fba3595dfd7b51833f9d3fe7d054b39f7ce3a203494cdf03bf06edaeef670cb49fcd3bd7655985544e1245b9d389ed84cf3adcadac67739699c7f8d917f805f733ad72bdb1ab5ebf55fc2010f814da5b8578298959e48dbd320899c44084332d96af2501effbddcf99a3b7a8674ebd1d933ca321c4b3591a9ad3fb612b6d1e4067d42025655c7a4aa255012e638365d1b48477251ceeaf3f3b0e8dae3eb5abb28f36d23a465a4c576b3595a4819b70f8db4c48f297a0f0306e441a32c345604d71417fe88ffb42392dda266f34a5d6509603f0c9028ffed40c30fa9a68ff62d3d0645a6c91e6d43dcca00a024fb9ead15a6b0f0743f3e91116ef5de95bb16f4c7c659f036c98656f4e08205ae1b4ce60df23765de52d9545f909691098769c32e8d5c682eb2b3266ec7b2042be1d9f0d53f871c810e4f132db809cefe17337aad6f342cf03d6f5e328c47733b697cb3eec26bafe03bcfe47d62d038f1e6d6e7bcbc20a1aeb5f61cdd0809fcd6932fecb3ccc383c85ab937c919b64f5d8cee8c71038cdd54b52e5033d01334946ddafa8aea56ef5b246aaae8203d467341b53b5d40a6751639bdedc5362fdeeb83f5672dd6093e8705149d95eac2368eed0551df20f98582b289d6ca30a16b8bdd6bb85bf7ef88c88cb178bfd330534855281180dc19402a540aa50e1fd47909813b4e0cf91b1fca54ae3c7c96cfddadbd2699797e92fd78bcec08563f60eafb47f96253132e73cb3c53f240053e7e720571c27f272580b7ca5e6309a59cd1bae14ad9efaf373414cefce5e2cd2081431e65b47f6142314c811d0e253e3c2628622bf5c4b7e53aa0f9cc8998e51d31fb1feeac6e24684b87955403ee41615d3e3d20cea5f6dc65366ca6220d4be2e8e3476e79d9978a39d960bffe28ed655387fc653b801ede5793cbee87fca35db4b414cd5e355206220a1100600aaa213cc7b0e77d92efd93c135f05911e5ed263e72eb6ded22036282e34e20e27c15558bb6acede85996315c0c8443373f9f6c4125dc16225adfa35de80315bae0ff6268b8eb24369d85e7b0f1557fe65f6eab864544c54316a1ccf856f2a24ffc5e107f754bca44e3dfdbc6787bff2ec97d29d1f515cc0867b11a7638f5ff6cfe26c31c8cf7a8b22be33c5b9b7b79f26095f3361a10e77d0354600527202d9bff36d557ce1cb7b6b2051c6708b122e6d2b0cc1d13f66f3cc2eb81bf42740c16a2afabb4d3805fcaea59a369e50f9a39474d26ad497f04f4c026f0b17f98314e9cf400ecacd3843b960a41b382873ddb622ac536acb67129ab44bce94f32a11043426891e30d8bc20a0f1f66dda057dd2eae323239e98a439b39177e2096be2a9285bb907070b7aab95a40e72e76cab27ee10b2d5a9e73fe21266c7caef187803873e8b21fd584c5c7c9d555a493b198bdb46696840ba0f84005d6", 0x1000, 0x9}, {&(0x7f0000001140)="5d64c59cb7a3a4a9893c49a0cc00fb20c6ff4fca69bd547b3807ef15e8a239e035e7a8b09a8b865f3da3424f80fda0045a486e0d0fb674bfe6e19b45cc5af0a8258c49cff0b70fb551054f0ae8f607fd11b02a37b34f9fe2dda735c837", 0x5d, 0x400}], 0x1024, &(0x7f0000001200)={[{@check_relaxed}, {}, {@nojoliet}, {@check_strict}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\x92^^'}}, {@dont_measure}]}) 13:57:08 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000e, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 166.983426][T12811] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 167.003038][T12811] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 167.011467][T12811] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 167.019441][T12811] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 167.027412][T12811] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 167.035438][T12811] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 167.043416][T12811] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 13:57:08 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5450, 0x2) [ 167.075563][T12831] EXT4-fs (loop2): Test dummy encryption mount option ignored [ 167.076687][T12811] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 167.083278][T12792] loop4: detected capacity change from 0 to 264192 [ 167.095624][T12831] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 167.111579][T12841] loop5: detected capacity change from 0 to 264192 [ 167.127051][T12792] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 167.160871][T12839] loop1: detected capacity change from 0 to 8 [ 167.168924][T12792] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 167.178983][T12831] EXT4-fs (loop2): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 167.197293][T12792] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:08 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000021, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:08 executing program 3 (fault-call:3 fault-nth:77): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:08 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5451, 0x2) 13:57:08 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5441, 0x2) 13:57:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x12000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:08 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5452, 0x2) [ 167.266527][T12859] loop1: detected capacity change from 0 to 8 13:57:08 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x3, &(0x7f0000000040)=0x4, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_send_signal(0xffffffffffffffff, 0x4, &(0x7f0000000100)={0x1c, 0x7}, 0x0) set_mempolicy(0x0, &(0x7f0000000180)=0x8, 0x7) [ 167.359618][T12873] loop5: detected capacity change from 0 to 264192 [ 167.367562][T12871] loop3: detected capacity change from 0 to 136 13:57:08 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) [ 167.404998][T12871] FAULT_INJECTION: forcing a failure. [ 167.404998][T12871] name failslab, interval 1, probability 0, space 0, times 0 [ 167.417777][T12871] CPU: 1 PID: 12871 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 167.426251][T12871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.426266][T12871] Call Trace: [ 167.426274][T12871] dump_stack+0x137/0x19d [ 167.443981][T12871] should_fail+0x23c/0x250 [ 167.448426][T12871] ? mempool_alloc_slab+0x16/0x20 13:57:08 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000022, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 167.453458][T12871] __should_failslab+0x81/0x90 [ 167.458229][T12871] should_failslab+0x5/0x20 [ 167.462735][T12871] kmem_cache_alloc+0x46/0x2e0 [ 167.467502][T12871] ? PageHuge+0x59/0xc0 [ 167.471689][T12871] mempool_alloc_slab+0x16/0x20 [ 167.476550][T12871] ? mempool_free+0x130/0x130 [ 167.481227][T12871] mempool_alloc+0x8c/0x300 [ 167.485787][T12871] bio_alloc_bioset+0xcc/0x480 [ 167.490616][T12871] ? __cond_resched+0x11/0x40 [ 167.495372][T12871] submit_bh_wbc+0x130/0x330 [ 167.500037][T12871] __bread_gfp+0x110/0x220 [ 167.504526][T12871] isofs_fill_super+0x9c5/0x1940 [ 167.508808][T12900] FAULT_INJECTION: forcing a failure. [ 167.508808][T12900] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 167.509470][T12871] ? register_shrinker_prepared+0xdf/0xf0 [ 167.528161][T12871] ? set_blocksize+0x197/0x2a0 [ 167.532944][T12871] mount_bdev+0x1e8/0x290 [ 167.537309][T12871] ? isofs_mount+0x40/0x40 [ 167.541834][T12871] ? _isofs_bmap+0x30/0x30 [ 167.546246][T12871] isofs_mount+0x2d/0x40 [ 167.550540][T12871] legacy_get_tree+0x70/0xc0 [ 167.555129][T12871] vfs_get_tree+0x4a/0x1a0 [ 167.559543][T12871] path_mount+0x11d6/0x1ce0 [ 167.564105][T12871] __se_sys_mount+0x23d/0x2e0 [ 167.568781][T12871] ? mntput+0x45/0x70 [ 167.572756][T12871] ? __fpregs_load_activate+0x103/0x1b0 [ 167.578379][T12871] __x64_sys_mount+0x63/0x70 [ 167.583005][T12871] do_syscall_64+0x4a/0x90 [ 167.587484][T12871] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.593376][T12871] RIP: 0033:0x467b1a [ 167.597278][T12871] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 167.617287][T12871] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 167.625795][T12871] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 167.633768][T12871] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 167.641754][T12871] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 13:57:09 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5453, 0x2) [ 167.649726][T12871] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 167.657694][T12871] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 167.665668][T12900] CPU: 0 PID: 12900 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 167.674136][T12900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.684224][T12900] Call Trace: [ 167.687501][T12900] dump_stack+0x137/0x19d [ 167.688567][T12871] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 167.691833][T12900] should_fail+0x23c/0x250 13:57:09 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5459, 0x2) [ 167.691857][T12900] should_fail_usercopy+0x16/0x20 [ 167.709374][T12900] _copy_to_user+0x1c/0x90 [ 167.713877][T12900] simple_read_from_buffer+0xab/0x120 [ 167.719289][T12900] proc_fail_nth_read+0xf6/0x140 [ 167.724253][T12900] ? rw_verify_area+0x136/0x250 [ 167.729164][T12900] ? proc_fault_inject_write+0x200/0x200 [ 167.734802][T12900] vfs_read+0x154/0x5d0 [ 167.738969][T12900] ? selinux_file_ioctl+0x8e0/0x970 [ 167.744169][T12900] ? __fget_light+0x21b/0x260 [ 167.748843][T12900] ? __cond_resched+0x11/0x40 [ 167.753285][T12901] loop4: detected capacity change from 0 to 264192 [ 167.753575][T12900] ksys_read+0xce/0x180 [ 167.764197][T12900] __x64_sys_read+0x3e/0x50 [ 167.768704][T12900] do_syscall_64+0x4a/0x90 [ 167.773125][T12900] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.779042][T12900] RIP: 0033:0x41937c [ 167.780471][T12901] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:09 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x545c, 0x2) [ 167.782958][T12900] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 167.782977][T12900] RSP: 002b:00007faf0968c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 167.782997][T12900] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041937c [ 167.783009][T12900] RDX: 000000000000000f RSI: 00007faf0968c1e0 RDI: 0000000000000004 [ 167.783020][T12900] RBP: 00007faf0968c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 167.783031][T12900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 13:57:09 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) [ 167.783042][T12900] R13: 00007fffa44bee0f R14: 00007faf0968c300 R15: 0000000000022000 13:57:09 executing program 3 (fault-call:3 fault-nth:78): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:09 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000025, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:09 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x2, 0x0) 13:57:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:cpu_online_t:s0\x00', 0x22) r1 = fsopen(&(0x7f0000000100)='ntfs\x00', 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x4004f506, &(0x7f0000000140)) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 167.886345][T12901] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 167.901340][T12901] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 167.947273][T12927] loop3: detected capacity change from 0 to 136 [ 167.964436][T12927] FAULT_INJECTION: forcing a failure. [ 167.964436][T12927] name failslab, interval 1, probability 0, space 0, times 0 [ 167.977200][T12927] CPU: 0 PID: 12927 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 167.979478][T12933] loop5: detected capacity change from 0 to 264192 13:57:09 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x4b47, 0x0) [ 167.985634][T12927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.985657][T12927] Call Trace: [ 167.985665][T12927] dump_stack+0x137/0x19d [ 167.985692][T12927] should_fail+0x23c/0x250 [ 167.985711][T12927] ? mempool_alloc_slab+0x16/0x20 [ 168.019322][T12927] __should_failslab+0x81/0x90 [ 168.024116][T12927] should_failslab+0x5/0x20 [ 168.028658][T12927] kmem_cache_alloc+0x46/0x2e0 [ 168.033477][T12927] ? PageHuge+0x59/0xc0 [ 168.037643][T12927] mempool_alloc_slab+0x16/0x20 [ 168.042498][T12927] ? mempool_free+0x130/0x130 [ 168.047172][T12927] mempool_alloc+0x8c/0x300 [ 168.051779][T12927] bio_alloc_bioset+0xcc/0x480 [ 168.056610][T12927] ? __cond_resched+0x11/0x40 [ 168.061331][T12927] submit_bh_wbc+0x130/0x330 [ 168.065924][T12927] __bread_gfp+0x110/0x220 [ 168.070333][T12927] isofs_fill_super+0x9c5/0x1940 [ 168.075435][T12927] ? register_shrinker_prepared+0xdf/0xf0 [ 168.081232][T12927] ? set_blocksize+0x197/0x2a0 [ 168.085976][T12927] mount_bdev+0x1e8/0x290 [ 168.090351][T12927] ? isofs_mount+0x40/0x40 [ 168.094749][T12927] ? _isofs_bmap+0x30/0x30 [ 168.099246][T12927] isofs_mount+0x2d/0x40 [ 168.103523][T12927] legacy_get_tree+0x70/0xc0 [ 168.108151][T12927] vfs_get_tree+0x4a/0x1a0 [ 168.112554][T12927] path_mount+0x11d6/0x1ce0 [ 168.117060][T12927] __se_sys_mount+0x23d/0x2e0 [ 168.121733][T12927] ? mntput+0x45/0x70 [ 168.125726][T12927] ? __fpregs_load_activate+0x103/0x1b0 [ 168.131276][T12927] __x64_sys_mount+0x63/0x70 [ 168.135870][T12927] do_syscall_64+0x4a/0x90 [ 168.140282][T12927] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.146188][T12927] RIP: 0033:0x467b1a [ 168.150061][T12927] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.169684][T12927] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 168.178221][T12927] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 168.186296][T12927] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 13:57:09 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x8000, &(0x7f0000000040)=0x5, 0x80000001) socket$inet_tcp(0x2, 0x1, 0x0) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$inet6(0xa, 0x2, 0x81) 13:57:09 executing program 3 (fault-call:3 fault-nth:79): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 168.194285][T12927] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 168.202381][T12927] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 168.210331][T12927] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 168.224419][T12927] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 168.287907][T12947] loop4: detected capacity change from 0 to 264192 [ 168.304039][T12963] loop3: detected capacity change from 0 to 136 [ 168.310788][T12947] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 168.320168][T12963] FAULT_INJECTION: forcing a failure. [ 168.320168][T12963] name failslab, interval 1, probability 0, space 0, times 0 13:57:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20100000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:09 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x4b49, 0x0) [ 168.332849][T12963] CPU: 0 PID: 12963 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 168.341289][T12963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.351345][T12963] Call Trace: [ 168.354620][T12963] dump_stack+0x137/0x19d [ 168.358959][T12963] should_fail+0x23c/0x250 [ 168.363479][T12963] ? mempool_alloc_slab+0x16/0x20 [ 168.368512][T12963] __should_failslab+0x81/0x90 [ 168.373329][T12963] should_failslab+0x5/0x20 [ 168.377912][T12963] kmem_cache_alloc+0x46/0x2e0 [ 168.382720][T12963] ? PageHuge+0x59/0xc0 [ 168.383809][T12947] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 168.386903][T12963] mempool_alloc_slab+0x16/0x20 [ 168.386930][T12963] ? mempool_free+0x130/0x130 [ 168.405621][T12963] mempool_alloc+0x8c/0x300 [ 168.410176][T12963] bio_alloc_bioset+0xcc/0x480 [ 168.414947][T12963] ? __cond_resched+0x11/0x40 [ 168.415517][T12974] loop5: detected capacity change from 0 to 264192 [ 168.419730][T12963] submit_bh_wbc+0x130/0x330 [ 168.419754][T12963] __bread_gfp+0x110/0x220 [ 168.427886][T12947] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 168.430817][T12963] isofs_fill_super+0x9c5/0x1940 [ 168.453239][T12963] ? register_shrinker_prepared+0xdf/0xf0 [ 168.458977][T12963] ? set_blocksize+0x197/0x2a0 [ 168.463797][T12963] mount_bdev+0x1e8/0x290 [ 168.468207][T12963] ? isofs_mount+0x40/0x40 [ 168.472678][T12963] ? _isofs_bmap+0x30/0x30 [ 168.477094][T12963] isofs_mount+0x2d/0x40 [ 168.481344][T12963] legacy_get_tree+0x70/0xc0 [ 168.485937][T12963] vfs_get_tree+0x4a/0x1a0 [ 168.490348][T12963] path_mount+0x11d6/0x1ce0 [ 168.494866][T12963] __se_sys_mount+0x23d/0x2e0 [ 168.499540][T12963] ? mntput+0x45/0x70 [ 168.503525][T12963] ? __fpregs_load_activate+0x103/0x1b0 [ 168.509122][T12963] __x64_sys_mount+0x63/0x70 [ 168.513713][T12963] do_syscall_64+0x4a/0x90 [ 168.518149][T12963] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.524039][T12963] RIP: 0033:0x467b1a [ 168.527927][T12963] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.547540][T12963] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 168.555956][T12963] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 168.563945][T12963] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 [ 168.571919][T12963] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 168.579894][T12963] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 168.587863][T12963] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 168.617349][T12963] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x545d, 0x2) 13:57:10 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5409, 0x0) 13:57:10 executing program 3 (fault-call:3 fault-nth:80): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:10 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400002b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:10 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x8000, &(0x7f0000000040)=0x6, 0x5) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x22000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5460, 0x2) [ 168.753306][T13002] loop3: detected capacity change from 0 to 136 [ 168.769676][T13007] loop4: detected capacity change from 0 to 264192 [ 168.774380][T13009] loop5: detected capacity change from 0 to 264192 [ 168.822579][T13007] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 168.832956][T13002] FAULT_INJECTION: forcing a failure. [ 168.832956][T13002] name failslab, interval 1, probability 0, space 0, times 0 [ 168.844712][T13007] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 168.845602][T13002] CPU: 1 PID: 13002 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 168.855428][T13007] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 168.863102][T13002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.863114][T13002] Call Trace: [ 168.863143][T13002] dump_stack+0x137/0x19d [ 168.863165][T13002] should_fail+0x23c/0x250 [ 168.898188][T13002] ? mempool_alloc_slab+0x16/0x20 [ 168.903238][T13002] __should_failslab+0x81/0x90 [ 168.908048][T13002] should_failslab+0x5/0x20 [ 168.912652][T13002] kmem_cache_alloc+0x46/0x2e0 [ 168.917421][T13002] ? PageHuge+0x59/0xc0 13:57:10 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x1, &(0x7f0000000040)=0x32f, 0x8000) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0xfffffffc}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdce, {r0}}, 0xa8) 13:57:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x25000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:10 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400002e, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x40049409, 0x2) [ 168.921597][T13002] mempool_alloc_slab+0x16/0x20 [ 168.926452][T13002] ? mempool_free+0x130/0x130 [ 168.931124][T13002] mempool_alloc+0x8c/0x300 [ 168.935627][T13002] bio_alloc_bioset+0xcc/0x480 [ 168.940395][T13002] submit_bh_wbc+0x130/0x330 [ 168.944999][T13002] __bread_gfp+0x110/0x220 [ 168.949419][T13002] isofs_fill_super+0x9c5/0x1940 [ 168.954408][T13002] ? register_shrinker_prepared+0xdf/0xf0 [ 168.960129][T13002] ? set_blocksize+0x197/0x2a0 [ 168.964922][T13002] mount_bdev+0x1e8/0x290 13:57:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x40086602, 0x2) 13:57:10 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffe0c) [ 168.969252][T13002] ? isofs_mount+0x40/0x40 [ 168.973678][T13002] ? _isofs_bmap+0x30/0x30 [ 168.978098][T13002] isofs_mount+0x2d/0x40 [ 168.982371][T13002] legacy_get_tree+0x70/0xc0 [ 168.987040][T13002] vfs_get_tree+0x4a/0x1a0 [ 168.991524][T13002] path_mount+0x11d6/0x1ce0 [ 168.996037][T13002] __se_sys_mount+0x23d/0x2e0 [ 169.000729][T13002] ? mntput+0x45/0x70 [ 169.004708][T13002] ? __fpregs_load_activate+0x103/0x1b0 [ 169.010342][T13002] __x64_sys_mount+0x63/0x70 [ 169.014951][T13002] do_syscall_64+0x4a/0x90 [ 169.019375][T13002] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.025299][T13002] RIP: 0033:0x467b1a [ 169.029193][T13002] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.048825][T13002] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 169.057258][T13002] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b1a [ 169.065316][T13002] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4f4c085000 13:57:10 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x0) [ 169.073306][T13002] RBP: 00007f4f4c085040 R08: 00007f4f4c085040 R09: 0000000020000000 [ 169.081287][T13002] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 169.089262][T13002] R13: 0000000020000100 R14: 00007f4f4c085000 R15: 0000000020000080 [ 169.114819][T13002] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 169.134752][T13044] loop5: detected capacity change from 0 to 264192 13:57:10 executing program 3 (fault-call:3 fault-nth:81): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x40087602, 0x2) 13:57:10 executing program 1: set_mempolicy(0x8000, &(0x7f0000000040)=0xc, 0x4) r0 = clone3(&(0x7f0000000080)={0x1ae325400, 0x0, 0x0, 0x0, {0x80000}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = gettid() ptrace$setregs(0xd, r0, 0x3b, &(0x7f0000000300)="bf9bb61fd74455b493e91e60498fecee92c4f61d54129e03ad66875de02871f2335bc4d977989de7b9f5c981dbcda60b607f67c74bed89f4b74dde4cd23dda0cc8de662abeb3aaa74c97f98dc0f307b03d") tkill(r1, 0x1000000000013) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000014c0)=0x0) r3 = gettid() tkill(r3, 0x1000000000013) clone3(&(0x7f0000001540)={0x80000, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x3c}, &(0x7f0000000440)=""/106, 0x6a, &(0x7f00000004c0)=""/4096, &(0x7f0000001500)=[r2, r3, r1, r0, r1, r1], 0x6}, 0x58) r4 = gettid() r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000280)={0x20800800, &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140), {0xf}, &(0x7f0000000180)=""/89, 0x59, &(0x7f0000000200)=""/21, &(0x7f0000000240)=[r1, r4], 0x2, {r5}}, 0x58) 13:57:10 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540c, 0x0) [ 169.159380][T13052] loop4: detected capacity change from 0 to 264192 [ 169.170223][T13052] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 169.190502][T13052] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:10 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540d, 0x0) 13:57:10 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000032, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 169.203935][T13052] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x26010000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x401c5820, 0x2) 13:57:10 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5412, 0x0) 13:57:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x4020940d, 0x2) [ 169.292161][T13072] loop3: detected capacity change from 0 to 136 [ 169.319985][T13072] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 169.342468][T13087] loop5: detected capacity change from 0 to 264192 13:57:10 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5413, 0x0) 13:57:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x80045432, 0x2) [ 169.383043][T13072] FAULT_INJECTION: forcing a failure. [ 169.383043][T13072] name failslab, interval 1, probability 0, space 0, times 0 [ 169.395690][T13072] CPU: 1 PID: 13072 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 169.400964][T13093] loop4: detected capacity change from 0 to 264192 [ 169.404113][T13072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.404127][T13072] Call Trace: [ 169.404135][T13072] dump_stack+0x137/0x19d [ 169.404162][T13072] should_fail+0x23c/0x250 [ 169.432664][T13072] __should_failslab+0x81/0x90 [ 169.437442][T13072] ? kobject_uevent_env+0x1a7/0xc40 [ 169.442717][T13072] should_failslab+0x5/0x20 [ 169.447255][T13072] kmem_cache_alloc_trace+0x49/0x310 [ 169.452531][T13072] ? kernfs_put+0x2e2/0x300 [ 169.457138][T13072] ? rb_erase+0x4bb/0x750 [ 169.461560][T13072] ? kernfs_put+0x39/0x300 [ 169.465965][T13072] ? dev_uevent_filter+0x70/0x70 [ 169.470887][T13072] kobject_uevent_env+0x1a7/0xc40 [ 169.475912][T13072] ? __kernfs_remove+0x678/0x6a0 [ 169.480974][T13072] ? kernfs_find_ns+0x30d/0x320 [ 169.485919][T13072] ? kernfs_put+0x39/0x300 [ 169.490324][T13072] kobject_uevent+0x18/0x20 [ 169.494909][T13072] __loop_clr_fd+0x439/0x650 [ 169.499485][T13072] lo_ioctl+0x9eb/0x11f0 [ 169.503719][T13072] ? ___cache_free+0x3c/0x300 [ 169.508436][T13072] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 169.513737][T13072] ? call_rcu+0x259/0x6c0 [ 169.518054][T13072] ? kfree+0xf0/0x1d0 [ 169.522053][T13072] ? avc_has_extended_perms+0x5d8/0x7b0 [ 169.527585][T13072] ? isofs_mount+0x40/0x40 [ 169.532001][T13072] ? kfree+0xf0/0x1d0 [ 169.535988][T13072] ? blkdev_common_ioctl+0x9c3/0x1040 [ 169.541343][T13072] ? selinux_file_ioctl+0x8e0/0x970 [ 169.546538][T13072] ? lo_release+0x120/0x120 [ 169.551021][T13072] blkdev_ioctl+0x1d0/0x3c0 [ 169.555517][T13072] block_ioctl+0x6d/0x80 [ 169.559844][T13072] ? blkdev_iopoll+0x70/0x70 [ 169.564476][T13072] __se_sys_ioctl+0xcb/0x140 [ 169.569219][T13072] __x64_sys_ioctl+0x3f/0x50 [ 169.573960][T13072] do_syscall_64+0x4a/0x90 [ 169.578468][T13072] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.584390][T13072] RIP: 0033:0x4663b7 [ 169.588325][T13072] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.607929][T13072] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 169.616332][T13072] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004663b7 [ 169.624284][T13072] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 13:57:11 executing program 3 (fault-call:3 fault-nth:82): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x27010000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 169.632239][T13072] RBP: 00007f4f4c0856bc R08: 00007f4f4c085040 R09: 0000000020000000 [ 169.640191][T13072] R10: 0000000000000001 R11: 0000000000000246 R12: ffffffffffffffff [ 169.648146][T13072] R13: 0000000000000016 R14: 00007f4f4c085000 R15: 0000000020000080 [ 169.689938][T13093] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 169.720207][T13109] loop3: detected capacity change from 0 to 136 [ 169.730476][T13109] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 169.731878][T13093] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 169.756535][T13118] loop5: detected capacity change from 0 to 264192 [ 169.763405][T13109] FAULT_INJECTION: forcing a failure. [ 169.763405][T13109] name failslab, interval 1, probability 0, space 0, times 0 [ 169.772870][T13093] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 169.776116][T13109] CPU: 1 PID: 13109 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 169.797467][T13109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.807513][T13109] Call Trace: [ 169.810773][T13109] dump_stack+0x137/0x19d [ 169.815252][T13109] should_fail+0x23c/0x250 [ 169.819711][T13109] __should_failslab+0x81/0x90 [ 169.824487][T13109] should_failslab+0x5/0x20 [ 169.828974][T13109] kmem_cache_alloc_node+0x55/0x2c0 [ 169.834161][T13109] ? __alloc_skb+0xed/0x420 [ 169.838646][T13109] __alloc_skb+0xed/0x420 [ 169.843017][T13109] alloc_uevent_skb+0x5b/0x120 [ 169.847768][T13109] kobject_uevent_env+0x863/0xc40 [ 169.852792][T13109] ? kernfs_put+0x2e2/0x300 [ 169.857290][T13109] kobject_uevent+0x18/0x20 [ 169.861777][T13109] __loop_clr_fd+0x439/0x650 [ 169.866357][T13109] lo_ioctl+0x9eb/0x11f0 [ 169.870670][T13109] ? ___cache_free+0x3c/0x300 [ 169.875344][T13109] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 169.880621][T13109] ? call_rcu+0x259/0x6c0 [ 169.885022][T13109] ? kfree+0xf0/0x1d0 [ 169.888982][T13109] ? avc_has_extended_perms+0x5d8/0x7b0 [ 169.894516][T13109] ? isofs_mount+0x40/0x40 [ 169.898914][T13109] ? kfree+0xf0/0x1d0 [ 169.902920][T13109] ? blkdev_common_ioctl+0x9c3/0x1040 [ 169.908273][T13109] ? selinux_file_ioctl+0x8e0/0x970 [ 169.913462][T13109] ? lo_release+0x120/0x120 [ 169.917944][T13109] blkdev_ioctl+0x1d0/0x3c0 [ 169.922444][T13109] block_ioctl+0x6d/0x80 [ 169.926684][T13109] ? blkdev_iopoll+0x70/0x70 [ 169.931275][T13109] __se_sys_ioctl+0xcb/0x140 [ 169.935846][T13109] __x64_sys_ioctl+0x3f/0x50 [ 169.940435][T13109] do_syscall_64+0x4a/0x90 [ 169.944843][T13109] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.950781][T13109] RIP: 0033:0x4663b7 [ 169.954691][T13109] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.974296][T13109] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 169.982691][T13109] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004663b7 [ 169.990662][T13109] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 169.998641][T13109] RBP: 00007f4f4c0856bc R08: 00007f4f4c085040 R09: 0000000020000000 [ 170.006612][T13109] R10: 0000000000000001 R11: 0000000000000246 R12: ffffffffffffffff [ 170.014562][T13109] R13: 0000000000000016 R14: 00007f4f4c085000 R15: 0000000020000080 13:57:13 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/253, 0xfd}, {&(0x7f0000000040)=""/35, 0x23}, {&(0x7f0000000200)=""/153, 0x99}, {&(0x7f00000002c0)=""/175, 0xaf}, {&(0x7f0000000380)=""/202, 0xca}, {&(0x7f0000000480)=""/59, 0x3b}], 0x6, 0x54, 0xd6) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:13 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x80045440, 0x2) 13:57:13 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5414, 0x0) 13:57:13 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000048, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:13 executing program 3 (fault-call:3 fault-nth:83): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x30010000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:13 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5415, 0x0) [ 172.266516][T13137] loop5: detected capacity change from 0 to 264192 [ 172.273236][T13141] loop3: detected capacity change from 0 to 136 [ 172.281595][T13144] loop4: detected capacity change from 0 to 264192 [ 172.298449][T13144] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:13 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x80086601, 0x2) 13:57:13 executing program 1: bind(0xffffffffffffffff, &(0x7f0000000100)=@generic={0xb, "68fbe4728c73d077a2d0ffdea197bcf0f6097f22d9dab1523ac11388db60e6cf9fd79d4f7fbc31f08b94c53c43d181d50d44ab07bdc0767bd734f5ad9406f746a740d58196e4353ca12e64173b394f0d1d6e18a32fff4dd1b4eb5ab6300197ccee6baac328558cbe3d59ea54f38ab6705b1d6677d68f636a460142475b33"}, 0x80) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x306152300, 0x0, 0x0, 0x0, {0x22}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 172.316738][T13141] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 172.368609][T13144] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 172.382311][T13141] FAULT_INJECTION: forcing a failure. [ 172.382311][T13141] name failslab, interval 1, probability 0, space 0, times 0 [ 172.393648][T13144] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 172.394959][T13141] CPU: 0 PID: 13141 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 172.416341][T13141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.426396][T13141] Call Trace: [ 172.429673][T13141] dump_stack+0x137/0x19d [ 172.434005][T13141] should_fail+0x23c/0x250 [ 172.438423][T13141] __should_failslab+0x81/0x90 [ 172.443186][T13141] should_failslab+0x5/0x20 [ 172.447690][T13141] kmem_cache_alloc_node_trace+0x5b/0x2e0 [ 172.453439][T13141] ? __kmalloc_node_track_caller+0x30/0x40 [ 172.459291][T13141] __kmalloc_node_track_caller+0x30/0x40 [ 172.464929][T13141] ? alloc_uevent_skb+0x5b/0x120 [ 172.469874][T13141] __alloc_skb+0x187/0x420 [ 172.474452][T13141] alloc_uevent_skb+0x5b/0x120 [ 172.479274][T13141] kobject_uevent_env+0x863/0xc40 [ 172.484299][T13141] ? kernfs_put+0x39/0x300 [ 172.488773][T13141] kobject_uevent+0x18/0x20 [ 172.493359][T13141] __loop_clr_fd+0x439/0x650 [ 172.497949][T13141] lo_ioctl+0x9eb/0x11f0 [ 172.502185][T13141] ? ___cache_free+0x3c/0x300 [ 172.506979][T13141] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 172.512282][T13141] ? call_rcu+0x259/0x6c0 13:57:13 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) ioctl$FIONCLEX(r0, 0x5450) 13:57:13 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5417, 0x0) 13:57:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:13 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x80087601, 0x2) 13:57:13 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400004c, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:13 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x801c581f, 0x2) 13:57:13 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5418, 0x0) [ 172.516640][T13141] ? kfree+0xf0/0x1d0 [ 172.520737][T13141] ? avc_has_extended_perms+0x5d8/0x7b0 [ 172.521701][T13178] loop5: detected capacity change from 0 to 264192 [ 172.526293][T13141] ? isofs_mount+0x40/0x40 [ 172.526321][T13141] ? kfree+0xf0/0x1d0 [ 172.526340][T13141] ? blkdev_common_ioctl+0x9c3/0x1040 [ 172.546525][T13141] ? selinux_file_ioctl+0x8e0/0x970 [ 172.551731][T13141] ? lo_release+0x120/0x120 [ 172.556234][T13141] blkdev_ioctl+0x1d0/0x3c0 [ 172.560740][T13141] block_ioctl+0x6d/0x80 [ 172.564984][T13141] ? blkdev_iopoll+0x70/0x70 [ 172.569571][T13141] __se_sys_ioctl+0xcb/0x140 [ 172.574161][T13141] __x64_sys_ioctl+0x3f/0x50 [ 172.578856][T13141] do_syscall_64+0x4a/0x90 [ 172.583270][T13141] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 172.589199][T13141] RIP: 0033:0x4663b7 [ 172.593083][T13141] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:57:14 executing program 3 (fault-call:3 fault-nth:84): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:14 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x80285442, 0x2) 13:57:14 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x541b, 0x0) 13:57:14 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x541d, 0x0) 13:57:14 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x90, 0x453, 0x200, 0x70bd2a, 0x25dfdbfe, "3e9bb47b85d17d0ef305c3f659baeb3d766d3fd78b7da7090342ed84e29978e90fdd18eac0bb72ab836573591153defef224dcadf721ee72a44a67d3866a8eed3a259cde89bcfc664a9b8eaba9bf620f2c3c4f8ee8ab76725a5d89da5db95ef1f2c702cfe069bf5782dd44b69d4c7269838e867a853f6367f0bb5dd0ae3c10", [""]}, 0x90}, 0x1, 0x0, 0x0, 0x4004041}, 0x4048014) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000280)={0x220208480, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 172.612901][T13141] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 172.621331][T13141] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004663b7 [ 172.629311][T13141] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 172.637304][T13141] RBP: 00007f4f4c0856bc R08: 00007f4f4c085040 R09: 0000000020000000 [ 172.645307][T13141] R10: 0000000000000001 R11: 0000000000000246 R12: ffffffffffffffff [ 172.653282][T13141] R13: 0000000000000016 R14: 00007f4f4c085000 R15: 0000000020000080 13:57:14 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0xc0045878, 0x2) 13:57:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:14 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x541e, 0x0) 13:57:14 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x8000, &(0x7f0000000040), 0x7fff) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0xfffffffffffffdfc, 0x0, 0x0}, 0x58) preadv(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x81) [ 172.764270][T13208] loop3: detected capacity change from 0 to 136 [ 172.774738][T13208] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 172.793522][T13206] loop4: detected capacity change from 0 to 264192 [ 172.803436][T13217] loop5: detected capacity change from 0 to 264192 [ 172.814682][T13206] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 172.833803][T13208] FAULT_INJECTION: forcing a failure. [ 172.833803][T13208] name failslab, interval 1, probability 0, space 0, times 0 [ 172.846554][T13208] CPU: 1 PID: 13208 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 172.854976][T13208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 13:57:14 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000060, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:14 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0xc0045878, 0x2) 13:57:14 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x541e, 0x0) [ 172.865028][T13208] Call Trace: [ 172.868300][T13208] dump_stack+0x137/0x19d [ 172.869567][T13206] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 172.872633][T13208] should_fail+0x23c/0x250 [ 172.872662][T13208] __should_failslab+0x81/0x90 [ 172.886560][T13206] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 172.891023][T13208] should_failslab+0x5/0x20 [ 172.908932][T13208] kmem_cache_alloc_node_trace+0x5b/0x2e0 [ 172.914941][T13208] ? __kmalloc_node_track_caller+0x30/0x40 [ 172.920844][T13208] __kmalloc_node_track_caller+0x30/0x40 [ 172.926479][T13208] ? alloc_uevent_skb+0x5b/0x120 [ 172.931546][T13208] __alloc_skb+0x187/0x420 [ 172.935967][T13208] alloc_uevent_skb+0x5b/0x120 [ 172.940816][T13208] kobject_uevent_env+0x863/0xc40 [ 172.945862][T13208] ? kernfs_put+0x2e2/0x300 [ 172.950363][T13208] kobject_uevent+0x18/0x20 [ 172.954912][T13208] __loop_clr_fd+0x439/0x650 [ 172.959705][T13208] lo_ioctl+0x9eb/0x11f0 [ 172.963946][T13208] ? ___cache_free+0x3c/0x300 [ 172.968937][T13208] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 172.974204][T13208] ? call_rcu+0x259/0x6c0 [ 172.978515][T13208] ? kfree+0xf0/0x1d0 [ 172.982519][T13208] ? avc_has_extended_perms+0x5d8/0x7b0 [ 172.988046][T13208] ? isofs_mount+0x40/0x40 [ 172.992479][T13208] ? kfree+0xf0/0x1d0 [ 172.996458][T13208] ? blkdev_common_ioctl+0x9c3/0x1040 [ 173.001964][T13208] ? selinux_file_ioctl+0x8e0/0x970 [ 173.007159][T13208] ? lo_release+0x120/0x120 [ 173.011668][T13208] blkdev_ioctl+0x1d0/0x3c0 [ 173.016226][T13208] block_ioctl+0x6d/0x80 [ 173.020450][T13208] ? blkdev_iopoll+0x70/0x70 [ 173.025017][T13208] __se_sys_ioctl+0xcb/0x140 [ 173.029587][T13208] __x64_sys_ioctl+0x3f/0x50 [ 173.034187][T13208] do_syscall_64+0x4a/0x90 [ 173.038590][T13208] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 173.044485][T13208] RIP: 0033:0x4663b7 [ 173.048421][T13208] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 173.068160][T13208] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 173.076560][T13208] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004663b7 [ 173.084554][T13208] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 173.092523][T13208] RBP: 00007f4f4c0856bc R08: 00007f4f4c085040 R09: 0000000020000000 [ 173.100530][T13208] R10: 0000000000000001 R11: 0000000000000246 R12: ffffffffffffffff 13:57:14 executing program 3 (fault-call:3 fault-nth:85): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:14 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000180)={0x1, 0x66, &(0x7f0000000100)="c587544998df7bf4e3d39ed658a77c038810d325ce5fd6a6b0248ccffce863dff794a5df4857f65673c2ee2232a1fb2f983bb6d12bd6e50955552c96381cf66c34c594a07dfe9cdb283a1e8f55c1a9a88bb7ddde2de94224ee86f11e7b776d230bcd0847a259"}) fsopen(&(0x7f0000000040)='ubifs\x00', 0x1) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:14 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5421, 0x0) 13:57:14 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0xc0189436, 0x2) 13:57:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000800, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 173.108649][T13208] R13: 0000000000000016 R14: 00007f4f4c085000 R15: 0000000020000080 13:57:14 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0xc020660b, 0x2) 13:57:14 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5423, 0x0) 13:57:14 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0xc0285443, 0x2) [ 173.180646][T13247] loop4: detected capacity change from 0 to 264192 [ 173.196472][T13247] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 173.202731][T13250] loop5: detected capacity change from 0 to 264192 [ 173.210691][T13251] loop3: detected capacity change from 0 to 136 [ 173.213998][T13247] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 173.263821][T13251] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:14 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000068, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:14 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 13:57:14 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x4000, &(0x7f0000000100)=0x7fffffff, 0x3) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) set_mempolicy(0x1, &(0x7f0000000040)=0xdf5, 0x5) set_mempolicy(0x0, &(0x7f0000000140)=0x3ff, 0x100) [ 173.313430][T13247] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 173.351801][T13279] loop5: detected capacity change from 0 to 264192 [ 173.372198][T13251] FAULT_INJECTION: forcing a failure. [ 173.372198][T13251] name failslab, interval 1, probability 0, space 0, times 0 [ 173.384877][T13251] CPU: 0 PID: 13251 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 173.393292][T13251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.403346][T13251] Call Trace: [ 173.406650][T13251] dump_stack+0x137/0x19d [ 173.410988][T13251] should_fail+0x23c/0x250 [ 173.415402][T13251] __should_failslab+0x81/0x90 [ 173.420186][T13251] ? call_usermodehelper_setup+0x81/0x160 [ 173.425908][T13251] should_failslab+0x5/0x20 [ 173.430412][T13251] kmem_cache_alloc_trace+0x49/0x310 [ 173.435864][T13251] ? add_uevent_var+0x16e/0x1c0 [ 173.440733][T13251] ? __kfree_skb+0xfe/0x150 [ 173.445239][T13251] call_usermodehelper_setup+0x81/0x160 [ 173.450820][T13251] ? add_uevent_var+0x1c0/0x1c0 [ 173.455685][T13251] kobject_uevent_env+0xb29/0xc40 [ 173.460766][T13251] ? kernfs_put+0x39/0x300 [ 173.465206][T13251] kobject_uevent+0x18/0x20 [ 173.469766][T13251] __loop_clr_fd+0x439/0x650 [ 173.474356][T13251] lo_ioctl+0x9eb/0x11f0 [ 173.478595][T13251] ? ___cache_free+0x3c/0x300 [ 173.483282][T13251] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 173.488728][T13251] ? call_rcu+0x259/0x6c0 [ 173.493065][T13251] ? kfree+0xf0/0x1d0 [ 173.497098][T13251] ? avc_has_extended_perms+0x5d8/0x7b0 [ 173.502663][T13251] ? isofs_mount+0x40/0x40 [ 173.507102][T13251] ? kfree+0xf0/0x1d0 [ 173.511104][T13251] ? blkdev_common_ioctl+0x9c3/0x1040 [ 173.516478][T13251] ? selinux_file_ioctl+0x8e0/0x970 [ 173.521680][T13251] ? lo_release+0x120/0x120 [ 173.526234][T13251] blkdev_ioctl+0x1d0/0x3c0 [ 173.530737][T13251] block_ioctl+0x6d/0x80 [ 173.535053][T13251] ? blkdev_iopoll+0x70/0x70 [ 173.539739][T13251] __se_sys_ioctl+0xcb/0x140 [ 173.544596][T13251] __x64_sys_ioctl+0x3f/0x50 [ 173.549187][T13251] do_syscall_64+0x4a/0x90 [ 173.553663][T13251] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 173.559591][T13251] RIP: 0033:0x4663b7 [ 173.563477][T13251] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 173.583171][T13251] RSP: 002b:00007f4f4c084fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 173.591601][T13251] RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004663b7 [ 173.599690][T13251] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 173.607658][T13251] RBP: 00007f4f4c0856bc R08: 00007f4f4c085040 R09: 0000000020000000 [ 173.615624][T13251] R10: 0000000000000001 R11: 0000000000000246 R12: ffffffffffffffff 13:57:15 executing program 3 (fault-call:3 fault-nth:86): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:15 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5424, 0x0) [ 173.623598][T13251] R13: 0000000000000016 R14: 00007f4f4c085000 R15: 0000000020000080 13:57:15 executing program 0: ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)={0x1, 'veth0_macvtap\x00', {}, 0x3}) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:15 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x5}, 0x0, 0x0, 0x0, 0x0}, 0x58) set_mempolicy(0x4000, &(0x7f0000000040)=0xc94, 0xff) 13:57:15 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5425, 0x0) 13:57:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:15 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x101040, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)={0x6, 0x2, 0x4, 0x3f, 0x6, "34212cc7080bc4cfba327f049c8130ad11f40b"}) ioctl$TCXONC(r0, 0x540a, 0x3) 13:57:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x58313fba, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 173.774031][T13300] loop3: detected capacity change from 0 to 136 [ 173.786870][T13308] loop4: detected capacity change from 0 to 264192 [ 173.792454][T13300] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 173.796090][T13309] loop5: detected capacity change from 0 to 264192 [ 173.827512][T13308] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 173.843285][T13300] FAULT_INJECTION: forcing a failure. [ 173.843285][T13300] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 173.856368][T13300] CPU: 1 PID: 13300 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 173.864795][T13300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.874894][T13300] Call Trace: [ 173.878174][T13300] dump_stack+0x137/0x19d [ 173.882518][T13300] should_fail+0x23c/0x250 [ 173.886966][T13300] should_fail_usercopy+0x16/0x20 [ 173.892007][T13300] _copy_to_user+0x1c/0x90 [ 173.896633][T13300] simple_read_from_buffer+0xab/0x120 [ 173.902033][T13300] proc_fail_nth_read+0xf6/0x140 [ 173.907040][T13300] ? rw_verify_area+0x136/0x250 [ 173.911984][T13300] ? proc_fault_inject_write+0x200/0x200 [ 173.917690][T13300] vfs_read+0x154/0x5d0 [ 173.921851][T13300] ? __fput+0x43e/0x4e0 [ 173.926006][T13300] ? __fget_light+0x21b/0x260 [ 173.930681][T13300] ? __cond_resched+0x11/0x40 [ 173.935400][T13300] ksys_read+0xce/0x180 [ 173.939559][T13300] __x64_sys_read+0x3e/0x50 [ 173.944061][T13300] do_syscall_64+0x4a/0x90 [ 173.948488][T13300] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 173.954443][T13300] RIP: 0033:0x41937c [ 173.958333][T13300] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 13:57:15 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5427, 0x0) [ 173.977965][T13300] RSP: 002b:00007f4f4c085170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 173.986487][T13300] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041937c [ 173.994474][T13300] RDX: 000000000000000f RSI: 00007f4f4c0851e0 RDI: 0000000000000004 [ 174.002448][T13300] RBP: 00007f4f4c0851d0 R08: 0000000000000000 R09: 0000000020000000 [ 174.010415][T13300] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000002 [ 174.018906][T13300] R13: 00007ffd1b7e8b5f R14: 00007f4f4c085300 R15: 0000000000022000 13:57:15 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400006c, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:15 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000000)) 13:57:15 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x3, &(0x7f0000000040)=0x4, 0x20) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:15 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5428, 0x0) [ 174.058071][T13308] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 174.085173][T13308] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:15 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db910ca694fe73f34600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TCXONC(r0, 0x540a, 0x1) 13:57:15 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5437, 0x0) [ 174.155241][T13330] loop5: detected capacity change from 0 to 264192 13:57:15 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) write(r0, &(0x7f0000000000)="2efb1ee44dc321c8da840ae56651b0c1346e38edc50aa1f41e6a044ae9aa0684", 0x20) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000080)=0x200) 13:57:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:15 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000040)={@remote, 0x0}, &(0x7f0000000100)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl2\x00', r0, 0x2f, 0x1f, 0x2, 0x1f, 0x6, @ipv4={'\x00', '\xff\xff', @remote}, @empty, 0x700, 0x7, 0xfff, 0x401}}) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r3, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @link_local}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000240)={'ip6_vti0\x00', r3, 0x4, 0x81, 0x1, 0x9, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1, 0x8, 0x7fffffff, 0x7}}) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x2, &(0x7f0000000200)=0x9, 0x100000000) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 174.226821][T13347] loop3: detected capacity change from 0 to 136 [ 174.240153][T13347] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 174.250999][T13356] loop4: detected capacity change from 0 to 264192 13:57:15 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5441, 0x0) [ 174.322184][T13356] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 174.325908][T13373] device lo entered promiscuous mode [ 174.348368][T13371] device lo left promiscuous mode [ 174.361174][T13379] loop3: detected capacity change from 0 to 136 13:57:15 executing program 0: timer_gettime(0x0, &(0x7f0000000000)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x72200, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r1, 0x4e07395c43ed6921, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:15 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) r0 = clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = gettid() tkill(r1, 0x1000000000013) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)=0x0) r3 = gettid() tkill(r3, 0x1000000000013) r4 = getpid() r5 = syz_open_dev$vcsu(&(0x7f0000000340), 0x9, 0x8000) clone3(&(0x7f0000000380)={0x60031200, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x3e}, &(0x7f0000000180)=""/164, 0xa4, &(0x7f0000000240)=""/122, &(0x7f0000000300)=[r0, r1, r0, 0x0, r0, r2, r3, r4], 0x8, {r5}}, 0x58) 13:57:15 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000074, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:15 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5450, 0x0) [ 174.361194][T13378] loop5: detected capacity change from 0 to 264192 [ 174.372150][T13373] device lo entered promiscuous mode [ 174.374358][T13356] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 174.379520][T13371] device lo left promiscuous mode [ 174.399998][T13379] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 174.412961][T13356] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:15 executing program 0: ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x82, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f00000000c0)={0xffffffff, 0x4, 0xfff, 0x4, 0x3, "c108a0b35624cf5a93e54bd5fca7622772e60b"}) 13:57:15 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5451, 0x0) [ 174.542778][T13410] loop4: detected capacity change from 0 to 264192 [ 174.549605][T13411] loop5: detected capacity change from 0 to 264192 [ 174.585816][T13410] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 174.608691][T13417] loop3: detected capacity change from 0 to 136 [ 174.620985][T13410] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6f150000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:16 executing program 0: sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x24}, 0x1, 0x0, 0x0, 0x24044000}, 0x40000) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_SEC_LEVEL={0xc, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x2000c880}, 0x4004011) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x50, r1, 0xd2c5000) 13:57:16 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400007a, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:16 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5452, 0x0) [ 174.641472][T13410] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 174.645274][T13417] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:16 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x545d, 0x0) [ 174.711353][T13432] loop5: detected capacity change from 0 to 264192 [ 174.791629][T13454] loop4: detected capacity change from 0 to 264192 [ 174.815413][T13454] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 174.825503][T13454] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 174.837776][T13454] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:18 executing program 1: set_mempolicy(0x4000, &(0x7f0000000000)=0x1, 0x1) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) set_mempolicy(0x4000, &(0x7f0000000040)=0x3, 0x9) clone3(&(0x7f0000000080)={0x1a7865000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:18 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0xf55, 0xffffffffffffffff, &(0x7f0000000080)="37b208aa0e81f7c2c3923af0dd889241680d68d307817fb3ade2499ec2eed7179735cd1125c51e227316815037b4e9b91d6f8dcce3c909f78632cd97039efe59b62c0430f084506c518f7c5488cda09103db5122d24c1d3ee98640085e87e27d08f0b088dc4d2092d09e7766390ccd9ecd015bf673ac9f9f04d5efb1f930396954bb0d3c52d6ce48ffa50027e0ecb8983989461ec0dda9fe60587251419bf17767b96e4cd44a7ddc497201ebc317294b5fcee2a85880de4599cc2ed50757328c4f9f4a8f9a0406fe620993a45cf4bffac894972e557df81b3433ab360f55c44d95ecc6a0f898ceda289d205ae39ae0f628555063d0639198d7", 0xf9, 0x9ec, 0x0, 0x2, r0}, &(0x7f00000001c0)) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/74}) r2 = openat$cgroup_procs(r0, &(0x7f0000001540)='cgroup.threads\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001580)={0x0, r1, 0x5a, 0x9, 0x7ff, 0x7ff}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x4708c0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000001500)={0x0, @adiantum, 0x0, @desc1}) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) preadv(r4, &(0x7f00000013c0)=[{&(0x7f0000000200)=""/149, 0x95}, {&(0x7f00000002c0)=""/188, 0xbc}, {&(0x7f0000000380)=""/60, 0x3c}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x4, 0x6, 0x3) fadvise64(r3, 0x0, 0x1f, 0x5) 13:57:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:18 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5460, 0x0) 13:57:18 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400009d, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:18 executing program 0: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000080)={0x0, 0x0, "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", "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"}) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write(r0, &(0x7f0000000000)="a1aed1e6e88cc7a7a9017d764f676502aea66a7eac5a4e1f13f69426e5da5fac12ed709b5ec3546d1ca88c019e8012a1fd14e2787828cf190c2ebd0645e325", 0x3f) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:18 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x40049409, 0x0) [ 177.502108][T13469] loop4: detected capacity change from 0 to 264192 [ 177.521730][T13474] loop3: detected capacity change from 0 to 136 [ 177.528286][T13469] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 177.536442][T13475] loop5: detected capacity change from 0 to 264192 13:57:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:18 executing program 0: creat(&(0x7f0000000040)='./file0\x00', 0x10) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x777680, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r3 = syz_open_pts(r2, 0x0) dup2(r3, r2) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000000)={0x8, 0x0, 0xfffffbff, 0x0, 0x20, "850e32db99baeb0600002200"}) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000140)=0x10) r5 = syz_open_pts(r1, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) lseek(r6, 0x76, 0x3) dup2(r5, r1) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 177.571809][T13474] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 177.580437][T13469] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:18 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x40086602, 0x0) 13:57:19 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400009e, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:19 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x3, &(0x7f0000000040)=0x428, 0x5) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000100)="5b79f9e676a3729e40ec0a2559304e997d85d7729d7ed1800ec373cb7bd12c72a4f9f91eaeb9b905e50304f990169dc1d95696f40cb9a72484a403ee0151512018a127e53d14d715714f48b075a43f536aa6e5cc1e2e23c9f498c599d6ea382505fc92996ddbde24382773471e4620e9803ab45b534b109965a02f42aa3cdc115347d9c190d98199f4f0f220e7d526bf315635eca162210c063a48aacddc4dbb82716cf16b449e50e51c97d9306a7749a008d7b88a6861c38d8f8539c6cfd23d7cca8166e089ed4a54674f33dea99b6eb529d9495ce1e0c204d935eb2074e685c8b9d91b00000000000000", 0xeb}, {&(0x7f0000000200)="a54f386cd263517f1665966d6cde93a84e9d74e0ec6aee8176a8d0071f7078a6581044aed5f3f4da9e815036c3ae09561dbd4058ab93d3d36af2a634bfc6a193ab802348387f2ed2e558fae0b6e9418337d2c68de0e2e58759cc9f40f40fdf4cd43e504b2879bbbda4c51759b233573e53319b", 0x73}, {&(0x7f0000000280)="9aab13229bc669e2e59e6425571066a135ccd47af026efaaf1e4f9066d15b2fbc2c4c1dcf7421424565dba2c531ef40b216b7b928f49485acb122a9561751b77f55a7166ac24ff1ee0d7f8b7d931f73c297358e5e8d6ac1e824f01db6f7580ae990fc36d63591f438a111f6f23ed2fe42a40505207ebf725be34263b21b685ba511a10545515ced58d1c39761b1176f939c5f41321ea1b1c849515e2c5584b280417b0944751d2482532", 0xaa}], 0x3, 0x4, 0x0) [ 177.610294][T13469] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:19 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x40087602, 0x0) 13:57:19 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x3f, 0x2, 0x3ff, 0x40, 0x8, "c97f0ee7c67cf806d12830f9c9ce8004f81fdd"}) 13:57:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 177.675471][T13510] loop3: detected capacity change from 0 to 136 [ 177.685281][T13510] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:19 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x8000c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:19 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x18200, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 177.775478][T13522] loop5: detected capacity change from 0 to 264192 [ 177.797598][T13537] loop3: detected capacity change from 0 to 136 [ 177.804180][T13538] loop4: detected capacity change from 0 to 264192 13:57:19 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x401c5820, 0x0) 13:57:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x104000, 0x0) r2 = syz_mount_image$iso9660(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x5, 0x9, &(0x7f00000007c0)=[{&(0x7f0000000180)="e53d2f7847967ed63846b87b7e94f1b2bdb09fd08f83cce384711a73527bb2a8f65228701ad5a249bbc8b13c0fcbdc7642474427cee84d4a689befbfe1d5fb5df8c009a923fec42126904d521b13cbbd0cfc5df6574ce68d30ffa91efed80666326e43a0d4c4fe7ec4", 0x69, 0x3}, {&(0x7f0000000200)="f675a28a28ac4c7854f1c0bfa6f09db02602aef1ac58a2e7dec16027495ffbac463f8f006ceab7a8060997d90c08eaae01c85f6e2c9b51962b3a6d1227d76455539fdd49cb12d0dce3530c0ede0bd3a1289accd188e2cd3de251c0c89f75474f16174f38bbf3a35699250d685ba2e9362a6e9f1b1197cd27fda7bca75cec3da2c877d6440aa54dfeb3b360ebb814377eccff97fee84f5a1eb1ea0a3a9824a2ad9e709701da37d8", 0xa7, 0xf069}, {&(0x7f00000002c0)="c00e97ba20f6fc74c398b744825288755217af64e8458d0699fdb9c829c16a870865a1902fc0559e95fa1e5ad0104e10d8af4beeb6f5902e71e3047eff0f2e36b48637fb3775c3d85fbede9e0718d96ad56edb4228775535e95c0d01b82f5757a21c9bcf829940c148e399b61b5544b3121cce543628f4f7b8842b6b2f4ebabb00c1e7a55491e8ef7ef5c89d401836f77f3ce8600de32e91db499395edc4310c48512b497c021b235a62e1a069be0b2148ae9e6fb6e3de8ebefb", 0xba, 0xf439}, {&(0x7f0000000380)="667bc1b5282f020a88052b5c5f5ec9676b45507446c1691e52c63def4fbf3260e118acc2db22675b182c604ff95704ed7ec6254db167758d3f75c3bf248cab34f21695de53ae0d189696f1e8ac78a76919ef31cfa27896612fc4eed63172e630889ec64df1cd4883493955afd1f9b1829fed94b7dde10fc3b54d7e881f45cac4ef3c48a9ef77f530bcbfce06440904dfbce6de4bb1399046fd6b02dbef437d8ce33f0771f828ea77fa769b7e7004e819eb352f8029b8951414164e5c351a93765cb94249d397f6283b4b18b1570ecd32", 0xd0}, {&(0x7f0000000480)="0373877a985300e6dfd18acb0f214c863ce339d49770fe78c2d0f4dce201527e518fc1ba12f506415694a43eb5085a0ca326bbc4c51d6a5be3d66f129bc2311ab10b51649989fab06092a5b2639b1e25bf72f2a386ba62900f443425bba0e6f50983b3f832d7db2541d0d087eded26aec4a456c4fb7b173001cd1824fe3af697434204350df94345cf67c1acd92c8fb5382aa69a32e0d7bfe5e33cfeb2050604c64f49d054972053cf3389f7cf4f0283bd6126e57f63571da9773374df7eca3a660b777fdd9dff2afadb31a97603", 0xce, 0xee1}, {&(0x7f0000000580)="c319ead8042bc151abe2827f01200034a96f8aca2a9e8489a66324eefda824d088068b2a264d5196065671", 0x2b, 0xe5}, {&(0x7f00000005c0)="51ec1ad5e7dddd5de87396295d340673281d2204b6943bdcf0323f801202923cc07cb86dd39543d4d6e14a3d694b8c5dc2e0738a5b5ee1bc85adc2bfedcbc6ee08635f7232e702d0a082e908948e2381fcf6300beaf07f3af4b204de932b678f879c4050b415a4fca6d04791081f5e8f82fee5062af8690844a0b6e7967d8ece4d2e3c0020486e61956cc2abb114b835f29a96ad07fe6795eaf21337a0fe90ffdad46d621df2af98c9ab9b0ed29658d7a937c48fc33224e60a0c0e8b10bf0c12c88e8be2d0fcfd602c55456944ea0d014cee9957eca7bd49ef8b7184b461df37cad273459be4383150fad283d3960441", 0xf0, 0x101}, {&(0x7f00000006c0)="4372e9bfc44f351a9e428253c5", 0xd, 0xfffffffffffff12b}, {&(0x7f0000000700)="8b7d61d253dfb84d2cf1220d9d3c786c51079aff2d30b94cf41b596c473212667911cd81e9e3a009f074c09a238ed53059d79cc5a7779214937af4457e5ed46bd63263e6b9619a24a168c9d91e5a33a2487d6def24c516abf22ac6af87074a90d91a91e075cfb7f1ad119d26ad5e1498dd0b892ce6bd2f25affb99be058f2a917f48ed0b72ad08ea901c233d57c71bd110c05520f9a2ed504d82237cd5234b9fc0c9", 0xa2}], 0x0, &(0x7f00000056c0)=ANY=[@ANYBLOB='nojoliet,check=relaxed,iocharset=none,map=off,check=relaxed,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73657373696f6e3d3078305e9f7bd8303030303030303030346507000000652c6f76657272690000000000000000726d2c73657373696f6e3d307830303030303030303030303030302ecc53e71c433231168fe0e240f3b16b1b276c69f8ad97f348932d9923941c0488947938c12743b6c2490492", @ANYRESDEC=0x0, @ANYBLOB=',measure\x00\x00\x00\x00t_measur=MODULE_CHECK,mask=MAY_WRITE,euid<', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000a00)=[r0, r1, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x5) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x7fffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r3, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @link_local}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000002a40)={'syztnl0\x00', &(0x7f00000029c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x9, 0x8, 0x10000, 0x64, @private2={0xfc, 0x2, '\x00', 0x1}, @mcast2, 0x700, 0x20, 0x7, 0x6dda}}) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000400)={r7, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000140)={r7, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000180)={r7, 0x1, 0x6, @link_local}, 0x10) sendmmsg$inet(r0, &(0x7f00000054c0)=[{{&(0x7f0000000a40)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000001a80)="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", 0xfc}, {&(0x7f0000001b80)="3aa158199156dc32134778d9ffd503a3a86054c1ea3fdee7e66504f2fcc8752d87cfa26cac15d85689dc050f51ef16972e2edc18281cd44be6a6b7332b6cc1a8471c37a4b20383fb5a4bc2c44d47bcd452bfc199e474b215e1c7cfec4f6ec60c747d537d830868a0c8993a368068bb09d4e761332181e15a25cf73ce8e31ea2716eb934e07af110ce25afc5f3f8f3b959e7a0c1987491f8d8893454fee01143767a593b0e2737f2b7e764a5c66e6aaccfc052e42330ea6127a46eb0a06579346ced647b17824208ac6a89e35bd5daa430265423431ace56851509f1648dda17c7752c7f57f6bc20fc276fe", 0xeb}, {&(0x7f0000001c80)="0e93953b8365692a1d9f26c06c62fcfddcca796c4f9c6cbbaad194d7ede523bdfa5db76b255780fdd81c8641c59c7844a200160105c2aab06b22d4d91f4e4e8903136315c7e36450274eb15e8a5b583dbe206390199464ff0016ed334c3471975fd610817f40608ff78b12288bcca8d2beb97d59dd4cb3a24ee0a85a1df1b2a38db60b89d2e4356685241dfab5c7e157b84e6c72c016cc4e6005db543fd2d956a7e228bd1bb1d67626d749d3d8e1135ea3d5", 0xb2}, {&(0x7f0000001d40)="fdcde85906821e6dc86b19fee8b539f6353bfc7eccc4a29afdaa2da5a2eed8009c6cf1e97c4a67ec5530a5c56b2ef48dbc601edba67f92ba5d5031b9ed04af0045f59a5ecdfbc58162de4ce07226720220b05833d3f76f265fa8090ef7017eec2fea652c59d0d5a3065c0ef26f085a1095349276c069", 0x76}, {&(0x7f0000001dc0)="2a2989532d6f968c9de23d3e50ec91b23a0d1c7991b1f98df75fb671a748db869adc4698522b682dffbe1cd7d972825147de42b15f55dd216d3d133f9f4949deb128829a77689b10973dc10ad38b028aa2ab756619d11ac88c928a3545ac4c19ba27d01485aef57ff90ebc0e01230a07b7f7eee77d498ae932a19947ab92886b3e9bfeeefe6061ceb5597281220c982528cf33f695a08a5b727ffd3bcd520abc373225726609b7793da49c4766fed91b6566377a8a500c221d4d4b0e4bbe357b861accdb56c143946c722abd007bf1f9ed8bc7576710c9878f1527", 0xdb}, {&(0x7f0000001ec0)="156f63f3834818b923e5933083b24a42cb8d4652d60bfd30c0203d9178a69fbbdfaa5df055c145500c88ba541c3c680842d138d46c8cb86fa3c739834b8f8eef03", 0x41}], 0x7, &(0x7f0000001fc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0xffff8001}}, @ip_retopts={{0x8c, 0x0, 0x7, {[@timestamp_addr={0x44, 0x2c, 0x60, 0x1, 0x9, [{@multicast2, 0x9}, {@broadcast, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x81}, {@dev={0xac, 0x14, 0x14, 0x44}, 0xdf25}, {@multicast2, 0x1250000}]}, @generic={0x89, 0xa, "4c925acf205c6e6c"}, @timestamp={0x44, 0x10, 0x67, 0x0, 0x1, [0x8001, 0x1, 0x590]}, @end, @lsrr={0x83, 0x27, 0xaf, [@multicast2, @multicast1, @remote, @multicast2, @loopback, @remote, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x16}, @multicast2]}, @timestamp_prespec={0x44, 0xc, 0x3e, 0x3, 0x2, [{@multicast1}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010102, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x99}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xab8d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x200}}], 0x158}}, {{&(0x7f0000002140)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000002280)=[{&(0x7f0000002180)="703cb9b59962975046551051e127704db006ce7957d12c8c67e70e0697ec47a07159c0057a3885762e183c4b318d4194b1172f4427db52d779b52b68599625feb3a99c2a5efe4cadaa34de4a6187ebbe3d3d61ad8b242f695ca6ebeb9576ea568d5f927a9119ebf835e0efddc641872776a855b74b2cfc7357d1c4d678228639e9770b8e38ff1fb7b80fac397bec6e4da2826a3b79d088f7a552e205fee431d86ddff1b8e6fb9cd1cbdd4d237eb1610432ed7634997a09c6febaebf6cfabd01cfc56", 0xc2}], 0x1, &(0x7f00000022c0)=[@ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x101}}, @ip_retopts={{0x58, 0x0, 0x7, {[@generic={0x44, 0xf, "b0589c98d505d90e230697924f"}, @timestamp_addr={0x44, 0x14, 0x87, 0x1, 0x0, [{@private=0xa010100, 0x2}, {@broadcast, 0x20}]}, @cipso={0x86, 0x1e, 0x3, [{0x1, 0x5, "82a880"}, {0x6, 0xe, "45606539752709fba8040cca"}, {0x7, 0x5, "c14af7"}]}, @ssrr={0x89, 0x7, 0xd2, [@dev={0xac, 0x14, 0x14, 0x3e}]}]}}}, @ip_retopts={{0x100, 0x0, 0x7, {[@lsrr={0x83, 0xf, 0xa3, [@remote, @multicast2, @remote]}, @ssrr={0x89, 0x2b, 0x2e, [@dev={0xac, 0x14, 0x14, 0x3f}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x17}, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast]}, @ra={0x94, 0x4}, @cipso={0x86, 0x3d, 0xffffffffffffffff, [{0x2, 0xe, "0a5ec40f99bb9b0b986fbe92"}, {0x7, 0x10, "b93f364ec207fb8cd0b26d9ea76b"}, {0x5, 0x4, "319b"}, {0x1, 0x11, "190f7e6292b06569f918946c006b97"}, {0x7, 0x4, "ec58"}]}, @cipso={0x86, 0x14, 0x1, [{0x1, 0xe, "0b874a5d81f1dbf49d82f6c1"}]}, @lsrr={0x83, 0x27, 0xf0, [@rand_addr=0x64010102, @rand_addr=0x64010102, @remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @dev={0xac, 0x14, 0x14, 0x3d}, @multicast2, @empty]}, @timestamp={0x44, 0x20, 0x8c, 0x0, 0x3, [0x5, 0xab, 0x100, 0x0, 0x2, 0x9, 0x4]}, @ssrr={0x89, 0x17, 0x3c, [@private=0xa010101, @private=0xa010101, @rand_addr=0x64010100, @loopback, @multicast1]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0x89, 0xe, "5942b40f443d33adf7b92ef6"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1d}}], 0x1f8}}, {{&(0x7f00000024c0)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000002940)=[{&(0x7f0000002500)="44b7c13b349ad876642fd3e3609a1c6143c6be439feb5445abd0bb6bfb58aea8dcd8e600bc2cb586b396dbabbf03855f1844330c18a7fa22cdc875a7f031214432dbcb6663eb3510ae2aa8200cf381e568629fabc5106e83cc9c1aa24a8716d392fea3f4645b91401a811405265797f39f00f65f3ada73964215975414edc6be71bce0e0a53e2877afa0fffb43f5be9b1ee87b739f4d68430711b208cd0d15d491ba6a68bfe65a27489f652809b4327f6c8715eac0c3ac18923aec496a4f172c9ddc8e2c", 0xc4}, {&(0x7f0000002600)="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", 0xfc}, {&(0x7f0000002700)="e38ff43cbeb3c87a18285b2e468763639975f60487af53d38d35f44023680209a4adcd25117ba502ae4cd3a4896e81f9f7c5276718ff20232af8b50096a5a52232d7a9217a36649324165b76cf614a3616ef9e33d1cc80d8390f0afe076a4ae85d91368432ff0ed4ef6396f0db3973d6daa9", 0x72}, {&(0x7f0000002780)="0268398c17fc1032935e3322a38fffd0b4143ed27bd60b7278a9303633cfaab00869fba81c7e29021bc503e9e91f7f9e24b2fa00c7b9ddcd2fa098c4fb758cfa9e6edcc3175c583b2528ed4168916c4072b3fa1f", 0x54}, {&(0x7f0000002800)="b565b769db0bcebd506fc28fed8ca3f56ffa6a036b9604a6bc05bbda1159828517b5520055651a6931a697a0927b07150814874f90c3c1b97de73b48cbed9bdadb7657a00926a58c91d3a18e3889e43c0febc68bda4815f6ffcba4126eac1d70b3c3b56b4cabbf7f2ede88bad73f073e0d4955db213f658c9021b452a39780cbeb", 0x81}, {&(0x7f00000028c0)="3ac512966ae5867bbfc1f2e9a3530a46dc91e3a89650157d9f5a047dbefea6fab5ca3aa0d317751fc92c64a05a6fc1a3224dd558d57c6959374871787ed0ea41505fecec744137f7102891f2ee1838b6ed", 0x51}], 0x6, &(0x7f0000002a80)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=r4, @ANYBLOB="e0000001ac1414aa0000000040000000000000000000000007000000018309be7f5fc1d22504440cae636401010100000004891755000000000a0101017f000001ac1e0101e000000100000014000000000000000000000001000000ff000000000000001c000000000000000000000008000000", @ANYRES32=r7, @ANYBLOB="0a0101027f000021000000a6000000010000001c00000000000000000800000000190000000000000000f4000000000000000000", @ANYRES32=0x0, @ANYBLOB="7f0000deab1414a800000000"], 0xd0}}, {{&(0x7f0000002b80)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000002dc0)=[{&(0x7f0000002bc0)="734fff5acd1daeb41d85d15301d505280f8e9661b7f4bf1b6e182185ffacc9119d6663fd393ec31d7c95c184b94d4b9dffeade5a1709a240cd44bc33ec2d00afcbbab9", 0x43}, {&(0x7f0000002c40)="c8477146ee8d0f80d11115f1033b992f4292ffe2781daa1df36fa58621b32d7ba6821c5f31131c46962ec78c1cffc81592d67be3c191abbf8ea32ee6cac094c2f9dc019f69bb6dd6607c8a041e275c46b878d1e8d0822dd06620dfcfc1d9ab19a33125424935d06350084b2f9dbc0b389026139ec3e74ce8f101c2c00f7b8eedd0bed3b9e1328eacac00ad97b2b7d39b1472d2b260650e596d42abd0e94c0ab9bca158cde833193775a74a88e4", 0xad}, {&(0x7f0000002d00)="74a83410577c37bdb6d58eaa90541d38341232660e39c4d24b2c0870a69c6e", 0x1f}, {&(0x7f0000002d40)="a65e8906f9207c0d600b4b84e50f5fd886ff32a7eaca57f702bbd16ed6d2f96fa5a1a199a425eb1c085ddf26b390c20a44d498d9a2208a7f300e5c75d4b6c49a56837d2c8140a1cf3235ff4ad9e87f9adc9fec797425d0652ba1f0cf7d2f88bd2b159d42aef011f2e7f2273083c3444b35a27dbcfaa595", 0x77}], 0x4, &(0x7f0000002e00)=[@ip_ttl={{0x14, 0x0, 0x2, 0x9}}], 0x18}}, {{&(0x7f0000002e40)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000003000)=[{&(0x7f0000002e80)="055de3022e8d653dfa33de399d1e50ad0fe51e7a033ed6", 0x17}, {&(0x7f0000002ec0)="8a68a0a7ac7f649d7d58f7ae23d1a0acb2eee72fe75b7992792ba20a50b2da5c80d9ad578a5867bcd2cc66c5819219006c0b3a9f6708ebc9a6436cd12f743a947ff1eab147af7ff213918af4e549c0a598e35b95254eaee0145aec3349f4d84e331b0bf07b418d18d067fcfce2f7481e", 0x70}, {&(0x7f0000002f40)="0b051283cb7e0e7030e1e96fde7bbf09e63e693908f57fc1e714fdea9f670e0b2b01a68ab09664913419bffb63fecf30692a93826be120", 0x37}, {&(0x7f0000002f80)="018768b05dc996b63e9804eeb3fd25ec263e376ecb8f9e2a0d414c0552ec995690f98d11dcc54d3f392503118ff1d569e9fa5560328c19c6910b01ebab41732a03947c6fac200200b559985cc67b4b38823169d9655a504ccb5492017dab165b1c61643817859f70c1123b18601a8959e26044da99b8a8c3aa5555941994", 0x7e}], 0x4, &(0x7f0000003040)=[@ip_retopts={{0x58, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x44, 0xb4, 0x3, 0x4, [{@multicast2, 0x9000}, {@private=0xa010100, 0x8}, {@rand_addr=0x64010100, 0x1f}, {@local, 0x9}, {@broadcast, 0x10001}, {@empty, 0xac}, {@multicast1, 0x6}, {@remote, 0x4}]}, @noop]}}}], 0x58}}, {{&(0x7f00000030c0)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000003240)=[{&(0x7f0000003100)="2904a3583b5ddee23d06d73e1fd1b4c02e119f604839", 0x16}, {&(0x7f0000003140)="fd73cbf9ec0b276c6f75cdd819e5fa1240aa2dd19f7d94c8bca94e7cc59e718aede6a50fb67d3539299dfe75fd07b1f2a6f3853e7c7b16966ebcec00cffc2f48e627ca778a747a866f8f02ed7d55a6576e286df46ba563aea4ab6adbe835f474fcb3f4c05d5396947a552ace7b5412bd171beec54b2e534c2a3fb52333055d70baddd683ff78d8185d4e9beb7e23baa879341720e381ce74adeb7decb92ef4e2bd480226ec85d7737d5a1dc15a65ca98f127636cd8034eab80573b26211dbcfefd607843e17aedb04f88da329da5989855d78cd29c5220b2a921581b2bd327cd504848", 0xe3}], 0x2, &(0x7f0000003280)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}], 0x18}}, {{&(0x7f00000032c0)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f00000053c0)=[{&(0x7f0000003300)="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", 0x1000}, {&(0x7f0000004300)="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", 0x1000}, {&(0x7f0000005300)="7a0b672799b9ac27c8a4c34ab7fd99985528ba593c61deba4b1a5d230e740a0810a8a7f740995bbf7f8958e276139d48879a553f070a44c0743ab16f010e2e0bf6141215acce19f1f2b7f09a93fc37ff42d8ca314cb645b115cb57e0ef6f34c4deb9344f57835e283d4df68bfd174b9356bdb0998bd6ef2c7b0df3be7c6da14cbf9368424156885e8735176ac692372d59f48f5eee6b757a39177fe85f7ede5bf8b41ca78cf922c5a52ee8554d8044a914fb0775de2946086d77", 0xba}], 0x3, &(0x7f0000005400)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x30}}, {{&(0x7f0000005440)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000005480)}}], 0x8, 0x800) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 177.821472][T13537] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 177.832670][T13538] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:19 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TCFLSH(r1, 0x540b, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x6) [ 177.877587][T13538] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:19 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400009f, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:19 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x4020940d, 0x0) 13:57:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 177.915739][T13538] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 177.938600][T13560] loop5: detected capacity change from 0 to 264192 13:57:19 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x80045432, 0x0) [ 177.991597][T13569] loop1: detected capacity change from 0 to 16369 [ 178.012280][T13569] device lo entered promiscuous mode [ 178.023338][T13561] device lo left promiscuous mode [ 178.032801][T13579] loop5: detected capacity change from 0 to 264192 13:57:19 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x80045440, 0x0) 13:57:19 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={0xffffffffffffffff, 0x400, 0x81, 0x5006}) dup(r0) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xba3f3158, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 178.037828][T13584] device lo entered promiscuous mode [ 178.047447][T13583] loop3: detected capacity change from 0 to 136 [ 178.063011][T13583] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 178.064590][T13569] loop1: detected capacity change from 0 to 16369 [ 178.081717][T13561] device lo left promiscuous mode 13:57:19 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x80086601, 0x0) [ 178.126170][T13596] loop4: detected capacity change from 0 to 264192 [ 178.170295][T13596] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 178.188933][T13596] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 178.201618][T13614] loop3: detected capacity change from 0 to 136 13:57:19 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x80087601, 0x0) [ 178.212748][T13596] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 178.230821][T13621] loop5: detected capacity change from 0 to 264192 [ 178.230950][T13614] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:20 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000100)=0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc01f}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, 0x0) pidfd_getfd(r0, r1, 0x0) 13:57:20 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:20 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x801c581f, 0x0) 13:57:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:20 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140000a0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:20 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0xc0045878, 0x0) [ 178.714882][T13653] loop4: detected capacity change from 0 to 264192 [ 178.721481][T13650] loop3: detected capacity change from 0 to 136 [ 178.738740][T13655] loop5: detected capacity change from 0 to 264192 [ 178.750716][T13652] EXT4-fs warning (device sda1): ext4_group_extend:1793: can't shrink FS - resize aborted 13:57:20 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000080)={{0x0, 0x6b, 0x9, 0x4, 0x81, 0x40, 0x9d9, 0x2, 0x1, 0x5, 0x6, 0x80000001, 0x2, 0x9a6f, 0x1}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r3 = syz_open_pts(r2, 0x0) dup2(r3, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000000)={0x7, 0x3, 0x7, 0xff, 0xf, "c90aa4555de69f975b6a881eed7d8a16007a71"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000001080)={{r1, 0x10000, 0x2, 0x8, 0x9, 0x0, 0xfff, 0x3, 0x6a2d, 0x7, 0x7, 0x3280000000, 0x3, 0x0, 0x5}, 0x10, [0x0, 0x0]}) 13:57:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xcf020000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:20 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0xc0045878, 0x0) [ 178.756779][T13650] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 178.762121][T13653] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:20 executing program 1: clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:20 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000000)=0x4) ioctl$TCXONC(r0, 0x540a, 0x2) [ 178.821915][T13653] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 178.831483][T13671] EXT4-fs warning (device sda1): ext4_group_extend:1817: will only finish group (524288 blocks, 256 new) [ 178.850434][T13671] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't read last block, resize aborted 13:57:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 178.888575][T13682] loop5: detected capacity change from 0 to 264192 [ 178.896392][T13653] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:20 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) r0 = clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) set_mempolicy(0x4000, &(0x7f0000000380)=0x401, 0xff) r1 = gettid() pidfd_open(r1, 0x0) clone3(&(0x7f0000000300)={0x290001180, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0xf}, &(0x7f0000000180)=""/100, 0x64, &(0x7f0000000200)=""/172, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 13:57:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd8020000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:20 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140000a1, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:20 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0xc0189436, 0x0) 13:57:20 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x84380, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 178.987936][T13704] loop3: detected capacity change from 0 to 136 [ 179.001575][T13704] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:20 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0xc020660b, 0x0) 13:57:20 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000400)={r2, 0x3, 0x6, @broadcast}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) setsockopt$sock_int(r3, 0x1, 0x2a, &(0x7f0000000200)=0x81, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @dev}, 0x10) unlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x200) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6, @link_local}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r2, 0x29, 0x4, 0x1, 0x4, 0x53, @loopback, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x20, 0x0, 0xfe}}) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r6 = syz_open_pts(r5, 0x0) dup2(r6, r5) ioctl$TIOCGSERIAL(r5, 0x541e, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/4096}) ioctl$TCXONC(r4, 0x540a, 0x2) [ 179.055463][T13714] loop5: detected capacity change from 0 to 264192 13:57:20 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x10) 13:57:20 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x7, 0x697e) clone3(&(0x7f0000000080)={0x1aa095000, 0x0, 0x0, 0x0, {0xfffffffd}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 179.121001][T13730] loop4: detected capacity change from 0 to 264192 [ 179.150852][T13731] loop3: detected capacity change from 0 to 136 13:57:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd9020000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:20 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x4000) 13:57:20 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TCXONC(r0, 0x540a, 0x1) 13:57:20 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) r0 = clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x3a}, 0x0, 0x0, 0x0, 0x0}, 0x86) r1 = getpgid(r0) r2 = gettid() tkill(r2, 0x1000000000013) r3 = gettid() tkill(r3, 0x1000000000013) set_mempolicy(0x2, &(0x7f0000001300)=0x10000, 0x3) r4 = gettid() r5 = gettid() tkill(r5, 0x1000000000013) r6 = getpgrp(r0) clone3(&(0x7f0000001280)={0xc1100, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0xc}, &(0x7f0000000180)=""/188, 0xbc, &(0x7f0000000240)=""/4096, &(0x7f0000001240)=[r1, r2, r3, r0, r4, r5, 0xffffffffffffffff, r0, r6], 0x9}, 0x58) [ 179.186840][T13730] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 179.195269][T13731] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 179.226336][T13730] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:20 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000124, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 179.269424][T13730] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 179.281760][T13757] loop5: detected capacity change from 0 to 264192 13:57:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:20 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x5500) 13:57:20 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) 13:57:20 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x60ff) [ 179.371236][T13781] loop3: detected capacity change from 0 to 136 [ 179.381365][T13781] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:20 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x9700) 13:57:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 179.452597][T13796] loop5: detected capacity change from 0 to 264192 [ 179.489763][T13795] loop4: detected capacity change from 0 to 264192 13:57:20 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x104000) 13:57:20 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000125, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:20 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000080)=[r0, r0], 0x2) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)=0x5) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x2809, 0x9, 0x0, 0xfff, 0x1a, "5544baa8e4919e303d1be39251cc0dac7cb4de"}) [ 179.507594][T13795] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 179.525991][T13795] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 179.537979][T13795] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 179.573202][T13814] loop3: detected capacity change from 0 to 136 [ 179.584307][T13814] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 179.674966][T13832] loop4: detected capacity change from 0 to 264192 [ 179.684891][T13832] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 179.699899][T13832] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 179.710610][T13832] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:23 executing program 1: rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae03d080, 0x0, 0x0, 0x0, {0x19}, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x58) r0 = getpid() r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000840)=[{&(0x7f0000000440)=""/125, 0x7d}, {&(0x7f00000004c0)=""/13, 0xd}, {&(0x7f0000000500)=""/237, 0xed}, {&(0x7f0000000600)=""/216, 0xd8}, {&(0x7f0000000700)=""/65, 0x41}, {&(0x7f00000008c0)=""/132, 0x84}], 0x6, 0xd9e, 0x1000) clone3(&(0x7f00000003c0)={0x40004000, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/195, 0xc3, &(0x7f0000000280)=""/249, &(0x7f0000000380)=[r0], 0x1, {r1}}, 0x58) 13:57:23 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x105400) 13:57:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:23 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x220001, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/167, 0xa7}], 0x1, 0x8, 0x400) ioctl$TCSBRK(r0, 0x5409, 0x10001) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 13:57:23 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000126, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f00000014c0)=[{&(0x7f0000000040)=""/53, 0x35}, {&(0x7f0000000080)=""/52, 0x34}, {&(0x7f00000000c0)=""/71, 0x47}, {&(0x7f0000000140)=""/180, 0xb4}, {&(0x7f0000000200)=""/142, 0x8e}, {&(0x7f00000002c0)=""/69, 0x45}, {&(0x7f0000000340)=""/212, 0xd4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/119, 0x77}], 0x9, 0x3f, 0x800) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) write$P9_RSTATu(r1, &(0x7f0000001580)={0x7c, 0x7d, 0x1, {{0x0, 0x5c, 0x9, 0x2, {0x80, 0x3, 0x2}, 0x80000, 0x7ff, 0x8, 0x1, 0xb, '/dev/ttyS3\x00', 0xa, ':{\x94*!)^#@\x9c', 0x9, '^}!:-(!(,', 0xb, '/dev/ttyS3\x00'}, 0xb, '/dev/ttyS3\x00', r3, 0xee00, 0xee00}}, 0x7c) 13:57:23 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x400000) 13:57:23 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x2cb40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 182.346883][T13849] loop3: detected capacity change from 0 to 136 [ 182.363257][T13849] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 182.364197][T13854] loop5: detected capacity change from 0 to 264192 [ 182.388416][T13855] loop4: detected capacity change from 0 to 264192 13:57:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:23 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x401000) 13:57:23 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_send_signal(0xffffffffffffffff, 0x26, &(0x7f0000000100)={0x39, 0x5701f39b, 0xfffffffd}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)) [ 182.437617][T13855] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 182.463082][T13855] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:23 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) [ 182.514290][T13889] loop5: detected capacity change from 0 to 264192 [ 182.543533][T13855] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 182.557956][T13888] loop3: detected capacity change from 0 to 136 13:57:23 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x4af000) [ 182.581504][T13888] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:24 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="f40100001300000328bd7000fedbdf2500000000000000000000000000000000e00000020000000000000000000000004e2400484e2000080a0080a067000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="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"], 0x1f4}, 0x1, 0x0, 0x0, 0x8c0}, 0x40804) 13:57:24 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000127, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:24 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) sendfile(r1, r2, &(0x7f0000000000)=0x3, 0x400) ioctl$TCXONC(r0, 0x540a, 0x2) [ 182.630264][T13907] loop5: detected capacity change from 0 to 264192 13:57:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x4fd000) 13:57:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x541000) 13:57:24 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') ioctl$TCSBRK(r1, 0x5409, 0x56c) [ 182.760941][T13939] loop4: detected capacity change from 0 to 264192 [ 182.790755][T13939] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 182.800968][T13939] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 182.802137][T13938] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 182.810505][T13943] loop3: detected capacity change from 0 to 136 [ 182.818337][T13938] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 182.837541][T13947] loop5: detected capacity change from 0 to 264192 [ 182.839800][T13954] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13954 comm=syz-executor.1 13:57:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x550000) [ 182.847196][T13939] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:24 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000130, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:24 executing program 1: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x2) clone3(&(0x7f0000000100)={0x3c005400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) set_mempolicy(0x0, &(0x7f0000000040)=0x9, 0x2) 13:57:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x11, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:24 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x4) ioctl$TCXONC(r0, 0x540a, 0x2) [ 182.909529][T13943] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x970000) [ 183.016406][T13980] loop5: detected capacity change from 0 to 264192 [ 183.024337][T13983] loop3: detected capacity change from 0 to 136 [ 183.048360][T13991] loop4: detected capacity change from 0 to 264192 [ 183.049335][T13983] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0xc04a01) 13:57:24 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000140)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x80010, r0, 0x25051000) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x1e1100, 0x0) mkdirat$cgroup(r1, &(0x7f0000000100)='syz1\x00', 0x1ff) 13:57:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffbffff, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 183.066598][T13991] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 183.084378][T13991] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:24 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000000)=0x5b736249) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:24 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000131, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 183.113936][T13991] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0xd04f00) 13:57:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x12, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 183.192159][T14014] loop5: detected capacity change from 0 to 264192 13:57:24 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) r0 = clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = gettid() tkill(r1, 0x1000000000013) ptrace$cont(0xffffffffffffffff, r1, 0x6, 0x9) r2 = gettid() tkill(r2, 0x1000000000013) clone3(&(0x7f0000000300)={0x8000, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x2b}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000000200)=""/141, &(0x7f00000002c0)=[r1, 0xffffffffffffffff, r0, r0, r0, r0, r2, r0], 0x8}, 0x58) 13:57:24 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x54580, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x10100, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0xf04a00) [ 183.273162][T14028] loop3: detected capacity change from 0 to 136 13:57:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffe000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 183.317174][T14028] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x22, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x14ac000) 13:57:24 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x284401, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x10000000) [ 183.367816][T14049] loop4: detected capacity change from 0 to 264192 [ 183.391002][T14049] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:24 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x0, 0xc14, 0x1000, 0x2, 0xff, "9731ac45a55ab5ddd64a40b311b8e3af1aebe5", 0x0, 0x2}) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:24 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000138, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0xff600000) [ 183.442137][T14049] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 183.451873][T14064] loop5: detected capacity change from 0 to 264192 [ 183.462158][T14069] loop3: detected capacity change from 0 to 136 [ 183.475118][T14049] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffbff, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 183.497967][T14069] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 183.567660][T14092] loop5: detected capacity change from 0 to 264192 [ 183.621673][T14098] loop4: detected capacity change from 0 to 264192 [ 183.629953][T14098] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 183.640645][T14098] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 183.650808][T14098] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x25, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:27 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:27 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x400000000000) 13:57:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:27 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000139, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:27 executing program 1: sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f6, 0x8, 0x70bd2a, 0x25dfdbfb, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000040}, 0x800) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1', "891e3820b8484a3cafbdd1875966b52ffdef819599f72db0cf8bbb85c2bcd70fd7b1f5ea81dd51050569a802dd80d52e4350d93099fa8c87be6c160a7d17fc6d4ed50274c9a33b72b5c2ae30627b1e10e4fb7758d861dfc3acd2578e80d05ad938ee9be82418271b8477b132908b99fe43df2836eee1a0bd8b00a0c1a20edd91264f0060b6e70c05cc4bef6a115409c27669ec8340dc7205fe21449e62bb3061736fdfa9ec344be0fc80f9e7915a1dfc29e11811705371f8d1efc2cf0e553c4e8f74a1225e4eaecab8cde849ae497ce2f4de49e562f3845fcfdb9d7777ceae625181"}, 0xe6) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="a7746bd761e659dd77f435de08dd8876e95b6fe427c8742445c1401871247dd736e431eb398761c23b53679c7e800e8406215d2038d400c51a010bb2193ef4bf53ee45db49cab700f9458bbbbdfc05743dbdfc65bdbc764e3a048e14f8a5201db925e862e22e347a3f0911c90123", 0x6e}, {&(0x7f0000000380)="e7733e50d7deff291653", 0xa}, {&(0x7f00000003c0)="15deae80f8fa4d7cf32715a3f3c251ec0c4f06f8beb7f7d087ac7e8ad57e1930002943a71905bc8abb98ce96defbfe3a84501956ae8ef3fa8728d2f935f5d38371dec8d51e6f3e9717878bcb4c58e6dbbaa6a5666172835b9b87428c467f0aca2a819ebad99a6849edbffe4156a56535a048bec8fae9a94481ae51f7502ca5978640dbf14378e58902d2ea16282dac122ed66f69c302786b0f4b28cca64ede3c816b820bb4654e3db7d6aed65a27bb7c15adb930ef8b5677e377e121e2e0890fcb1efa3a2b25dae612a9e6949e165dfb58d183e7cb26616a0f19c1ff961b229b17bddea60dec86d215e0", 0xea}], 0x3, &(0x7f0000000500)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x5b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@noop, @timestamp_addr={0x44, 0xc, 0x46, 0x1, 0xe, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7}]}, @timestamp_prespec={0x44, 0xc, 0x89, 0x3, 0x2, [{@rand_addr=0x64010102, 0x5}]}]}}}], 0x60}, 0x0) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) r1 = clone3(&(0x7f0000000080)={0x1ee30f000, 0x0, 0x0, 0x0, {0xffffff7d}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = fork() r3 = gettid() tkill(r3, 0x1000000000013) r4 = gettid() tkill(r4, 0x1000000000013) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000940), 0x4180, 0x0) r6 = io_uring_setup(0x5ec, &(0x7f0000000a00)={0x0, 0x3278, 0x0, 0x0, 0x17b, 0x0, r0}) write$binfmt_elf64(r6, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0xfc, 0xff, 0x15, 0x4, 0x2, 0x2, 0x3, 0x6, 0x36a, 0x40, 0x2af, 0x4, 0x7, 0x38, 0x1, 0x9, 0x2, 0x9}, [{0x323a72aa, 0x96, 0xe5, 0xe3, 0x9, 0x10a8, 0x100, 0x3}], "dc841e38a4e14dfdae42c79c5c98fdf6ea79ec7146fcdb80722ddc5590fd54934c03dd92e336cc8ab6d7cf1b6bf8c54d75cfbd8fb6291b525fe12a7253a33e27b77d5c0838866cd40a4014fb22be3f36b1fb7d7021909ef8357c71fe0a4d1c3f13aa34d93063bcd32c8739822b0869", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6e7) clone3(&(0x7f0000000980)={0x20000000, &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780), {0x38}, &(0x7f00000007c0)=""/231, 0xe7, &(0x7f00000008c0), &(0x7f0000000900)=[r2, r1, r3, r4], 0x4, {r5}}, 0x58) r7 = socket(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r7, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x34, 0x0, 0x804, 0x70bd2b, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x40008) set_mempolicy(0x4000, &(0x7f00000006c0)=0x4, 0x26a) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001380)={0x0, 0x0, "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", "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"}) 13:57:27 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x550000000000) [ 186.348074][T14117] loop3: detected capacity change from 0 to 136 [ 186.357211][T14122] loop4: detected capacity change from 0 to 264192 [ 186.357279][T14119] loop5: detected capacity change from 0 to 264192 [ 186.369831][T14122] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 186.372333][T14117] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:27 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x10280, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:27 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400014d, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 186.393623][T14122] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 186.414012][T14122] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:27 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x60ffffffffff) 13:57:27 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000000)=0x4) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:27 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x970000000000) [ 186.485614][T14144] loop3: detected capacity change from 0 to 136 [ 186.511278][T14153] loop5: detected capacity change from 0 to 264192 [ 186.519354][T14144] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:27 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) r3 = syz_open_pts(r2, 0x51000) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000540)={0x8703, 0x6964, 0x7, 0x1000, 0x13, "4ea730297f337bdf"}) r4 = dup2(r3, r1) r5 = signalfd(r4, &(0x7f0000000080)={[0x8]}, 0x8) ioctl$GIO_FONTX(r5, 0x4b6b, &(0x7f00000000c0)={0x154, 0x6, &(0x7f0000000140)}) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) [ 186.589886][T14166] loop4: detected capacity change from 0 to 264192 [ 186.602972][T14166] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 186.640281][T14181] loop5: detected capacity change from 0 to 264192 [ 186.644598][T14166] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 186.672141][T14166] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 186.709370][T14185] loop3: detected capacity change from 0 to 136 [ 186.732756][T14185] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:30 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x10400000000000) 13:57:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:30 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000154, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x2d, &(0x7f0000000080)=""/53, &(0x7f00000000c0)=0x35) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x420000, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000180)=""/177, 0xb1, 0x2000, 0x0, 0x0) sendfile(r2, r3, &(0x7f0000000140)=0x2429960a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x2) 13:57:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:30 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x10540000000000) [ 189.435401][T14211] loop4: detected capacity change from 0 to 264192 [ 189.449859][T14211] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 189.461037][T14214] loop3: detected capacity change from 0 to 136 13:57:30 executing program 0: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000000)=0x5, 0x5, 0x1) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8000, &(0x7f0000000080)=0x798, 0x3, 0x1) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_io_uring_complete(0x0) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x4010, r1, 0x11f) ioctl$TCXONC(r0, 0x540a, 0x0) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2, 0x0, 0xfffffe00) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:30 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0xc04a0100000000) [ 189.482913][T14217] loop5: detected capacity change from 0 to 264192 [ 189.483619][T14214] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 189.498708][T14211] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:30 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0xd04f0000000000) 13:57:30 executing program 0: r0 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0xffffffffffffffe1, @broadcast}, 0xd) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r3, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @link_local}, 0x10) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@remote, @in=@empty, 0x4e22, 0x0, 0x4e22, 0x800, 0x2, 0x0, 0x0, 0x2b, r3, 0xee01}, {0x2, 0xcac, 0xffffffff7fffffff, 0x7, 0x9, 0xcb3, 0xffff, 0xf3e1}, {0x400, 0x7ff, 0x6, 0x1}, 0xdb63, 0x0, 0x0, 0x1, 0x3}, {{@in=@multicast1, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x0, 0x4, 0x2, 0x5, 0x9, 0x8, 0x6}}, 0xe8) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xe8000, 0x0) ioctl$TCXONC(r4, 0x540a, 0x2) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/116}) [ 189.571546][T14211] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:31 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000170, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:31 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0xf04a0000000000) [ 189.676047][T14243] loop5: detected capacity change from 0 to 264192 13:57:31 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x8010, r1, 0xb47e6000) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x301000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:31 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000171, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 189.746171][T14257] loop3: detected capacity change from 0 to 136 [ 189.762671][T14257] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:31 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x1000000000000000) 13:57:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:31 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x101001, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000000)={0x7fff, 0x8001, 0x4}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x10000, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x1ff) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000080)={0x3ff, 0x1000, 0x3}) [ 189.823823][T14270] loop5: detected capacity change from 0 to 264192 13:57:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:31 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0xffffffffff600000) [ 189.914521][T14281] loop4: detected capacity change from 0 to 264192 [ 189.916793][T14287] loop3: detected capacity change from 0 to 136 [ 189.951681][T14281] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:31 executing program 2: ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000000)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) [ 189.952478][T14287] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:31 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000172, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 190.000206][T14281] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 190.022830][T14296] loop5: detected capacity change from 0 to 264192 13:57:31 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = signalfd(r1, &(0x7f0000000000)={[0x2]}, 0x8) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000080)={0x40, 0x3}) close_range(r1, r0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:31 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) dup(r1) [ 190.038295][T14281] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 190.129659][T14311] loop3: detected capacity change from 0 to 136 13:57:31 executing program 0: msgrcv(0x0, &(0x7f0000000040)={0x0, ""/82}, 0x5a, 0x3, 0x800) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000000)={'vlan0\x00', 0x1f}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x9, 0x0, 0xff, 0x3, 0x9, "a306948667bb6eed90c881806599d603560b25"}) dup2(r1, r0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f00000000c0)={0x6, 0x3, 0xddf, 0x2, 0x0, "623ca7598314d23f9245d1c7d713e05e2da2cd", 0x2b34, 0xc23e}) 13:57:31 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8200, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) [ 190.182224][T14311] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 190.243729][T14328] loop4: detected capacity change from 0 to 264192 [ 190.252568][T14329] loop5: detected capacity change from 0 to 264192 [ 190.277090][T14328] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:31 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x220000, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000080)) 13:57:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 190.324973][T14328] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 190.349638][T14328] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:31 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000080)) [ 190.369633][T14347] loop3: detected capacity change from 0 to 136 13:57:31 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000178, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfe, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 190.397601][T14347] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:31 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x111000, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000000)=0x1) 13:57:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) recvfrom$inet(r0, &(0x7f0000000000)=""/41, 0x29, 0x101a1, &(0x7f0000000080)={0x2, 0x4e24, @private=0xa010102}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x404, &(0x7f0000000180)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0xaec9515537ef8217, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000240)=ANY=[@ANYBLOB="ac14143f0e010100008000000600000064010101640101ff0100000000008015e546362758d2d50000309f1d53bd"], 0x28) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x20500, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x55b2, 0x1, 0x7, 0x1}) socket$inet(0x2, 0x4, 0xfffffffa) ioctl$TCXONC(r1, 0x540a, 0x2) [ 190.491609][T14365] loop5: detected capacity change from 0 to 264192 [ 190.526520][T14378] loop4: detected capacity change from 0 to 264192 13:57:31 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TCSBRKP(r1, 0x5425, 0xb4c9) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/2241], 0x8c1) ioctl$TCXONC(r0, 0x5416, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) r4 = fcntl$dupfd(r0, 0x0, r3) sendmsg$NL80211_CMD_SET_BSS(r4, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x28, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x76}}}}, [@NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0x18}]}, 0x28}, 0x1, 0x0, 0x0, 0x4c010}, 0x40c4) ioctl$TCSBRKP(r0, 0x5425, 0x8) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x218802, 0x0) [ 190.552715][T14378] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 190.570218][T14382] loop3: detected capacity change from 0 to 136 [ 190.588353][T14378] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x124, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:32 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000204, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 190.600678][T14382] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 190.625353][T14378] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 190.675042][T14393] loop5: detected capacity change from 0 to 264192 [ 190.691355][T14407] loop3: detected capacity change from 0 to 136 [ 190.706131][T14407] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x125, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 190.796195][T14420] loop4: detected capacity change from 0 to 264192 [ 190.818113][T14420] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 190.835504][T14420] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:32 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000286, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 190.845067][T14426] loop5: detected capacity change from 0 to 264192 [ 190.858923][T14420] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 190.880315][T14433] loop3: detected capacity change from 0 to 136 13:57:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 190.891264][T14433] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x126, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 191.004046][T14451] loop5: detected capacity change from 0 to 264192 [ 191.010707][T14447] loop4: detected capacity change from 0 to 264192 [ 191.044258][T14447] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 191.044880][T14453] loop3: detected capacity change from 0 to 136 [ 191.073491][T14447] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:32 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400028d, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x204, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 191.088275][T14447] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 191.102954][T14453] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 191.178150][T14466] loop5: detected capacity change from 0 to 264192 [ 191.224473][T14479] loop4: detected capacity change from 0 to 264192 [ 191.265655][T14480] loop3: detected capacity change from 0 to 136 [ 191.278311][T14479] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 191.291778][T14480] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 191.312124][T14479] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 191.330259][T14479] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:32 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x180, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:32 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) ioctl$TIOCSBRK(r0, 0x5427) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mountstats\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) write(r2, &(0x7f0000000080)="73d5349f08e4d8169db165f855a7740d59ed0764adeaeeb5f097cac99cfb56523b36e513a833c0f8c42b626cce436c66f2d48f9b45d85f18e64c64bcbc161afed1ea974320ab36ab53c1199e8da8b34180cd", 0x52) fdatasync(r1) preadv2(r0, &(0x7f0000002200)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000002100)=""/235, 0xeb}], 0x3, 0x800, 0x8000, 0x4) ioctl$TCXONC(0xffffffffffffffff, 0x5416, 0x1) 13:57:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2d9, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:32 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400028e, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:32 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_generic(r1, &(0x7f00000016c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x28000}, 0xc, &(0x7f0000001680)={&(0x7f00000000c0)={0x1584, 0x3e, 0x4, 0x70bd26, 0x25dfdbfe, {0x20}, [@generic="e2390570cd94bc604d08e43675aa963922d2f07179151f12507e4050e92c5438f05af0e9c927663a79edcf5ec49e59c0d030af88030fcdcbe8a6e7d7cc2d873a1aad6ffa2d775367d518e91518f4e9b9f9e5aeca53dbab58", @nested={0x84, 0x33, 0x0, 0x1, [@typed={0x39, 0x4f, 0x0, 0x0, @binary="adb1c078a0ba4e108b424c7e28ab0b6bb6c2c58b2630aeba2013e41ef67c9c61a5d63cc006facea55f1d62d43e2405324e513499f9"}, @typed={0xc, 0x7a, 0x0, 0x0, @u64=0xcb}, @typed={0xd, 0x8a, 0x0, 0x0, @str='%\'/-[@$%\x00'}, @typed={0x14, 0x36, 0x0, 0x0, @ipv6=@empty}, @typed={0x14, 0x2, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}]}, @nested={0x216, 0x90, 0x0, 0x1, [@typed={0x8, 0x83, 0x0, 0x0, @u32=0x5}, @typed={0x8, 0x69, 0x0, 0x0, @u32=0x2}, @typed={0x14, 0x23, 0x0, 0x0, @ipv6=@private0}, @generic="052b85ff01644c932563d452408f69828d576bee73bea226c561e591f91a45ab5f3509b610912d0cf5155774dff56c4795e18e5b4c1979adbe989d66806f26ac63e1bc797559eaed0f0c0a0bbc6b7c4ed324196f1e6c5562639392fac4f814bea1deac9371f98d4578823f9341448bb8e7d395a7753c7cc4ae2b5c25db353a40b3ad231375e8c49f9eed1b20c82b1cffa1447e29c60940d692affec4ddc170588eebae5dbec778b0b4df823f6e0750a9104703dd99a1c11a3674fc9a0e3835cc2ba75199c7d24ba5eb72e239145e6a290373", @typed={0x14, 0x5a, 0x0, 0x0, @ipv6=@loopback}, @generic="f2f2e5668c3240d9a804f90696876d06354392bb244cf36fbddd15ad0ff3048acb94c4cfeafee015975e28bbe948a947e79e2d5acaa953f6fab3bea2fe6a3c28c4d0adc413f4591d46de02ff7b2009cc43d8e3819f850b346ac45e35bd31c136c74ba70a6376e6fed7df6e3f8571023b7d4aa50972f11fd9d6f46352541b00ac548acbdc4f90dbe7f9cfdde129d795c7658c56a75799532d984c07111858d1c5824b293c2e4ee6d0d3e210e3eb002b4edd61857406eb1c15c62c33e1dec52d6aaed8812a53bab0a67b613e6647944ff2a92c63279513891da645a055a2deaa40829e985c951e6886a9c312c2e1860bea952dc752", @typed={0x14, 0x7c, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}]}, @nested={0x1070, 0x30, 0x0, 0x1, [@generic="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", @generic="f4790efdca4c70eff910288bdc6aed19411ded6107431f70a209a0926d21b2bc72a3a41e72e825a1ef8e7e4e443d8d0a14815ee7a10763c598ce4a46102235832a42665151c70862ad680abd92613183ebf554e212385207ffe2853611429d1d487519f5", @typed={0x8, 0xb, 0x0, 0x0, @u32=0x3b71}]}, @nested={0x11e, 0x2f, 0x0, 0x1, [@generic="e702f5789a969031938b4e78e32ec817ef9e08d49c22313878f3fa76c71b3f85de5db7719ed1feb324efc8ca1fc61ac5926395324f077bd388cde289", @generic="cc27f909a321bbb5f67fa80578fcedea7731f6024af05011dec6899e5616079f39795549485d201490af0e3bd70f73157579f663b9e0c293eaee133daf970b8cc43a44d5338fc391d5f78485e413d124edb8e4229587cfcb4cd1c5947f5befd37b79db8ee75ad05270bac9e2ceaafe937e5cc19afd388d5830ffcc1fb8571f5581c2b5bbca5e9e950b9e4fdb919c33c1a2419e19846b3554f84da5a78ac43f422cf8d7f101145e9c53507b9a95a1a8ae58caf70054c944449fa9beecd006ed2512fec848959c8970262bb23cf1039aaca2b7a913664c4f5b41571371ca3b"]}, @generic="a0ab3478d9752edaacdc6b4c384f6a87df7c6cb0ae2e2f042c9d6d4e60378063637fd5d1f71d2d4df76349be1d546f7b025c36d588106a2dfcd0e959366dee99c6258cfa4176c5851a02db220e6c28c72e8ddfd0b63943e71ee6e6b9fe62a1e3f5ddbde183b746db9caebf0d9a94b7a67afbcdc68850b2ca3a2cfec8115a75a8335c2e64db9b2cf091445542273e356e2ef8581ab127f2f75e1711663f410c5bb8c0b4455d806a28d669fcfa03924cc3f5864089f9ff185dd9", @nested={0x2f, 0x66, 0x0, 0x1, [@generic="6d3a6b930991085fb3ce0178846f361058c5f41fb90789cd4f4758764e9906d24fb32a", @typed={0x8, 0x79, 0x0, 0x0, @fd=r2}]}]}, 0x1584}, 0x1, 0x0, 0x0, 0x20008000}, 0x4004080) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1b) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001700), 0x18a00, 0x0) 13:57:32 executing program 0: setreuid(0x0, 0xee01) timer_create(0x8, 0x0, &(0x7f0000000100)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x4, 0xa0, 0x4, 0x2, 0xa, "56c57234713c4d354160016c249966ff8b92f5"}) 13:57:33 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TCXONC(r1, 0x5416, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000000)={0x7, 0x5, 0xffffffe0, 0x4, 0x0, "e68bb72f1c15b56645155d2514abb0ad9e014c", 0x9, 0x81}) [ 191.611520][T14514] loop3: detected capacity change from 0 to 136 [ 191.619416][T14512] loop5: detected capacity change from 0 to 264192 [ 191.620184][T14515] loop4: detected capacity change from 0 to 264192 [ 191.633769][T14514] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 191.696885][T14515] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2da, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:33 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 13:57:33 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$TCXONC(r0, 0x5416, 0x3) [ 191.781096][T14515] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:33 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400028f, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:33 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x3, 0x10001, 0x64f, 0x4, 0x14, "d12c87df36a4c53b7b549e3370be19c0e1f6c1"}) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0xc0140, 0x0) syz_open_pts(r1, 0x220280) [ 191.821364][T14515] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 191.856691][T14545] loop3: detected capacity change from 0 to 136 13:57:33 executing program 2: ioctl$TCXONC(0xffffffffffffffff, 0x5416, 0x0) 13:57:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2db, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 191.866950][T14545] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 191.874073][T14549] loop5: detected capacity change from 0 to 264192 13:57:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe0ffff00000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:33 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x2) 13:57:33 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x80800, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TCXONC(r2, 0x540a, 0x0) [ 191.996207][T14577] loop4: detected capacity change from 0 to 264192 [ 192.008753][T14578] loop3: detected capacity change from 0 to 136 [ 192.020432][T14577] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 192.043788][T14587] loop5: detected capacity change from 0 to 264192 [ 192.051803][T14578] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:33 executing program 2: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f00000001c0)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x8}, {}, 0x0, 0x0, 0x0, 0x0, 0x2}, {{@in6=@dev={0xfe, 0x80, '\x00', 0x23}}, 0x0, @in=@empty, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000}}, 0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB='$wfdno=', @ANYRESHEX=r1, @ANYBLOB=',fscache,fscache,smackfshat=/dev/ttyS3\x00,euid=', @ANYRESDEC=0xee01, @ANYBLOB="0d7375626a5f747970653d2f6465762f7474795333002c66736e616d653d215c5d252c7375626a3d747970653d2f7b2c004849cd46814fe18f10562dbe8af6030826c21cbf68e8cdcf5e6bbfb3fa1ecf297456f86983304150b9b3da91fa7f78c29c93362aaf4b06f1c20dc393f8c38000473b1c9d1dfe1e0ca838d622bea56f0a10e90b962fccf1bc3ce612c1666d6baccb035254ea514373e5fc8559624fa2facea172118707c1e8871bedfed4c919f373f5362680435851653d92012a63d6fadb6c7df209af4585024609970b8807ba6df0b9623a666e0dcfa07b81612d389975c10ab330db4d4d1a73050263d4a0f7d3cf0710ec7ef1fd40983e69b35c48070653bbdc067addabfb1562374cea12379b178ecfa98486d9affe6468e4f2751161f5602753809920abf52af46e0ca1"]) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r2, 0x5416, 0x0) mkdirat(r0, &(0x7f00000002c0)='./file0\x00', 0x40) [ 192.091422][T14577] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:33 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140002ab, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 192.129790][T14577] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 192.200948][T14606] loop5: detected capacity change from 0 to 264192 [ 192.256498][T14616] loop3: detected capacity change from 0 to 136 [ 192.286565][T14619] loop4: detected capacity change from 0 to 264192 13:57:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001080)={0x24, r1, 0x1, 0x2000, 0x0, {{}, {@void, @val={0xc, 0x99, {0x0, 0xfffffffe}}}}, [@NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x4}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x800, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40841}, 0x4040080) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r2, 0x5416, 0x0) 13:57:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 192.311653][T14619] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 192.312991][T14616] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 192.334545][T14619] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 192.365331][T14619] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 192.423313][T14625] ================================================================== [ 192.431521][T14625] BUG: KCSAN: data-race in handle_irq_event / synchronize_irq [ 192.439100][T14625] [ 192.441423][T14625] write to 0xffff8881000eb600 of 4 bytes by interrupt on cpu 0: [ 192.449146][T14625] handle_irq_event+0x12a/0x160 [ 192.454026][T14625] handle_edge_irq+0x17e/0x600 [ 192.458831][T14625] __common_interrupt+0x38/0xb0 [ 192.463711][T14625] common_interrupt+0x39/0x90 [ 192.468395][T14625] asm_common_interrupt+0x1e/0x40 [ 192.473427][T14625] [ 192.475756][T14625] read to 0xffff8881000eb600 of 4 bytes by task 14625 on cpu 1: [ 192.483397][T14625] synchronize_irq+0xa6/0x2e0 [ 192.488625][T14625] serial8250_do_shutdown+0xc5/0x540 [ 192.493918][T14625] serial8250_shutdown+0x37/0x40 [ 192.498858][T14625] uart_tty_port_shutdown+0xd6/0x1d0 [ 192.504149][T14625] tty_port_close+0x166/0x210 [ 192.508919][T14625] uart_close+0x4c/0x110 [ 192.513187][T14625] tty_release+0x255/0xa10 [ 192.517649][T14625] __fput+0x25b/0x4e0 13:57:33 executing program 0: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local}, 0x10) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000400)={r2, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6, @link_local}, 0x10) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000400)={r5, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r5, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r5, 0x1, 0x6, @link_local}, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xf8, 0x0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8000}, 0x4000010) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x321000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x2) ioctl$TCSETAW(r6, 0x5407, &(0x7f0000000040)={0x6, 0xf33d, 0x800, 0x3f, 0xc, "f52fbf7c85281e5e"}) [ 192.521734][T14625] ____fput+0x11/0x20 [ 192.525753][T14625] task_work_run+0xae/0x130 [ 192.530276][T14625] exit_to_user_mode_prepare+0x156/0x190 [ 192.535915][T14625] syscall_exit_to_user_mode+0x20/0x40 [ 192.541640][T14625] do_syscall_64+0x56/0x90 [ 192.546063][T14625] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 192.551970][T14625] [ 192.554286][T14625] Reported by Kernel Concurrency Sanitizer on: [ 192.560427][T14625] CPU: 1 PID: 14625 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 13:57:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x402, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:33 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140002b2, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:34 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x80401, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x30fd81, 0x0) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f00000001c0)) ioctl$TCXONC(r0, 0x540a, 0x2) open(&(0x7f0000000000)='./file0\x00', 0x204c40, 0x1e3) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="310b024d1037f03d099949156cf1059621a4b008a54a88b5b65526396ac957c54979d5a4019bd489e6ffc0da977f25e0e28c9d87107ce197e69497d92c6d9e399d9c39d0756e6e9e0c137f09d09658e8a78c8f38c7a5000969ffc04dd8e79b143f828a0e53605c914f5d5fb6533b3ba281973bfb3d028bbf83e3aa6f293a25efe6f9528051ddb142b00ccc534c4da476d051eb0321b0afb34d7bfcfa6407b8c177bec866cc339e9d9f999e1bab96d37e5d68a735c46057f6d5af5a663635f5412bdf8a6941a90d6a49352b1e5ae89bc30e3932e13017b4dd665768e74410a4eabd1543b39ff5") fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000200), &(0x7f0000000240), 0x2, 0x1) [ 192.568837][T14625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.578890][T14625] ================================================================== [ 192.612182][T14633] loop5: detected capacity change from 0 to 264192 13:57:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x204000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 192.705046][T14645] loop3: detected capacity change from 0 to 136 [ 192.745875][T14645] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 192.759566][T14656] loop4: detected capacity change from 0 to 264192 [ 192.769189][T14656] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 192.779400][T14663] loop5: detected capacity change from 0 to 264192 [ 192.779667][T14656] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x406, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:34 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005ea00)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xd1, "57a8348c12700d"}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/keys\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000055000)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005f580)={0xfffffffffffffc5c, [{}, {}, {r4}, {}, {r4}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {r3, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {r4}, {}, {r3}, {}, {}, {}, {r4, r5}, {}, {}, {}, {r4}, {}, {}, {}, {r3, r5}, {0x0, r5}, {}, {r4}, {0x0, r5}, {}, {}, {}, {}, {}, {r3}, {0x0, r5}, {}, {r4}, {}, {r4}, {}, {}, {0x0, r5}, {r3, r5}, {}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {r4}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {}, {0x0, r5}, {}, {}, {r3}, {0x0, r5}, {}, {}, {}, {r3}, {r3, r5}, {}, {}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {}, {}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {r3}, {r4}, {}, {r3}, {}, {}, {}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {}, {}, {}, {}, {}, {r3, 0x0}, {}, {}, {r4, r5}, {}, {}, {0x0, r5}, {r4}, {}, {r3, r5}, {}, {0x0, r5}, {r4}, {r3}, {}, {0x0, r5}, {}, {}, {r4}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {r3}, {}, {}, {}, {r3}, {}, {}, {0x0, r5}], 0x40, "f453d316142c9e"}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/keys\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000055000)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r7, 0xd000943d, &(0x7f000005f580)={0xfffffffffffffc5c, [{}, {}, {r10}, {}, {r10}, {r10}, {r9}, {}, {}, {}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {r9, r11}, {0x0, r11}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {r10}, {}, {r9}, {}, {}, {}, {r10, r11}, {}, {}, {}, {r10}, {}, {}, {}, {r9, r11}, {0x0, r11}, {}, {r10}, {0x0, r11}, {}, {}, {}, {}, {}, {r9}, {0x0, r11}, {}, {r10}, {}, {r10}, {}, {}, {0x0, r11}, {r9, r11}, {}, {}, {}, {}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {}, {}, {r10}, {}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {0x0, r11}, {}, {0x0, r11}, {}, {}, {r9}, {0x0, r11}, {}, {}, {}, {r9}, {r9, r11}, {}, {}, {}, {}, {}, {}, {}, {r10, r11}, {r9}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {0x0, r11}, {0x0, r11}, {}, {0x0, r11}, {r10, r11}, {}, {0x0, r6}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {r10, r11}, {}, {}, {}, {}, {}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {}, {r10, r11}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {r9}, {r10}, {}, {r9}, {}, {}, {}, {r9}, {}, {0x0, r11}, {}, {r10, r11}, {}, {}, {}, {}, {}, {r9}, {}, {}, {r10, r11}, {}, {}, {0x0, r11}, {r10}, {}, {r9, r11}, {}, {0x0, r11}, {r10}, {r9}, {}, {0x0, r11}, {}, {}, {r10}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {r9}, {}, {}, {}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {r9}, {}, {}, {}, {r9}, {}, {}, {0x0, r11}], 0x40, "f453d316142c9e"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f000005fa00)={{0x0, 0x10d378fa, 0x530, 0x81, 0x9, 0x8, 0x40, 0x9, 0x8, 0x0, 0x9, 0x4, 0xec6a, 0x80, 0x101}}) r13 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/keys\x00', 0x0, 0x0) r14 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r14, 0x81f8943c, &(0x7f0000055000)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r13, 0xd000943d, &(0x7f000005f580)={0xfffffffffffffc5c, [{}, {}, {r16}, {}, {r16}, {r16}, {r15}, {}, {}, {}, {0x0, r17}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {r15, r17}, {0x0, r17}, {}, {}, {}, {}, {r16}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {r16}, {}, {r15}, {}, {}, {}, {r16, r17}, {}, {}, {}, {r16}, {}, {}, {}, {r15, r17}, {0x0, r17}, {}, {r16}, {0x0, r17}, {}, {}, {}, {}, {}, {r15}, {0x0, r17}, {}, {r16}, {}, {r16}, {}, {}, {0x0, r17}, {r15, r17}, {}, {}, {}, {}, {0x0, r17}, {0x0, r17}, {0x0, r17}, {}, {}, {r16}, {}, {0x0, r17}, {0x0, r17}, {0x0, r17}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {0x0, r17}, {}, {0x0, r17}, {}, {}, {r15}, {0x0, r17}, {}, {}, {}, {r15}, {r15, r17}, {}, {}, {}, {}, {}, {}, {}, {r16, r17}, {r15}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {0x0, r17}, {0x0, r17}, {}, {0x0, r17}, {r16, r17}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {r16, r17}, {}, {}, {}, {}, {}, {0x0, r17}, {0x0, r17}, {}, {}, {}, {}, {r16, r17}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {r15}, {r16}, {}, {r15}, {}, {}, {}, {r15}, {}, {0x0, r17}, {}, {r16, r17}, {}, {}, {}, {}, {}, {r15}, {}, {}, {r16, r17}, {}, {}, {0x0, r17}, {r16}, {}, {r15, r17}, {}, {0x0, r17}, {r16}, {r15}, {}, {0x0, r17}, {}, {}, {r16}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {r16}, {}, {r15}, {}, {}, {}, {0x0, r17}, {0x0, r17}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {r15}, {}, {}, {}, {r15}, {}, {}, {0x0, r17}], 0x40, "f453d316142c9e"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000060a00)={0x0, 0x0, "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", "bedd790645b629948fe7a912439d310c35babbee34c42ba037f90c903211b9ba0b61b1e70b479551d1ba01a22c91e14090a39a00685fc1822cf94cc4e3de882d581fc422aaeedd052a60e2c00f7051181d061f7bbbe38375301eb8e40079ff692a9d5967726f3385da16addba4329bd5bb14354fce0f51ea690b32309773d42a23b9dae96ec059458d50b2d0d240213e04a4a6c378594e65f0ac2b7b85f630dded42f4616281e515dba83c0cbedb94efa16e397636d7089319ef1395b8061d346e77666b628b55360138a1bd0e082b0c29923ea7912913453dd176fe837ec53a9adc88c636663d808b9a941dd957138beb2fd018c67eb2c82d10b34ea813a4f947ac5becc51a9da28671f49b1856353874cbb520bd7190d86189972a380ad7bd06c9fd1e8fd81adf4527fc9e0b50e5baff79d80136164865caccaeba6eba1e5aad31bdd24acfdae6f8e36243b57c38751026efb7b437f67d70fd0e80f5ad4b95071c575cae679a7b49aacf4fd359bc2f66ffb86e28ed2baad4b903794afeebec32cd9c9bec5b48042529b1774b7dcd90718af6a79078a5b527448c3804daec363ab70897d289bb2e51d3419548ae2217fcb296f8394d1dedf7c2dd0accdfb5308b5eeea0ef946ad76858362ba675dfb55e15f5298b2757ac1720f1fa990a95cd54717f22476df9608fb2dda371a598f46b06319e3ff94ed0728cb2b210b1efa5b00fe1ee98adf3ecdd52224bc923acb74d79d06591304e859e9e7c2d89f8252aecec61e944306a825487dcb79c0ec175c3848303694368ec7fa83a515db42b0f88707375592c2ef7d795b55214665b86b0b2944ff73631ccea81f525e7f225f652892d356edecc85641a0f521d27ba8150c20b8c21da07d275553b01618d14c89118e7c4b6be3ffc64d55b300a2c3f7b90ccce04faadde74fd71ee9455d4ab25b036ada1956d7ed0160a059ca856f3093c5933c37a56feec4c0ab8420f48174cb5551908676dd3f703a59e823d67b57045c0adbcaf417fd4e29b89cd9e7b9f026f39fe63e9e56de4fdc9f0c43aba499972fb35f87b95d2ea0dbb2d629aa182853660679320250f2978ae98708da4a19114e98518c6a1410cdcf1e8da52e7571b2eb4e432f1e76650bd405b8a35b4054fbc2a94f3125776a754ca86603662495c514c4aba69a7c3f38713c513a9703f163f598839f30bf45c088ae45e65b860a2330b9e5a6a95d9b83ede1d0e7b1d2a99c108a9eaa6feb62d0efc44485cf4e4c04a4ee09b643cb94dfa71f346524647144169191ddaff2409c91390caea2987ecad4d9f19d4d494d6575fb5a3118e49bb4ba0ed61d98beaeecd258afa49f4ebfa2694b6e22a15d248961b5a8b9ccc777d4b6ec442f69217a7b0071ee9812853e73ee15b9918f845a4fd9313d44b6c0c118d65e18edc8f9b94298a01f59f27f183517a93088237c324bd4e517610bcb97f38cd58a1e13d1206ec56b9645043d52cef028a75ac3078a964131c8e50329cb63023dd705948947e70af3af595ca8259c13b4ddb600bb7055a326ef705ce56b46283ea8ab3b777358039c5d5c59816f025214720e7e7f8d2ae2ad6ad82126fad1b0371308ab91a7756ba0ba606a147178623f1ee1b11810ab5ebb4e1561e6aa844ce514adecd2838f534c251fa7d55d084b5df734909f7fb9f7e65a43046af379f429d974f05a17e584c859c9536849c4478d65b3fa5114f09dd77a82103753cbc3220d7bc32e8479dd11dbb18b094089532327b01358f7c7d0c372915c0a4e3b40ce65547f76c4316eb2869a9f791bc473b0776fc5a5fb19f2e26aa4b92312ddd853e0e5e8123102f769160be28096ed452d5bf0eb43516ab8bd8f6cc06b31aed9dbf3ab62b055a44eee0bb0af0350cf02f87c755c72d9248617375b0de64f455f633c87033f6c5c18794089988548d14ca160bafc2e0f0e418aa537a66292adaab390ec228f4d4c396052994d92e9e6200356217f10ad8b8b244415b0bf103421a16044591b9d6d53b4cea439f7bbbf48f89baf1a1c1af4bbb486bc2399494290ceed37f3e65ff8683ddcb5d90e9e2433d9d072c28bedf5d755b01b9c0d046a5ee637c5af6d3204c4e25d49c06c4c08b9dcd85147580e2b891186f0160c4d572af500c7a253f588f0dd622529dad52315426ba2adccdc3a2cb8e39f7f3b2dd5d349ce002e7492cd62929709e378d57c19467682330c9ba2c8a022d2c36a654dd9994cc51265ce61dc9745a1f20edf2fc4837d832fcd002ee57c22c271601c272d1be6356f15c561c4a56129ca162b66fe8feb5ff3458b41312fea5c552078c5a6c6cf748c2c9cd479d7dfa964f93192d6420e63f3ad258e7e025565b31905ec13f708faaac707b87f2a8d90cde65b23e8ff67710fd971308433351b89a54dd3fde193d7269d741e911900d04d829bab6712dd6ba7710132a5d315fdecc3e05e6b46d28c146a01499691c62a200d8566997dc7e8edb01880c002f7cf306ae098edce7ab523dad75177be212ed5730498a512299157121ded7f4b2076802d44c95ceeb75c0cc5b2510276724707c8ff7553390dc85143652094ed14a7414734a89e26c239b0b77668c49451bdec03e3c870f149501e1a2d9f254f38a1ac304a2ffe29e7ecf9e40e7ee16c06c23b8d348fd7948babeb5a2fb8443f4a1a5cdce403badf65c362344872aa573bccdcec1dcde302c7bac7ed8745820944a004a6980b6ed9ed71244941747c89b2f46903d808e4907c656d83eb8dcfb6758b870d2bba8715867aa06c2589b9d4cccda0c2869a855eac900535abc5a93640a732e030365ef7fefffae4cd4aa2f86c6390c6aa0051b16851acb1f58c7deaa786e94031a70809b221047b1d6c458eb721c6ec2a2981897d94d14ecf9305fe7a44b81ec5a557924a2d87b71a862b4c00f9851e4188932d5179e7eacb99b6b2921e540c235e5b9b0ebd2583583a02e226e5138d4fee7566780991bee30f8a4b9477ba296b1ebd71c8fbb413931e7c9774528c81635f6259dc95b9d62e2b37d4fb85fd695307d9a594ba107e27924aeb393d9322590d4a2161a8dffdd70122cd2a0f273239e7573fc7ea10864f53ecd7ab36aee3c66c8edc6d0d4e346836f09f5c2454853af514cad5db7b22e5b02330d04f91b2741a3a727589b03bad66b9942121fe19982d6144d328cc920a15ad88dfa5a0647316885d6be2ad20733b4cf86e1f7c96b2ce075aac1318a46a64b6fb8b756d34642aa67f7ab20a75bba1af7aaa30d704c0281b2550a422556d60ac16cec7d753ca2cc8350de19e88e9b0594149edcd756caccf75a975e3e934622b7cecb21bd962cccc2383fc6d3e14183cfab1675ff4263dbcf02babd469105abdbb6a69faceb20020e713201dd2010269ad1df47fc14ab03e29b5d95b6c3730a1ba2bf34efceeb630e77df5fd85aebc7f6f828a74c7caf7340c6b126056669ba5848b06131afabae8a09fe5f43e1574a315895776e903c49666c956f14ca35993076197b1890512999076b1359adb39ef7d5b2d1c85b62ee9a045e7be08be57cdf5510e1e1bd78b3028ff9b1643e78c1ee228e44c486fe1f065de802bfe94efc50ffcc71354af976e73b01996f4223a1b3c87028288fefb402cea2b1e3fff75767c484b035daf5586b7c555d9ce1b1696fcce01a8179a1924b734f8d65bd39cb8b5a4dab47785ce6e37c74627d975b24cd2f3c6025d807ad67e5488678aaa5996e42c78438a2db7b72a850cfaa3fc264937f02288c06419a27b049ad728583c5e7a96a312c159eddd9fa39dc426f5edf333c8700f724b4a514f94937945bfa1aea654a617c4b6406dac15fcd14355f0d73a0c353f7e29b83ca19c4409875c920c277805d8da38761e630c733d1f67db2e9e8d5ef11490eeb82e4a973f5d2d261528aaee5f7592f0505b5915e58509d124e7f4884047f33ebb0803102155a7c463ba28d7c812a4febe5d731cb49425858f1134514c4e59c452345f2b4c8ca4557afb7c18b4f6a3396db5a69a56cb96b909a79e4654ab8b009a59e081e7e3d3b89f76a26e761b2e127680a9d2194997209516c5117167359d291a5aeffa924e3cadc84850fa667826ea41305efe233c49d43124f38d13a248dd17ceb7525804a84d17ffd77642ed2c5ea06ca323c0d8a17da85864288f7e1963870587870889215adff5e459624f076dd53c01d19d5dfcac500db4aa3df263308957ea65f1ae13ac41a3f703f18e5a9f4fc1aa160a99c63f2a1bf7d7239a76afc44c67ef645019954a91cc4befdad1d62614481cde19ac95a7a32fb61a6cc70ccb6db96c4c20af55affe17934b02dbdf4aee075e36ca4ae9ed019fb0dbe73b6587a4645967edb88ce0a8e5da5160e364d8f594c627b693c2c62898ae7b159cd9a39d5493052354ae6ab5bc522c26bb3999f4f6c5df7fe2aac85afea6e5fd1e884510d5c0be396c2081ede87620fe9410d933e1d41ccc696934dadae9f951c843c47c5e8efd98b2c62c7c38512c692900926da8757d6eaba50b2997ff106c11e383a9330ef75d916712731cdbae5dec513add3d610cbac5f45e95f831d9dd1585c25da39c7be6f4e0d8d8513ec7e5b99dc586429e6217e74bac642cb7681b20c5a3ea98d27e36f830d5cd3ec9211168064362008ed542434d5dca914e972a2c116ac99d9ddc7fb842ea4dcaf47c6aca7312b84f0cb24d07e951e53d95ccf33f8d7b9ee79eaad8d66251e2ea79f951f59e61fae183c1431c470a4faa0a7b401911bf6024e1f35dcbbc7db4780e316b75e822b972e9acd6484ca2e2f604555ae1b34caa165c7d93d3acc39023014be4bb7bfb61d579e633b88d54d33a36cfe550d86004707e88723764e54d9fc18d22cf7dfa6ec31a25a6a25a6472c0d3dc3cf382e124558c49260e1247799fb31d22e2a29d65c28c9627e2a83c33f474014b76f6ac1ac7cfaf39689e4caf906eba00c766b6115bd6c8c5cb2605dc5564e100c2c16c7ce89aa31a550f4b83ea7fa49469d122470e69ab1fa4909939f5ce474a74ff1bdae90907f6ad13433223f38dae97f15d7cab2aebc92c18509ee808f6efab53cb0d2e30aad5e9498d58e93f1417928f4f25b4e2387118008e59ba0e146001c9ead9da45d3dad866d8d68b89d54d164f25f78cf30b9fe3736fad6a927b08783155ec25cf1a5c3be84aba863107313a2c9153f85d16b88db0be63510ee8874a33206fcb4d67aec0a9264abd8b97b35a29ce04da98251c350d8d7dfc0ae72a0c631b5f01d83d8a451d0010d4fd0a87769d87e7fa24fc3bd0d67d362085b03bab37c3633670b60248748614aa2562a55c402a9dfed48c18929d69179989c072449bd314a0497f7b9bf7a24e2d71ce0a01653f14f256094ebf6028d372faebc68"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000061a00)={0x0, 0x0, "dfafbb93b740dd093245a5ef1092711e0ba04e0a1ddbfeea07d60da1dab8058821185adba00414a44dd4669e7f8232920b1edcdcd12db2f7c76453bfb58bf88272826316a1522b4015e8118c3855972c3e2ddb12a91d6fd357b9af994e8e81c12358ddd7840433436bea5cb88e2a335fd2aefa398ed5a60ee25bc3e01f38c8073e5dae8d04528dbb0c50999f2f6cde5f0d8a2b2058c3d765d023f2c9e38bebe85c6e80006152a57ec3ab3479e3467c8cfe89466a0477c6a6bb7a69998ed2cb47e8fad57b05b7a1ab38dcc54ab0c8746b37d77eb08e926ac8ff03f0aa62ec5e011d5f06a7311f9bec19cf28984914b8c0760f6d9c896901dce6915534ce1ec3d9", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000062a00)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063a00)={0xff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}, {r4, r11}, {}, {r12, r17}, {}, {r18}, {r19, r20}], 0x1, "2aa8f787ff58cc"}) 13:57:34 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140002c6, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 192.826808][T14656] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:34 executing program 0: clone(0x41fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000280)={0x0, 0x0, 0x2000000}) ptrace(0x10, r0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x18032, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002440)=[{&(0x7f0000000140)=""/108, 0x6c}, {&(0x7f00000001c0)=""/44, 0x2c}, {&(0x7f00000024c0)=""/4098, 0x1002}, {&(0x7f0000001300)=""/234, 0xea}, {&(0x7f0000000200)=""/122, 0x7a}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000000300)=""/6, 0x6}], 0x7, 0x5, 0x27c) ptrace$poke(0x9, r0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x4598, 0x840) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x8, 0x7, 0x1, 0x0, 0x10000, 0x2000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0xc00, 0x8f, 0x1f, 0x6, 0x3, 0x251, 0x1f, 0x0, 0x8}, 0x0, 0x0, r1, 0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x2) 13:57:34 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$TCXONC(r0, 0x5416, 0x0) 13:57:34 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r1, &(0x7f0000000000)='./file0\x00', 0x109001, 0x122) 13:57:34 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x49, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 192.924615][T14678] loop3: detected capacity change from 0 to 136 [ 192.961993][T14678] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 192.985596][T14685] loop5: detected capacity change from 0 to 264192 13:57:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:34 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000000)={0x6, 0x5, 0x7, 0x0, 0x63, "d866f1954ebddc767ec28bfd1c4b200790215a", 0x6, 0x2}) [ 193.064744][T14700] loop4: detected capacity change from 0 to 264192 [ 193.077700][T14700] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:34 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x2) r0 = clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(r0) r2 = gettid() tkill(r2, 0x1000000000013) r3 = fork() clone3(&(0x7f00000002c0)={0x1000, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0x14}, &(0x7f00000001c0)=""/121, 0x79, &(0x7f0000000240)=""/4, &(0x7f0000000280)=[r1, r0, r0, r0, 0x0, r2, r3, r0], 0x8}, 0x58) 13:57:34 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140002c7, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 193.133510][T14723] loop3: detected capacity change from 0 to 136 [ 193.140834][T14700] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 193.158161][T14725] loop5: detected capacity change from 0 to 264192 [ 193.160340][T14700] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:34 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x22b01, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x5416, 0x1) 13:57:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:34 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x5416, 0x0) [ 193.181391][T14723] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 193.297968][T14755] loop5: detected capacity change from 0 to 264192 [ 193.313306][T14754] loop4: detected capacity change from 0 to 264192 [ 193.328482][T14754] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 193.352201][T14754] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 193.364197][T14754] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:35 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/237}) 13:57:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:35 executing program 2: ioctl$TCXONC(0xffffffffffffffff, 0x5416, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000000)) 13:57:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:35 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140002ce, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:35 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x801, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)={'U-', 0x81}, 0x16, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000001100)=[{&(0x7f0000001140)=""/4096}], 0x1000000000000159, 0xda3, 0x0) [ 193.794193][T14777] loop4: detected capacity change from 0 to 264192 [ 193.801795][T14777] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 193.823601][T14777] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 193.835015][T14789] loop3: detected capacity change from 0 to 136 13:57:35 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xd9f, 0x3) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000080)={0x8, 0x7f}) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f00000000c0)) fcntl$setpipe(r0, 0x407, 0x8) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x3) ioctl$TCXONC(r2, 0x540a, 0x2) [ 193.843070][T14786] loop5: detected capacity change from 0 to 264192 [ 193.849421][T14789] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 193.869484][T14777] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:37 executing program 1: set_mempolicy(0x8000, &(0x7f0000000000)=0x2, 0xa) set_mempolicy(0x8000, &(0x7f0000000040)=0x6c8, 0x7ffe) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = signalfd(r0, &(0x7f0000000100)={[0x3]}, 0x8) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000140)=0x7, 0x4) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/consoles\x00', 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000180)={r0, 0xfcbc, 0x58}) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000001c0), 0x4) set_mempolicy(0x3, &(0x7f0000000240)=0x80000001, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:37 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140002cf, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x604000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x604, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:37 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x8, 0x7, 0x40, 0x5, 0x2, "444416ea1aa6a651"}) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:37 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xd2b40, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x4, 0x80000000, 0x0, 0x7ffffffe, 0xd, "a30e32db99baeb0600000000e200"}) r1 = syz_open_pts(0xffffffffffffffff, 0x4da43) r2 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000040)={0x0, 0x9, 0x69, 0x3, 0x3, "0a0fbee9d806c1f62548f9a21e9389d054a81f", 0x2, 0x7}) r3 = dup2(r1, r0) ioctl$TCXONC(r3, 0x5416, 0x2) r4 = syz_open_dev$char_usb(0xc, 0xb4, 0x3) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r4, 0xf505, 0x0) 13:57:37 executing program 2: setuid(0xffffffffffffffff) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r1, 0xee00) ioctl$TCXONC(r0, 0x5416, 0x0) 13:57:37 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000200)={0x101, 0x5, 0xffff, 0x5, 0x18, "46029fda042612e07c3c4549504b3cabcede90"}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x8, 0x3, 0x7, 0x80000000, 0x4, 0x101}, {0x80, 0x9, 0xc69, 0x200, 0x7, 0xb}], ['\x00', '\x00', '\x00']}) ioctl$TCXONC(r0, 0x540a, 0x2) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r3 = syz_open_pts(r2, 0x0) dup2(r3, r2) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f0000000240)={0x1ff, 0x1, 0x3, 0x200}) [ 196.222628][T14829] loop4: detected capacity change from 0 to 264192 [ 196.229324][T14828] loop5: detected capacity change from 0 to 264192 [ 196.231871][T14834] loop3: detected capacity change from 0 to 136 [ 196.240834][T14829] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 196.262865][T14834] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 196.277562][T14829] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:37 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0xffffffff, 0xc280, 0x1, 0x8, 0x16, "84a6ceb54532ba6925f9dbe3a0f6331a156909"}) fstat(0xffffffffffffffff, &(0x7f0000000080)) ioctl$TCXONC(r0, 0x5416, 0x0) 13:57:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 196.319546][T14829] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:37 executing program 0: lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', 'trusted.overlay.metacopy\x00'}, &(0x7f0000000180)=""/166, 0xa6) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x1000, 0x10080) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x8, 0x804, 0x8, 0x8, 0x13, "771b7e9dcea2baad"}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x20a9c3, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x2000000, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TCXONC(r1, 0x540a, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) 13:57:37 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140002d8, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:37 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TIOCNXCL(r1, 0x540d) ioctl$TCXONC(r0, 0x5416, 0x0) 13:57:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 196.425313][T14866] loop5: detected capacity change from 0 to 264192 13:57:37 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TCXONC(r2, 0x540a, 0x0) [ 196.488665][T14875] loop3: detected capacity change from 0 to 136 13:57:37 executing program 0: arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:37 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TCXONC(r0, 0x5416, 0x0) [ 196.533958][T14887] loop4: detected capacity change from 0 to 264192 [ 196.555104][T14875] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 196.574333][T14894] loop5: detected capacity change from 0 to 264192 13:57:37 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140002d9, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:38 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x60003, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r3 = syz_open_pts(r2, 0x0) dup2(r3, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f00000000c0)={0x5, 0xffff, 0x9, 0xd62b, 0x7, "0348640b408c72e9bcd2320a06855138dcf2f5"}) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) r4 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f0000000140)="a4dfc46e3dd1dea116ded8f50bc5def765ff4c09ed4ffd9e4c4c6903fc19e78073956cb51a2719d01832703dffa6fc0b6cbd0cb31eb16ad7ef5f40d941c4b4a12cd2ca03be0e7085e631a3402d685bdd263f732a0926f9cb976a63ab31bf97bb372231353c3310967d3749a4c9a9ee291aff16e9ac21b0aa2187f9fab298972529ddb0255e953a130b213c1905895500c219ab338eef0b97d1d20e06882d48f0ab551fb89bf2300015700050e1f12fb33da7b0c49f011c92aa2268dd544797102f44f3977a5c3cc3c4489751d5261ebdbb8f0aef091ced611dce544b3049ec498aeda834edfb11f350db6b168e1cdb4d") [ 196.584883][T14887] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 196.604909][T14887] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 196.614780][T14887] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:38 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCFLSH(r1, 0x540b, 0x2) 13:57:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:38 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$KIOCSOUND(r1, 0x4b2f, 0x20) 13:57:38 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x40) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r3 = socket(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, r2, 0x8, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x4cb}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x2}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x801) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x74, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x74}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x91000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa0, 0x0, 0x4, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x4, 0x40}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0xa0}, 0x1, 0x0, 0x0, 0x1}, 0x8000) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:38 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x4001, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) syz_open_pts(r1, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x440040, 0x0) ioctl$TCSBRK(r2, 0x5409, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600000, 0x0) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f0000000140)={0x7, 0x1, 0x8, 0xffff}) [ 196.713546][T14921] loop4: detected capacity change from 0 to 264192 [ 196.733774][T14921] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 196.745573][T14921] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 196.754967][T14934] loop5: detected capacity change from 0 to 264192 13:57:38 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x18000, 0x0) ioctl$TCXONC(r0, 0x5416, 0x2) 13:57:38 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140002da, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 196.795171][T14921] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 196.814135][T14937] loop3: detected capacity change from 0 to 136 [ 196.817839][T14946] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 196.829122][T14946] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 13:57:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:38 executing program 2: ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x6) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) [ 196.848584][T14937] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:38 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x96e40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 196.938584][T14963] loop4: detected capacity change from 0 to 264192 [ 196.947467][T14963] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 196.962315][T14963] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 196.962406][T14965] loop5: detected capacity change from 0 to 264192 13:57:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:38 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x341181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f00000000c0)={0x2, 0xa228, 0xfff, 0x400, 0x15, "81fd89518f5899f3ade4f49433312186620ef8"}) dup2(r1, r0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fdinfo\x00') ioctl$TCXONC(r2, 0x5416, 0x2) [ 196.976462][T14963] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:38 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140002db, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 197.090135][T14985] loop3: detected capacity change from 0 to 136 [ 197.114509][T14985] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 197.131414][T14995] loop5: detected capacity change from 0 to 264192 13:57:38 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) 13:57:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc00000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:38 executing program 2: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000000)={0x88, 0x20, &(0x7f0000000080)="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"}) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) [ 197.236217][T15006] loop4: detected capacity change from 0 to 264192 [ 197.272569][T15006] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 197.305199][T15006] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 197.311253][T15021] loop3: detected capacity change from 0 to 136 [ 197.326418][T15006] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 197.347215][T15024] loop5: detected capacity change from 0 to 264192 13:57:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd00000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:38 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) fdatasync(r1) [ 197.370139][T15021] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:38 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000300, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 197.516784][T15049] loop5: detected capacity change from 0 to 264192 [ 197.529042][T15051] loop3: detected capacity change from 0 to 136 [ 197.551015][T15051] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe00000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 197.573090][T15050] loop4: detected capacity change from 0 to 264192 [ 197.588695][T15050] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 197.605412][T15050] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:39 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x20440, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x3, 0x80, 0x40, 0x3, 0xb, "74a305f36202a62f55c3b8a524efc04f6fca77"}) ioctl$TCXONC(r0, 0x5416, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x20000, 0xba, 0xfffffffb, 0x80, 0x19, "54f80e99274a6a37a6707a326298dbbbd677c0"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TCXONC(r2, 0x540a, 0x1) [ 197.636427][T15050] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:39 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000314, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:39 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000001340)={0x2bf0, 0x4, 0xffff, 0x5, 0x6a, "e76dea2ba522ae9e74f730b6aee8fe7e04cfd6", 0x401, 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000000c0)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000000340)={{}, r3, 0x14, @inherit={0x70, &(0x7f0000001380)=ANY=[@ANYBLOB="0000000000000000050000000000000000feffffffffffff01f8ffffffffffff13000000000000000100000000000000010000000000000006000000000000000200000000000000f9fffffffffffffff8fffffffdffffffd7e2000000c07d20345cf3fb89dfaa2a88ec7400000000000000000000000002000000000000ea150736e5fc4f5d"]}, @subvolid=0x1364}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000080)={{r1}, r3, 0x13, @unused=[0x3, 0x1, 0x7fff, 0xd6], @subvolid=0x2}) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x2, 0x6, 0x200000, 0x5, 0x19, "3dcb8828879b074ca91e8093dc18e73fe1c040"}) [ 197.685876][T15070] loop5: detected capacity change from 0 to 264192 13:57:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf00000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:39 executing program 2: ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000000)={0x1}) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x7ff, 0x5, &(0x7f0000001480)=[{&(0x7f0000000140)="0450f5c834a098e55e6e4a1dc5067284ffa2cba399ed35e127316347dbea5a1eec5dd5e022d0132e06b0b87b491746cca5c3604ccdf73003ce0c5048a070a209d4f1d7b0610122a377561ffac7f3af1ad0f2397cf49980b70d17dcfe03ceebf4202ab64418d64879ee960fb773ac03afcc5ebe96603d861d818e0a15f8bc57290beb201bcbdebea262f2da5df406dafabc00970bd66c3f7cabee03317283a052628ff1eb9b7aa2e5bf0bd21e38270e0fbb194ecfbbc966fd11", 0xb9, 0x401}, {&(0x7f0000000200)="3ed6f4fa22c23a773b304bb07073cae04a1f482565a9eb33101772953eca75e47358169be4ff5d9c300271cb64945eccebe70db038a8e8b0d4b645f37eeb34f7255969be03d7c18f1f71f489559f664cde672088bb39d4c57a27a47e88f079cdac9b138a7e81c4758f518b765291a5fd8a0ad8931c021d74e090fadf8e96d2915d972c9f6c6cb7fa3220e2ae0bd68aa0a050bc3e64523d594379d2574640bb953db8246b5209569e87e7dbbf93fd9c589378722fb812dffeca5d02e3c283163fe6fd602f2a60b8a47b7ac92a91cde458b3d9c400f8226ca753b7897fa7c635866b28aec6c294752af33d1351aad4e6c22e6970178fff4cbac90ce4fc7e76526fa381f957cde20592d5a4dd6b64c50183a5d4b92514896cc048b06f92b2d8c1d1c085b7341d1bb719ec5da1d26bdc1cedfd996896985710dfea918f285e6574e5f45b4c15ed40849650c4de3fa088c8626d3c8271ac8326001a30a23aac6fa0084743bc7448834ff005260559bbf5a9eaab86d77c9764cc3ae28a92d14e72265ca9ad5b6ccc65567e8c0705fb0b5e367755f41cf25b199dee969177dc670f278069d4f05423c3c08776098045dc46e38638d7a65a4c793abae563d136de7f5a7238b548855ebec29879147549af6747768cb4f49133f96d08ec1beb6c3466bebb0915dae6a46f788ca21baa389978b86f0260c12f7dd0ab5128f60bff45cbff9c07463fb9907d965b723db9e8ab4ad5100604be80754f710fa7cd61349470b0219f71b277c7777b461e3db7498d6fd959dc96f1f7b0c90aba4a5ee04224cd6c0ed998130b7b5862e2fd23b89e381a7ec3b4af24b313fec74f30d19f168bed0406396136a533e7fb623065e012ad774fea279069221d34b7600877bc432331d91d42c221bb7bf400fc3c5355f766ad3f1144b65d9314b5152b35d2fa84e740555bd1bfb320c91ca9bc608b1bcd7bcd5c05e78a5dac8df8883baf1a870835561390224b6124dc10efc90b71d924c7847de57c114965877b33a22973f304e081f9a50eb85460feeaf49f29cfc9f643bf075f0bc5533e39e1c9bc057573f179540ef62827cb1339d46e323803b69efce22392157976f7cb707b61b974207c6cc28abc0d6633e9e12df3ec8a70f8f30279c964fa6372aa99341fcefda7bc5f0fc2f544818b5cb48b26f3fef75eb08a160a8f9a7749afa20bc8132cefe21f37158a8a2245ae07f29618919cf40d3c04db8c71a9daf2874b2e9fa84313a0f893eb6f481070dfc4873dd44da3bda94a271f401ed7b6ab58b9128cd4eb8ecc7cb45ddb92336d91cc4bd4984b65ef13129a0dafa2c29853305fa3f01cc3ec02c5c73c1bd6a449a4fea530dde88d61b47442fede40bf16f9c7f989a84bd1549e432897eee12693d87d16cbdef9bfaa2f6ffe6216f84e992babaf799bd98b30a0ab30066a3f7134fc1a7702fa693fc586ba4f385cdb46cdce82188d738e54950a39951e57545c475effd4b58e09f5752fbdcfe3b338167001f767e24e36e00776dd2c59c134d279d54a161a12c0c1e9a8df55d8c832f7a443bbda8436771bf5035df65615a797e0b6024020a124856aa8cbcb82eb9a9026042e7c410728396a5542d1748cae101a8d694fc3aae6c680cae98502c4c925a661d77550488f98019deb6ef58c4ef76fc9b7d412756ed10e466bb4cedc9e46e29145df4a9be87c368e299d8811b6db24cff963469e534d29cc15733f8c05fd34b2c61cdae73df1051df89873d8fc838137b543ee89a58725aa96a9d5d60025ddf06c91cbe00a2e92a4b3573eb772c90d4c4b74cb23583a164c6e26fe626f26fb91a9a86f8a35185a4d8fefa54cecfe922ff25e287c3d99c56f2f01199b3dd16d91c4874fe931326868339d51dd5947cfc461f551d6ee5fafd06c20eb61204097cd1483f8e3cec6375c9a58a9e6be5a1f6f57f4aef369b01faca15ad879a8bc1056adceb19c02ddfa8a24378d0ca8a8f75aee0faa35f3b3a96248444a3df0a9748c370383e278e36e3d2af948f8084bb10315639c444687f7b12802798426c5411f6cc29c25a25db42e7e813e58fee4f5ea83dbf8db38dc8a73920429f9bb91ceab1a2803eee266ed216001e3889c75ddf93904f1278afa9a4f4518d992afb22fdaf1c7cfc2753354a25ef38467096db7aa3c402a1645fa41a43fc106e17a0a1d3eacef65e8e7453cdc14ab42d407b9cafa37d985581897cccf908dcee60b03f85a297c07744e91380997c6effac2d0a9eba78f6648a8db61d86695b44a2cf3727a73db912b611e005b01728a2bd2543db244167d6123944df1acd3b5842d8c28a187e4683d47ffbb5841c0b12cd6f01b102a635cba91770db75a08ebc62318a9eec1d05de015fa29878ea2057f106a7ebfa3521544a4628c4e9202c17aefad8f6cdd9a9a13603b8a54a87e17211c077c445f8c63c1ab0c0680fa006cd9e924e82366c5e22114a232cc440790d80ad61e38fbddd2e9b56331d7a762c6adad43d7b56f8a4d80c08c9885be3aa4278a1e7ce6ae043c3e94847abf562ccf23aeecfefc8986dc12937c886a41c7d2bcbc9ed917a1f28eb83610125250533848d23b6c911611c0c2491db5c5670465ca6a8d3bad9e1706adfb733bceb26c9cef20a0c1167d726f70773b7f152fa54d2613393fbdef3fffe965786b6e82ffd5fa51cee6e65ab3a1b3797ee1dce1521fa282bfbc1b00b060a6d70c6eea5a5b5ceffd4481df97794c8decfadf4055abe5440df2dd0be413a74b40c5cb96a77a0426bfa83792429b35e40bdbbf27a73be880d40f1de6608c8d03c47fe72caf80f8c0de2c5e29121028669fa5962bb7880d1582e07fd63211fad5d4be057a118f4581817f62563b7fc04bcd23a05cd0ef5acff85e46ed180bcf9307b73dc08837bfcbedcc3de8a84a2adf9c49b3f9419585cd07a3d682d8826215ef1df01b6f6bc08e4e8a4af33fa4e1701f2332725333dbd5beb034a69607394bbde36dfadd4096157d99672d746ed97be150159ac137d4a65cd84afd57a789b56ab9dfbed63686c7303177ecac5428e62fa1547f19c4d3dcb31cc91dbfdf0bb94a464d726ab0382ba57a1ae5970824ae380f1505b149561ebfa72f296efdc2f5684ed246d609f511377f6d51e7763e096a4021cc0831a5d77afc5a7ba8c0fd597958cd6bfa5cc0150dfdb0a5cac9c9d5027fd829ec60accfb0f93d888d6fcbbaddac5df133a34e312d2cce40a790f110d0fe45941d170f55ebff3e06a851c364ad5972335e926a4a7c87ca2487b21f2fcf920be53fa058dbd269109d750c0cd5eba2c9adfaae6f6ef2f0c63d47baa377b821ea3423ff43cb646cc345d1118e96d450fbd9d419e088189565a330e388f9d755692b3482682133f97f1531b1ac6e005c0f6cc6915b82935bd4d48434ba1d32f3242186a9f34366094819de3a0c5ef741f4a4d2510da6171faedf2e80a255d7ff0cb576d07aa3b8e028b8fd9db5202274dec8714d3977be80bdac9cdd6e3a31e86402eb232f094b773d5c91e660a382d6aea3cbde2bf7a560e3b52f497377d75a34aebd19fe43d5c918b0552b6fa1e1716a3285484faa1331d8d502dafdb7b4bdecb29c19e85c230b37b3534fdc31d69b94ed0e213dcffd229181a2de36ce3f6c80196e47133f59996d2bb115b6e3afb7bebb6638603608309323ae9e73ab7b82cd803507c3f14e71c6f94e42907836bd9cfbc46880c54ac7c2fec4925c5bba75accbc92fe9d9e75f827eaeff7790b01516f163f34d56ed71e228605b9048b7b35551014c5f62266addac56e649aa3a220f938d463741cdb0fd87bec0ab2c8129b347d8ae26cb564cc544e767cb5f3945f9e9f50ce5f73c1f0e9d26d6199770380e9f0046f4954f097d15542593d8f311a73a3872eb603ac363e9b1b9cd8f44d755c7689fbadf146e7ea3943b03bdbe24cd9e5ff644a4bef0afafb97adaa7b0f7761b7cdb670f52435b47d3c5d066068704c2bc922b1fdc915d1f2a91594771f7689d1eb4f8b8cc589d3a419f37af270cd87a752f5d203c0a3e38f57aeab96387e1ab1b1307103045b9219379585157d87301248438f11d1db26d89405360767c52b913d3be6cc489cd6b5088f60ab52ca80b5e33796561b2830a30cd2f4622bcfb5692bcce20c0fe0f58356c317ceb80614fff70ba5153eda72467f95d02cb25573293d1129bad90f5cf994c57807c7c028761b9373f60bcf0f6287061a2b4a3702d6c5e2e19f1bc343f4ed34519f380a4d5315bc987f023dd01490e42c5cb17322de42bb5516a82dd4223be17c4d0397c28197546d2ffc24eac243790dbbdcad9436fd999fd85e6a8ac4c6e9bfd1b8ec0e869b552268f10eff72541ff014e6a89efe6ec9b779719edee068a34db1d209b347b4aab9e19af0dcd84b4160e0a5bbb9694747233ea55bb9464651ccc2aceba66f46bbd1b42091abcfc90310d0e438b101b0ce15cfc55d105bd667229fc0b6961db50a3bc8e560a6f4986573677354517527173d3fecede3420e7b1defee177618ef2f3d6515422bdf6a917acfeb9019757c26109c319e7f667f77294c067211b9b14965d62708fba61f6a811f52948cbb64a931e9ee33a9ff69f0011b7cb95d321b9b51b8bd4e5959bdf1cfccc48d1a62190beeff1cdd033e892b87de7dbabc0741b6d8301670a9b03cfea99ed838054d63f409d1fc4073614ef96c920b6b4cf4f54d1d61c9383cf8365060c352a2ec02e5d4ba22f0d25431cb819f212f6a5c261d24dd63afb029ea7d31a79b272e703d3362abf0d9752a2088872d432d7fa1a8dd91930239904740e3e0dcdc4a1e936425b7a0f5e9d50ed82ccf63794120647a2462bbdee5974fb9716ade32164a88815d3086f142c904c0f80367e434fb0bb46b092afdd3c07d3af0ba11566df8d93749603231b0b76b5364ffa6e8471ba251b90b37f2675877037ba58e810122134ef59805be630dbe04358005d3e9e34a7ff30b0f4d122ee6b6d25e623ceb2212790efd9751a9a2c1b01cc5b077c2d97d117dce211dd99f2382d469584a33e0d3e9286b71a14f737a3e85a4f6616f00be20e0d7ea1590fbb2fa675924b6c91e4202e7e6dc39251d3d2a3c87ff98ddaff601bf7e43bc60c0e6e525f7de50a452389ee1723b759173e265dbf98eab32f9a00791a0929825c4376d998632f9f0c1a69f427d69e17cc4551e2aa3c285c858952eb95820a204e94752e81ce45a21e02ed343ebdc3d6db477b86ccf1ca04bc9824d2c172211e22f91501258e40dafee54530b9e37c0498d16b38ccd7cbe3204681ff32b1452c36c77246685c08b20f81d631fcecb0d4f77b44d7a9e455f37973fc8592150eb1f19f24679a8e779284b687187203aec3af560f521e04e4044514b01983c62bca3c5723c419795ac17dc5ef9379e5a62bc4905a2f9fda55ecc45aa85229e41a8aa3b2999a906c45905fbcc22da12c1d8593aeb1cea7874a17016405dae399f89778e66eb2c0c44b415f8120f0dae7d6099640f7010bdd65c0b50698a55b9a251e63b341f54758866e34837140bab728ee89925866706284e653dc6abec6fdf2329b9cc9b7e8b672538a45b8b03637b1174591b12d4874e13b47e064c08114f8bed87aef4fa046a43debc06c5afd817fb971c4019d74fac117d519721e49ea0615090ce0aa45999c6dcd5688dd7a4210e37c23493f3da0f01bb957241c5dbada0949f3135b848d05ba9c0188d08d012a3b423eaea49d19d1c64340fc38aa22e0ebca82061af4346ac392d988461ca6e23640", 0x1000, 0x7}, {&(0x7f0000001200)="7ca2e17f46f80c1bb235c7158888ea680df84a01d384cb4a6684f5f19aedaae4c506bcf2dd95fd3f73fe1bd7b4ca55fd3829f5f5b459b492c493e73b0dc84079d93098fdd2ebc570fcce6d3d969080a3cef4981f5c76ae1d56079b9b45ad6e767a16927ebf5b1038a9b839cdf9bcce15cb730ae82b8a9043056d3f9136e2444c52ea61b09572fdbd26b3e411ab2e7e275fd1cf7be4386d10fcffd7aee78bf9d3d7ec3987632603dbfde89e9a00a49ace323f0e99f4e801d35b5bef8ae66ef521f620421d5f84625e77f252", 0xcb, 0x3f}, {&(0x7f0000001300)="da2090b651c479e04d4e91c253c0d44a42af204c35573fd433ddf3d0ac8870b51b272779bc36bbd2f2c0178a0914d8baf862d318fdb338f7cfc63a0d4d52d3de6bf7cc0497f70c71f9dd7c63db0a7ddc17e135bcea8aeb907f12802e9a4d1e2ef58c", 0x62, 0x1000}, {&(0x7f0000001380)="9a12e84278bbdf23f0eae85700b46789be3ec8c312e27916890056fe0d17ec7c45fe7646c103760052d0efa12c078b3ecd333c4434abdce1a4e65a87e05444d4d07ad14eed822421082a741fff558224a3ce73db3b976b7c94fd1db4f0ee10ef342df7762a150957d1c33ef51e076dfa2d57482df43e8c148c6e554f0ffc858aedaa9cfdd497e71b9c6f2412d84158c18066afd07854109ba7f029209b3fefbe8aef82670d76d2df693141131a27f18b7d82c01ad1cbc169911136f4b4cff5f5c9ea1ea7baa0223c30859ce1006b8e", 0xcf, 0x400}], 0x2000, &(0x7f0000001500)={[{'/\'\']'}, {}, {'/dev/ttyS3\x00'}, {'/dev/ttyS3\x00'}, {'['}], [{@hash}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@seclabel}]}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000001540)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001580), 0x101000, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000015c0)=0x2) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000080)={0x8}) ioctl$TCXONC(r2, 0x5416, 0x0) [ 197.779278][T15083] loop3: detected capacity change from 0 to 136 [ 197.813495][T15083] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:39 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 13:57:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) [ 197.842671][T15094] loop4: detected capacity change from 0 to 264192 [ 197.866784][T15094] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 197.882206][T15103] loop5: detected capacity change from 0 to 264192 [ 197.903628][T15104] loop2: detected capacity change from 0 to 16 [ 197.916353][T15094] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:39 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000402, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:39 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 197.949273][T15094] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. [ 197.979772][T15104] loop2: detected capacity change from 0 to 16 13:57:39 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x74, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x74}}, 0x0) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x84, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7fffffff, 0x20}}}}, [@NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x11}, @NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x1000}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x5}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x18}, @NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x1000}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x23}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x7f}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x84}, 0x1, 0x0, 0x0, 0x4040}, 0xc0) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:39 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) syz_open_pts(r1, 0x0) r3 = mq_open(&(0x7f0000000000)='/dev/ttyS3\x00', 0x2, 0x80, &(0x7f0000000080)={0xe2f9, 0x8001, 0x86, 0x80}) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000003, 0x100010, r3, 0xfe3e1000) [ 198.013340][T15120] loop3: detected capacity change from 0 to 136 13:57:39 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000080)) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) [ 198.083625][T15120] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 198.104492][T15138] loop5: detected capacity change from 0 to 264192 [ 198.105873][T15137] loop4: detected capacity change from 0 to 264192 [ 198.121409][T15145] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 13:57:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf00, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1100000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 198.129614][T15145] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 198.144610][T15137] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:39 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 13:57:39 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000406, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 198.189653][T15137] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 198.215480][T15137] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:39 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x40181, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x7, 0x20}) r1 = shmget$private(0x0, 0xf000, 0x0, &(0x7f0000ff1000/0xf000)=nil) shmat(r1, &(0x7f0000ffd000/0x3000)=nil, 0x6000) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmctl$SHM_UNLOCK(r1, 0xc) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x189080, 0x0) ioctl$TCXONC(r2, 0x5416, 0x0) 13:57:39 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x206000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r3 = syz_open_pts(r1, 0xc200) r4 = dup2(r3, r2) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000080)={0x8, 0x400, 0xfc00, 0xffc0, 0x8, "75a9c1c2abd3bd08"}) ioctl$TCFLSH(r1, 0x540b, 0x2) [ 198.245577][T15169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15169 comm=syz-executor.1 [ 198.260706][T15173] loop3: detected capacity change from 0 to 136 [ 198.284021][T15171] loop5: detected capacity change from 0 to 264192 13:57:39 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 198.284483][T15173] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:39 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) 13:57:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1200000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 198.335006][T15145] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 198.343236][T15145] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 198.393314][T15197] loop4: detected capacity change from 0 to 264192 [ 198.410960][T15169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15169 comm=syz-executor.1 [ 198.428521][T15197] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:39 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1020, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:39 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TIOCCBRK(r0, 0x5428) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f00000001c0)={0x7, 0x80000000, 0x101, 0x2, 0x6, "35e067889334a51e741584c134f7d7bf5f0e5e", 0x1000, 0xffffff01}) dup2(r3, r2) r4 = syz_open_pts(r2, 0xc40) r5 = dup2(r4, r1) ioctl$KDSKBLED(r4, 0x4b65, 0x5) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000140)={r5, 0x9476, 0x401, 0x7}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz0', "5f460774e7c8"}, 0xa) r7 = syz_open_pts(r6, 0x200) ioctl$GIO_CMAP(r5, 0x4b70, &(0x7f0000000240)) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x50080, 0x0) ioctl$TCSBRKP(r8, 0x5425, 0x3ff) ioctl$TCSETSF2(r7, 0x402c542d, &(0x7f0000000180)={0x401, 0x7, 0x5, 0x0, 0x12, "f85160cd4b5b2d62936e975b2a42038a34e380", 0x0, 0x8000}) 13:57:39 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) 13:57:39 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000410, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 198.456838][T15197] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 198.475349][T15212] loop5: detected capacity change from 0 to 264192 [ 198.475780][T15197] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:39 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 13:57:39 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000080)={0x2a, @tick=0x9, 0x6, {0x13, 0x1}, 0x6a, 0x0, 0x40}) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x810, r0, 0x6ceed000) ioctl$TCXONC(r0, 0x5416, 0x0) [ 198.568435][T15227] loop3: detected capacity change from 0 to 136 13:57:40 executing program 0: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)=""/83, 0x53}, {&(0x7f0000000200)=""/196, 0xc4}], 0x2, 0x3, 0x7) ioctl$TIOCGPTPEER(r0, 0x5441, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2402, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r3 = syz_open_pts(r2, 0x0) r4 = dup2(r3, r2) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000000)={0x1, 0x1004, 0x5, 0x0, 0x0, "85811000b7baeb06e800"}) r5 = syz_open_pts(r1, 0x0) dup2(r5, r1) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x1a}, {r2, 0x4}, {0xffffffffffffffff, 0x8208}, {r4, 0x8}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x4}], 0x6, 0x7) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCCBRK(r1, 0x5428) openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x2500, 0x0) r7 = syz_open_pts(0xffffffffffffffff, 0xd0200) dup2(r7, r6) ioctl$TIOCVHANGUP(r7, 0x5437, 0x0) 13:57:40 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) 13:57:40 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = socket$inet_icmp(0x2, 0x2, 0x1) pidfd_getfd(r0, r1, 0x0) [ 198.625095][T15227] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 198.641592][T15245] loop5: detected capacity change from 0 to 264192 [ 198.648947][T15246] loop4: detected capacity change from 0 to 264192 [ 198.692231][T15246] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1100, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:40 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) set_mempolicy(0x2, &(0x7f0000000040)=0x24, 0x3) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r0) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, r2, 0x100, 0x70bd27, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x80000000, 0x4b}}}}, [@NL80211_ATTR_KEY_SEQ={0xc, 0xa, "015178fb2089cebb"}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "9f92d6e477"}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}]}, 0x68}, 0x1, 0x0, 0x0, 0x48814}, 0x4040) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="5002000058f5bc8a6c9ebf000077993370c980b0e521da0b0eb7f70592b92b0c59cb0bd32d29dfd90dc42d42c76929748fa9585308084c3a80bcde2fbe37e02e09b04791381c41d9508cf5b0feb35a9c6bde428cd72aebfa", @ANYRES16=0x0, @ANYBLOB="000828bd7000fbdbdf25380000000c0058007b000000000000000c00580057000000000000000c0058006e000000000000000c0058001b000000000000000c0058002200000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x4000800) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r3, 0x5416, 0x0) [ 198.734056][T15246] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 198.743670][T15246] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:40 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000500, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:40 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x80101, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 198.829526][T15278] loop5: detected capacity change from 0 to 264192 [ 198.848936][T15284] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 198.850022][T15288] loop3: detected capacity change from 0 to 136 [ 198.857157][T15284] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 13:57:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2200000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:40 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000600, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) 13:57:40 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x2) [ 198.884888][T15288] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1200, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:40 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x8) clone3(&(0x7f0000000080)={0x1ae025000, 0x0, 0x0, 0x0, {0x2000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:57:40 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)={0x0, 0x9, 0x9, 0x5, 0x14, "6ca582d50857f00996466684b115c4cadb1381"}) ioctl$TCXONC(r0, 0x5416, 0x0) [ 198.986465][T15311] loop5: detected capacity change from 0 to 264192 [ 198.997581][T15284] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 199.005804][T15284] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 199.020102][T15315] loop4: detected capacity change from 0 to 264192 13:57:40 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 13:57:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2500000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 199.058301][T15315] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 199.069815][T15329] loop3: detected capacity change from 0 to 136 [ 199.086457][T15329] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 13:57:40 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x0) readahead(r0, 0x1, 0x1) [ 199.100463][T15315] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 13:57:40 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xc0100, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:40 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000604, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='test_dummy_encryption,noquota']) [ 199.135650][T15315] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,noquota,errors=continue. Quota mode: none. 13:57:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 13:57:40 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = signalfd(r0, &(0x7f00000000c0)={[0xfff]}, 0x8) ioctl$TIOCNOTTY(r1, 0x5422) ioctl$TCXONC(r0, 0x5416, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) sendfile(r2, r0, &(0x7f0000000100)=0x2, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x40081) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000080)={0x4c08, 0x5c, 0x9, 0x800, 0x16, "bccb11d291b35911d44ec40dea3876abd009de"}) 13:57:40 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x2, 0x8000, 0x200, 0x0, 0x40, "d314492279d6f56b5b08c7c3a059994eeded67", 0xd022, 0x1f}) ioctl$TCXONC(r0, 0x540a, 0x2) 13:57:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2601000000000000, 0x1, &(0x7f0000001500)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) [ 199.254021][T15359] loop5: detected capacity change from 0 to 264192 [ 199.301894][T15368] loop3: detected capacity change from 0 to 136 [ 199.340557][T15371] loop4: detected capacity change from 0 to 264192 [ 199.353980][T15368] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 [ 199.367589][T15380] loop5: detected capacity change from 0 to 264192 [ 199.392879][T15371] EXT4-fs (loop4): Test dummy encryption mount option ignored 13:57:40 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r3 = syz_open_pts(r2, 0x0) dup2(r3, r2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r4 = syz_open_pts(0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$TCSETS(r5, 0x5402, &(0x7f00000000c0)={0x6, 0x5ff, 0x2e594e17, 0x0, 0x5, "98a04fdfb45a56260cf217cf794bafea7e289b"}) dup2(r4, 0xffffffffffffffff) ioctl$TCXONC(r4, 0x5416, 0xf82645d9d05afa2f) 13:57:40 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@alg, &(0x7f0000000000)=0x80) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x21, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, 0xe8) sendmsg(r2, &(0x7f0000001240)={&(0x7f0000000bc0)=@l2tp6={0xa, 0x0, 0x100, @dev={0xfe, 0x80, '\x00', 0x34}, 0x60, 0x4}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000c40)="b263039494d25f7b8feb0e1a407366d3ae391103ac6899aa4f65fb6a473420bbf071ba1f3111b4f558021f4e0e055cffeff8d8bcd26dbe1dd2a515036736adb86ef3799864543692378e63abc50bececf0e884a96a3ca42dbbaf76ab5fbbaab56361a9063cbfb62bafbd45d54ac0a3239c0d27aae90cc02d6f71216f90da6901bd2471c7482bcd315609847c4abc652463407d539a5b10df27f27945b7f780b2011319b975ccee475bdb3c83893b1664c0c4ff6ec9576ee35cc0161f2d0c2b276b303ebb1c9f1c0ea8d528290d7e9386a35ec41837bac3cc5ef3f0c4bc03ec68f77bc52d4c09", 0xe6}, {&(0x7f0000000d40)="c5645c2a567d0c64b4d7c2f1b99765eea069776cf4c98b0e29cbaad81194eb16b37c27f0b957993a", 0x28}, {&(0x7f0000000d80)="3113e7508cea3ff5f614b39723cc66b68f2bb5b73556623eaac6a7af04e482e1a67703d331fdde82b0b184ed9c290b8eeb25793c9c9b9d904cbb0fbc62c398ea649de8fde96c773b9122b990ad55dff979a496478aca6d82ed281592b6265338773acfd048a3245e5aee609d50cbcca1721bc05a4e62ec5875d2ec12ebb2ec9970f28c27614b601dc224690b568712bb443308f36e12933b53d3654e7830977a3b6c72d8abe7d41085ed32432444f215782272ed91b8a418cdf39b04e3e2ad1386acf724b791bbbdd22566811e6ce3b942c183dbec43863231f14420f46e87120fcd5b65cea45a81077646d093e05a9f543d21f5b0d213b9", 0xf8}, {&(0x7f0000000e80)="9aa7645bc2ab0b3cc332214c", 0xc}], 0x4, &(0x7f0000000f00)=[{0xe8, 0x118, 0x0, "010363968ee9692df384a929dae9705046f78e4ed08831061afdfc4f7261e83f708c1c7c14d14c7ea7e2098c4fd4bc72bbc27b2f2afca2c11f66572cbdc31878e9f786b8aef7f668c9bf598c62134ee6ac8535b4b70de305037146844a2c3027d267f23263b7ed4f9629879f0f303992ff6466548f238b5a05654b51eda785c3b5c5f62628af1159f4db317df8e961c4a3e4bef2f6fe89c8af2236d439f2972295f0bd1ed02910cf514beedb213850e15fb32834f236f4592954a9f53e53de4e2d3b0d057a3849c9c19bc07e1553a0aacd65883e29"}, {0x20, 0x100, 0xe3f, "28e3bc1dda0694934e23"}, {0xf8, 0x110, 0x65800000, "207862c81ae4995a4a59cb65e98ea04e297466b20a60c9f2c71f997a5260a9b9b1f633514a9816aa53b8a54d9495bbf1c0ee080ac7d6dfd9038870dd5d5ba8738ce29ee3bfd32638ea6be88195dc67305e8940a514a56228ec7ccc628e19353076e8b717ca843c0fc4df7b5ebde7ea8652ecfb4eff6125b1e9a2e3e8a48979a2b872c4886dd62e9df4b20f9edfee1d9e50afeed6a46e2f2c008848e23fbfafd4d5aa218e30eb8e1167ab1b0c903fee025bae0e09c2dfc5b94f170c30c7619a1dec61f7e1929f444c0c9d07de49e00b15ee1ae8cb7b3f998e58d02ae344a051d45705b21d47"},